CFP last date
20 May 2024
Reseach Article

Enhance Security in MANET using Bacterial Foraging Optimization Algorithm

by Preeti Gulia, Sumita Sihag
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Number 1
Year of Publication: 2013
Authors: Preeti Gulia, Sumita Sihag
10.5120/14543-2620

Preeti Gulia, Sumita Sihag . Enhance Security in MANET using Bacterial Foraging Optimization Algorithm. International Journal of Computer Applications. 84, 1 ( December 2013), 32-35. DOI=10.5120/14543-2620

@article{ 10.5120/14543-2620,
author = { Preeti Gulia, Sumita Sihag },
title = { Enhance Security in MANET using Bacterial Foraging Optimization Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 84 },
number = { 1 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume84/number1/14543-2620/ },
doi = { 10.5120/14543-2620 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:59:50.630015+05:30
%A Preeti Gulia
%A Sumita Sihag
%T Enhance Security in MANET using Bacterial Foraging Optimization Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 84
%N 1
%P 32-35
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANETs (Mobile Ad-hoc Networks) are one of the fastest emerging networks. MANET is an unstructured network in which nodes are mobile and autonomous. Nodes act as hosts as well as routers. This mobility may leads to insecurity in MANET. BFOA (Bacterial foraging optimization algorithm) is a Bio-inspired Algorithm. This algorithm simulates the behavior of bacteria that can be effectively applied in various fields. A new protocol is proposed here, named BFAODV by applying BFOA technique on AODV. The proposed protocol improves the performance metrics in comparisons to DSDV and AODV protocols. This paper detects and prevents from black hole attack using proposed BFAODV algorithm.

References
  1. K. sahadevaiah, "Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks", Network Protocols and algorithms" ISSN 1943-35812011, Vol. 3, No. 4
  2. G. S. Mamatha and Dr. S. C. Sharma, "A Highly Secured Approach against Attacks in MANETS", International Journal of Computer Theory and Engineering, Vol. 2, No. 5, October, 20101793-8201.
  3. Neha Ujala Tirkey, 2 Navendu Nitin , 3 Neelesh Agrawal , 4 Arvind Kumar Jaiswal, "Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization" . International Journal of Engineering Research & Technology (IJERT)Vol. 1 Issue 8, October – 2012,ISSN: 2278-0181
  4. Ebrahim Mohammed Louis Dargin, "Routing Protocols Security in Ad Hoc Networks".
  5. Patil V. P, "Efficient AODV Routing Protocol for MANET with enhanced packet delivery ratio and minimized end to end delay", International Journal of Scientific and Research Publications Volume 2, Issue 8, August 2012. ISSN 2250-3153.
  6. Nital Mistry, Devesh C Jinwala, Member, IAENG, Mukesh Zaveri, "Improving AODV Protocol against Blackhole Attacks", proceedings of the international multiconference of engineers and computer scientist 2010, vol II, IMECS,2010 march 17- 19,2010,hong kong.
  7. Aws Kanan, Taisir Eldos, Mohd Alkahtani, "Mobile Ad Hoc Networks Routing Using Ant Colony Optimization",World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 3, No. 6, 105-109, 201O .
  8. Khaleel Ur Rahman Khan, Rafi U Zaman, "The Performance of the Extended DSDV (eDSDV) MANET Routing Protocol and its Suitability in Integrated Internet-MANET", IJSSST, Vol. 10, No. 2 ISSN: 1 39 473-804xOnline, 1473-8031 print.
  9. Ponniyin Selvan and 2S. Senthil Kumar, "An Optimized Ad Hoc on Demand Distance Vector Routing Protocol for Wireless Networks", Journal of Computer Science 8 1177-1183, 2012 ISSN 1549-3636© 2012 SciencePublications.
  10. Orhan Dengiz a, Abdullah Konak Alice E. Smith c,1 "Connectivity management in mobile ad hoc networks using particle swarm optimization", elsvier Ad Hoc Networks 9 (2011) 1312–1326,2011.
  11. K. Sathish Kumar, T. Jayabarathi,"Power system reconfiguration and loss minimization for an distribution systems", Elsevier, Electrical Power and Energy Systems T. Jayabarathi, Electrical Power and Energy Systems 36 (2012) 13–17.
  12. http://www. cleveralgorithms. com/nature- inspired/swarm/bfoa. htm
Index Terms

Computer Science
Information Sciences

Keywords

MANET BLACKHOLE BFOA BFAODV