Protect Ad-Hoc Network Through Artificial Neural Network

Jyoti Solra


In present paper, we are providing enhanced security to Manet using the ACO through Artificial Neural Networks. Such techniques include flow and congestion control, where nodes send packet acknowledgements from destination nodes to either ramp-up or decrease packet transmission speed. The area of interest in this report concentrates on the idea of network routing and routing tables. These tables hold information used by a routing algorithm to make a local forwarding decision for the packet on the next node it will visit in order to reach its final destination.

One of the issues with network routing (especially in very large networks such as the internet) is adaptability. Not only can traffic be unpredictably high, but the structure of a network can change as old nodes are removed and new nodes added. This perhaps makes it almost impossible to find a combination of constant parameters to route a network optimally.

The neural network system is trained for some data and then file used for storing the data is eliminated, resulting confidentiality of connection. Thus the method makes the system more secure.

Full Text:



. A.A. Pirzada, C. McDonald, Trust establishment in pure ad-hoc networks, in: 1465 Wireless Personal Communications, vol. 37, pp. 139–168, 2006.

. Thomas M.Chen and Varadharajan Venkataramanan, Southern Methodist University, “Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks” In IEEE Internet Computing Published by the IEEE Computer Society November December 2005.

. Wenjia Li, James Parker, Anupam Joshi “Security through Collaboration and Trust in MANETs” Springer Link, vol. 17, issue 3, pages. 342-352, June. 2012.

. Dajin Wang; Li Xu; Jing Peng; Robila, S.; ,"Subdividing Hexagon-Clustered Wireless Sensor Networks for Power-Efficiency," Communications and Mobile Computing, 2009. CMC '09. WRI International Conference on , vol.2, no., pp.454-458, 6-8 Jan. 2009

. Tajeddine, A.; Kayssi, A.; Chehab, A.; , "TRACE: A centralized Trust And Competence-based Energyefficient routing scheme for wireless sensor networks," Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International , vol., no., pp.953-958, 4-8July 2011.

. Lutful Karim1*, Tarek El Salti1, Nidal Nasser2 and Qusay H Mahmoud1 “The significant impact of a set of topologies on wireless sensor networks, EURASIP Journal on Wireless Communications and Networking 2012.

. EssiaHamouda, Nathalie Mitton, Bogdan Pavkovic, David Simplot-Ryl, “ Energy-aware Georouting with Guaranteed Delivery in Wireless Sensor Networks with Obstacles” International Journal of Wireless Information Networks, September 2009, Volume 16, Issue 3, pp 142-153.

A.Agah, S. K. Das, K. Basu, and M. Asadi, “Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach”, Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA'04), pp. 343-346, 2004.

S. Zhong, L. Li, Y. G. Liu and Y. Yang, “On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-hoc Networks: An Integrated Approach Using Game Theoretical and Cryptographic Techniques”, Proceedings of the 11th Annual International Conference on Mobile Computing and Networking (MobiCom'05), pp.117-131, 2005.

H. Deng, W. Li, and Dharma P. Agrawal,"Routing Security in Ad Hoc Networks,” IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol.40, No. 10, October 2002

C.-Y. T. et al., “A specification-based intrusion detection system for AODV,” in Proc. Of ACM Workshop on Security of ad hoc and sensor networks, 2003.

Sarafijanovic, S. and Boudec, J., “An Artificial Immune System Approach with Secondary Response for Misbehavior Detection in Mobile Ad-Hoc Networks”. TechReport IC/2003/65, EPFL-DI-ICA, Lausanne, Switzerland, November 2003

Panagiotis Papadimitratos and Zygmunt J. Haas “Secure Routing for Mobile Adhoc Networks”, SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31, 2002.

J. S. Balasubramaniyan et al., “An Architecture for Intrusion Detection using Autonomous Agents,” Proceedings of the Fourteenth Annual Computer Security Applications Conference, 1998.

O. Kachirski and R. Guha, ”Effective Intrusion Detection using Multiple Sensors in Wireless Ad hoc Networks”, In Proc. 36th Annual Hawaii Int‟l. Conf. on System Sciences (HICSS‟03), pp.57.1, 2003.

Y. Zhang and W. Lee. “Intrusion detection in wireless ad hoc networks”. In Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 275–283. ACM Press, 2000.

A.Helmy, “Contact-extended zone-based transactions routing for energy-constrained wireless ad hoc networks,” IEEE Transactions on Vehicular Technology, vol. 54, no. 1, pp. 307–319,2005.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.