UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 9 Issue 3
March-2022
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2203550


Registration ID:
321846

Page Number

f387-f392

Share This Article


Jetir RMS

Title

Reduction of attacks in MANET-IoT network by identifying critical nodes - Using DCNI method and Rekeying technique

Abstract

In heterogeneous environments, the Internet of Things (IoT) with mobile ad hoc network (MANET), i.e., MANET-IoT network becomes attractive for users, and also it is economically successful. The introduction of MANET has made the system prone to attacks due to its lack of centralized management, weak connectivity, and resource limitations. To improve network scalability, the critical nodes of the MANET-IoT network should be identified and protected. Most of the methods for identifying critical nodes usually use the static network method or a single topology snapshot in dynamic networks without considering the relation between topology snapshots, which cannot improve the efficiency of MANET-IoT networks. A dynamic critical node identification (DCNI) method is proposed in this paper. Firstly, an extensive metric to measure the node importance in the topology snapshot is done. A sliding time window is used to eliminate the topology snapshots which correlate with the current snapshot and combine the importance values of the same node in different topology snapshots. Finally, the critical nodes are identified based on the result of fused importance. The port hopping mechanism can be used for the critical nodes to improve network defence. The results show that the proposed Dynamic Critical node method is very effective for identifying critical nodes than existing static and single topology methods in MANET-IoT networks, and the port hopping mechanism improves the network defence to denial of service (DoS) attacks. Rekeying technique will improve the stability of MANET-IoT and reduce the chances of error. Rekeying is an effective cryptographic key management system

Key Words

MANET-IoT network architecture, topology snapshot, dynamic critical node identification, network defence, denial of service (DoS), port hopping mechanism, mobile computing, Rekeying.

Cite This Article

"Reduction of attacks in MANET-IoT network by identifying critical nodes - Using DCNI method and Rekeying technique", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.9, Issue 3, page no.f387-f392, March-2022, Available :http://www.jetir.org/papers/JETIR2203550.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Reduction of attacks in MANET-IoT network by identifying critical nodes - Using DCNI method and Rekeying technique", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.9, Issue 3, page no. ppf387-f392, March-2022, Available at : http://www.jetir.org/papers/JETIR2203550.pdf

Publication Details

Published Paper ID: JETIR2203550
Registration ID: 321846
Published In: Volume 9 | Issue 3 | Year March-2022
DOI (Digital Object Identifier):
Page No: f387-f392
Country: , , .
Area:
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000295

Print This Page

Current Call For Paper

Jetir RMS