Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET

Nitesh Ghodichor, Raj Thaneeghavl V, Dinesh Sahu, Gautam Borkar, Ankush Sawarkar
{"title":"Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET","authors":"Nitesh Ghodichor, Raj Thaneeghavl V, Dinesh Sahu, Gautam Borkar, Ankush Sawarkar","doi":"10.5121/ijcnc.2023.15207","DOIUrl":null,"url":null,"abstract":"MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.","PeriodicalId":37554,"journal":{"name":"International Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Networks and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/ijcnc.2023.15207","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在MANET中使用区块链技术减轻攻击的安全路由协议
MANET是移动节点的集合,当它们从一个点移动到另一个点时,通过无线网络进行通信。MANET是一种具有可变拓扑结构的无基础设施网络;因此,它很容易受到攻击。防MANET攻击是一个严重的难题。恶意网络节点是网络攻击的源头。在MANET中,攻击可以采取各种形式,每一种攻击都以其独特的方式改变网络的运行。一般来说,攻击可以分为两类:针对网络中的数据流量的攻击和针对控制流量的攻击。本文解释了多种攻击,它们对MANET的影响,以及目前正在实施的基于MANET的防御措施。建议采用区块链技术(SRABC)的SRA保护MANET免受攻击并对节点进行身份验证。区块链技术提出的安全路由算法(SRA)保护控制和数据流免受威胁。这是通过为每个事务生成哈希函数来实现的。我们将从讨论MANET的安全性开始。本文的第二部分探讨了区块链在MANET安全中的作用。在第三部分中,SRA与区块链相关。在第四阶段,PDR和吞吐量被用于使用区块链进行SRA审查,使用PDR和吞吐量。结果表明,该方法在降低时延的同时提高了网络的安全性。分析了该技术的性能,并与Q-AODV和DSR路由协议进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Computer Networks and Communications
International Journal of Computer Networks and Communications Computer Science-Computer Networks and Communications
CiteScore
1.60
自引率
0.00%
发文量
46
期刊介绍: The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
期刊最新文献
Analysis of System Capacity and Spectral Efficiency of Fixed-Grid Network Multi Objective Salp Swarm based Energy Efficient Routing Protocol for Heterogeneous Wireless Networks A Privacy-Aware Tracking and Tracing System A Survey on CDN Vulnerability to DoS Attacks Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection based on Delaying the First Node Death in MWSN-IoT
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1