International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

Secured Intrusion Detection in Adhoc Networks

Mahmoud Zaher , Nabil M. Eldakhly

Adhoc network computing is necessary in the present IT business since adhoc networks play such a huge role in it. Making computer talents connected to information technology available on demand using the pay-as-you-use payment model is the practice under question (PAYU). It is conceptualized as a collection of computational resources that has been developed rationally. Only virtualization, a crucial component, makes it feasible to provide ad hoc network computing services. By utilizing the underlying physical computing resources, such as processing power, memory, servers, programs, and other essential resources for calculation, this approach enables the creation of logical or virtual resources (instances). Due to the cost savings associated with virtualization, Adhoc Network service providers could be able to reduce their initial investments. It results in more efficient use of the available computational resources. When employing a virtualization approach to generate many resources or instances, it is vitally crucial for the users to determine whether these virtual resources satisfy, the criteria that have been set users have set outtake several forms, one of which is the creation of Routing Protocols (VMs). When multiple Routing Protocols are created by utilizing the underlying physical computing resources, it is essential for the user that these Routing Protocols perform processing without interrupting the other, as well as without any interruption from outsiders such as intrusions, malware, hackers, etc., It is essential for the user that these Routing Protocols perform processing without interrupting the other It is necessary for the user that these Routing Protocols perform processing without interrupting the other It is of the utmost importance to have a thorough understanding of how to prevent assaults, incursions, and system failures. In this article, we introduce several different approaches, each of which makes use of a variety of security components, such as a security watchdog, an IDS/IPS system, a security framework, an access control framework, a security supervisor, etc., to provide the required level of security for the Routing Protocols and their required resources. This is accomplished by enabling the Routing Protocols to function normally and without any problems from the outside or the inside of the working environment, all while making use of the accessible.

Read More

Doi: https://doi.org/10.54216/IJWAC.050203

Vol. 5 Issue. 2 PP. 30-49, (2022)

A Proposed Optimization Framework for the Routing Protocols in Adhoc networks

Pavan Kumar V. , Naveen K. , Deva Krupakaram S. , Mohan Reddy D.

Because of recent advancements in wireless communication and networking, it is now much simpler for people to continue cultivating meaningful connections with one another. After the evolution of the IEEE 802.15.4 standard and Mobile IPv6, which is described in IETF RFC 4068, there is a demand for the design of a routing protocol based on the new architecture of wireless networks that can facilitate efficient communication. This is because the design of a routing protocol that is based on the new architecture of wireless networks is required to meet this demand. This desire has surfaced as a direct result of the necessity to design a protocol that is suitable for usage with the recently developed architecture of wireless networks. Wireless sensor networks, abbreviated as WSN for convenience, are one kind of wireless network that might run into problems with its physical layout. Scalability, energy efficiency, and efficient routing throughout the network are the three problems that need to be addressed here. It changes the way sensing operations are performed from those that can only be done on a small scale, in a centralized location, and at a high cost into those that can be done on a large scale, in a dispersed location, and at a lower cost. This is accomplished by combining extremely small battery-powered sensors with wireless networks. There are literally hundreds of different applications for wireless sensor networks that may be utilized to make complex problems easier to handle. When it comes to the great majority of applications for wireless sensor nodes, the key concern of engineers is the conservation of energy in these nodes. This becomes very important because the amount of energy consumption in sensor nodes should be maintained to a minimum in order to maximize the amount of time that a network can continue to function normally. The creation of a routing algorithm that consumes the least amount of energy possible is the major challenge presented by WSN. Clustering techniques are necessary for the maintenance of the network's available energy, and the k means clustering strategy is used during the formation of clusters in wireless sensor networks (WSN). When there is growth in the network and the topology formation changes because of scalability in the network, a new routing technique has been proposed with a k-means clustering algorithm using IPv6. The goal of this technique is to minimize energy consumption among the nodes while also maintaining a balanced distribution of energy use across the network. This was carried out with the goal of using IPv6, which has already been accomplished. The method of routing that has been presented is suitable for implementation in settings that support not only unicast and multicast routing but also any cast and multicast routing as well as multipath routing. This is done so that load balancing may be implemented successfully inside the network. In addition, research has been done to investigate the problem of finding bottleneck nodes within a WSN in order to make the process of energy conservation easier.

Read More

Doi: https://doi.org/10.54216/IJWAC.050204

Vol. 5 Issue. 2 PP. 50-63, (2022)

A Review on Distributed Denial of Service Detection in Software Defined Network

Khadija Shazly , Dina A. Salem , Nacereddine Hammami , Ahmed I. B. ElSeddawy

Network security has become considerably essential because of the expansion of the internet of things (IoT) devices. One of the greatest hazards of today's networks is distributed denial of service (DDoS) attacks, which could destroy critical network services. Recently numerous IoT devices are unsuspectingly attacked by DDoS. To securely manage IoT equipment, researchers have introduced software-defined networks (SDN).  This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attacks. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attacks is based on utilizing deep learning procedures. Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use a graphics processing unit (GPU) rather than a central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.

Read More

Doi: https://doi.org/10.54216/IJWAC.050201

Vol. 5 Issue. 2 PP. 08-18, (2022)

Secured Authentication of Node in Mobile Adhoc Network

Prabu S. , Alekhya A. , Kiran K. Chatragadda , Venkateswarlu Lingala

Over the previous two decades, wireless communication has developed into an indispensable component of modern life. In recent years, wireless networks have acquired greater significance than wired networks as a result of improvements in technology as well as reductions in cost. The adaptability and portability of wireless devices make this feasible in a wide variety of real-time software applications. One kind of wireless network, known as an Adhoc network, can establish a connection in locations where conventional communication is not feasible. The Mobile Adhoc Network, also known as MANET, is a sort of ad hoc network that is established by the collection of mobile nodes that are each outfitted with a transceiver and interact with one another over duplex connections. Every node in a MANET functions as a router and figures out how to go from the source to the destination by going via the other nodes in the network. MANET has a number of properties, including changeable capacity and bandwidth, energy-restricted operation, speed of deployment, and dynamic topology. Because of MANET's inherent fluidity, the network is more prone to experiencing security breaches. In recent years, researchers have developed a number of solutions to security problems, including intrusion detection, routing, security protocol, and other techniques. These solutions have been made available. Even though there are a few different options to choose from, none of them are enough to safeguard the network nodes. When more nodes are added to the network while it is operating in a hostile environment, the overall performance of the network suffers. Secured Authentication with Node Isolation, often known as SAWNI, is an authentication method that aims to improve network safety by locating and isolating any hostile nodes that may be present in a network. The approach of isolation may be used to protect the ordinary node while isolating the malicious node either temporarily or permanently, depending on the situation. The network's legitimacy is improved as a result of this isolation mechanism, which takes into account the potential danger posed by the rogue node. The findings of the experiments reveal that using DHA, rather than DSA, may raise the PDR by 2% while using CBDS can increase it by 1% when there is a significant proportion of malicious nodes and the node mobility is less than 10 meters per second. When compared to DHA, the DHA-SHORT results in a 22% reduction in the delay. Finally, in comparison to DSA, SAWNI results in an increase of 8% in PDR, whereas CBDS sees an increase of 7% when there is a significant proportion of malicious nodes moving at less than 10 meters per second.

Read More

Doi: https://doi.org/10.54216/IJWAC.050202

Vol. 5 Issue. 2 PP. 19-29, (2022)

Quality of Service in Mobile Adhoc Networks with Non-Saturation Conditions

Harith Yas , Manal M. Nasir

Numerous research has been conducted in order to investigate the performance of IEEE 802.11LEACH for a single-cell Wireless Local Area Network (WLAN) under saturation conditions. Saturation conditions are those in which it is anticipated that the queues of nodes will never be empty. To put it another way, there is always a packet waiting to be sent out from each and every node in the network. The term "infinite load" refers to the condition of saturation, which is a situation that may be regarded as having an endless load. Even though conducting an analysis under saturated conditions may provide some insight into how well the network operates in a high-pressure setting, this strategy does not appear to be practical because there is a possibility that the network will not always be at capacity. Even though conducting such an analysis under saturation circumstances may provide some insight into how well the network operates in a high-pressure setting, it is still not practical. When using CQSR, the source is aware of the correlation that exists between the many different paths that go to the destination. When it comes to the provision of quality service in an ad hoc network, having several pathways among a specific cause and an endpoint may be of assistance in the following scenarios. Having multiple pathways between a source and a destination may also be of assistance when it comes to the provision of quality service. It is feasible that a single channel will not be able to deliver adequate resources to meet the desired quality of service if the resources of mobile nodes are limited. This scenario might occur if mobile nodes are subject to resource limitations. The requirements of the application in terms of the quality of service might, however, be satisfied by the resources located along any one of the many possible paths that could exist between the specified pair of nodes. It seems likely that this will turn out to be the situation. The task force may be dispersed over a number of different routes if there are adequate resources available along each route. To put it another way, data packets are sent along each path that satisfies the criteria for acceptable quality-of-service levels. If you use many routes instead of just one, you may be able to obtain a throughput that is far higher than you would with a single route. In the previous proposed work, we did an analysis of IEEE 802.11 LEACH for an ad hoc network under saturation conditions. Saturation circumstances refer to scenarios in which it is believed that the queues of nodes are never empty. On the other hand, it is likely that the nodes that make up an ad hoc network will not always be totally filled.

Read More

Doi: https://doi.org/10.54216/IJWAC.050205

Vol. 5 Issue. 2 PP. 64-76, (2022)

U-Shape Wideband Slot Antenna for 5G Mobile Phone Applications

Basma M. Yousef , Germien G. Sedhom , Alshimaa H. Ismail

A new shape of slot antenna (U-shaped) is introduced in this paper. The proposed antenna is designed for use in mobile phone devices. This structure covers bands ISM/Bluetooth, WLAN, Wi-Fi, WiMAX, 5G applications, cellular communications, weather radar, surface ship radar, and some communications satellites. A U-shaped slot is cut on the ground plane. A coupling feed technique is used to feed the designed antenna. The proposed antenna is printed on a high-loss FR-4 dielectric substrate with . The designed antenna achieves a very wide bandwidth (from 2.3GHz to 6.3GHz). A high gain (around 7dB) is also achieved. The design is simulated using CST software, and the results are verified by HFSS software.

Read More

Doi: https://doi.org/10.54216/IJWAC.050206

Vol. 5 Issue. 2 PP. 77-83, (2022)