Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks

被引:24
|
作者
Mohammadani, Khalid Hussain [1 ]
Memon, Kamran Ali [2 ]
Memon, Imran [3 ]
Hussaini, Nazish Nawaz [4 ]
Fazal, Hadiqua [3 ]
机构
[1] ISRA Univ, Dept Comp Sci, Hyderabad, Sindh, Pakistan
[2] Quaid E Awam Univ Engn Sci & Technol QUEST, Dept Elect Engn, Nawabshah, Pakistan
[3] Bahria Univ, Dept Comp Sci, Karachi Campus, Karachi 75300, Sindh, Pakistan
[4] Univ Sindh, Inst Math & Comp Sci, Jamshoro, Pakistan
关键词
Mobile ad hoc network; blackhole attack; carrier-sense multiple access; time-division multiple access; MAC PROTOCOL; ALGORITHM; ATTACK;
D O I
10.1177/1550147720921624
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks are the "spontaneous networks" which create a temporary network in any place and any time without using any extra fixed radio device of a full infrastructure network. Each device in this network works as a router to develop end-to-end communication connections and move independently in any direction. Mostly, mobile ad hoc networks use the IEEE 802.11b protocol with carrier-sense multiple access with collision avoidance medium access control layer protocol for sharing a common medium among the nodes simultaneously. Due to this distributed medium, the routing and medium access control layer of the mobile ad hoc network are prone to attacks. Among several attackers, blackhole attacker is the dangerous one which causes the loss of all data packets of devices in the network. Efficient medium access control protocol designs in this respect play a key role in determining channel utilization, network delay, and, more importantly, network security. In the proposed work, preamble information is used with time-division multiple access medium access control. The preamble time-division multiple access uses time synchronization for each time slot and does not assign much time to the blackhole attacker due to a fixed time slot. As a result, blackhole is not stable in all communications and such an attack is effectively defended. Simulation results show that, in the presence of the blackhole attacker, carrier-sense multiple access with collision avoidance has a high packet loss ratio and low network throughput as compared to the proposed preamble time-division multiple access.
引用
收藏
页数:18
相关论文
共 31 条
  • [21] Enhanced Secure Trusted AODV (ESTA) Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks
    Singh, Dilraj
    Singh, Amardeep
    FUTURE INTERNET, 2015, 7 (03): : 342 - 362
  • [22] Measuring energy-time efficiency of protocol performance in mobile ad hoc networks
    Pu, Ida
    Shen, Yuji
    Kim, Jinguk
    AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 475 - +
  • [23] TIME-DIVISION MULTIPLE-ACCESS PROTOCOL FOR A FIBEROPTIC PASSIVE DOUBLE STAR TRANSPORT-SYSTEM
    MIKI, N
    KUMOZAKI, K
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1995, E78B (07) : 995 - 1001
  • [24] ASTSMAC: Application Suitable Time-Slot Sharing MAC Protocol for Vehicular Ad Hoc Networks
    Li, Shujing
    Liu, Yanheng
    Wang, Jian
    IEEE ACCESS, 2019, 7 : 118077 - 118087
  • [25] T-SEA: trust based secure and energy aware routing protocol for mobile ad hoc networks
    Kukreja D.
    Sharma D.K.
    International Journal of Information Technology, 2022, 14 (2) : 915 - 929
  • [26] A Decentralized Medium Access Protocol for Real-Time Wireless Ad Hoc Networks With Unreliable Transmissions
    Hsieh, Ping-Chun
    Hou, I. -Hong
    2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 972 - 982
  • [27] Fuzzy Logic Based Reliable and Real-Time Routing Protocol for Mobile Ad hoc Networks
    Solmaz Ghasemnezhad
    Ali Ghaffari
    Wireless Personal Communications, 2018, 98 : 593 - 611
  • [28] TLSR: A tree link state routing protocol using message aggregation based on a skewed wait time assignment for infrastructure-based mobile ad hoc networks
    Chi Trung Ngo
    Oh, Hoon
    COMPUTER COMMUNICATIONS, 2016, 74 : 87 - 100
  • [29] A new three phase multiple access based mac protocol for clustering wireless multi-hop ad hoc networks
    Choi, Yeongyoon
    Kim, Young-chul
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS, 2007, : 7 - +
  • [30] Load-balancing and Energy Aware Routing Protocol for real-time flows in Mobile Ad-Hoc Networks
    Rekik, Jihen Drira
    Baccouche, Leila
    Ben Ghezala, Henda
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 343 - 348