22csb0a36 Mannet
22csb0a36 Mannet
Done by:
• Vulnerability in MANETs: Mobile Ad-hoc Networks (MANETs) • Node Identification & Monitoring: Each node is assigned a
operate in a decentralized manner, making them highly unique identifier, and its behavior is monitored during data
susceptible to security threats. transmission.
• Packet Dropping Attack: Malicious nodes intentionally drop • Packet Forwarding Analysis: The system counts the number
packets instead of forwarding them, leading to a decrease in of packets forwarded and dropped by each node.
packet delivery ratio (PDR).
• Bandwidth Attack (DDoS): Attacker nodes flood the network • Threshold-Based Attack Detection:
with excessive traffic, consuming bandwidth and causing delays • If a node drops packets beyond a certain threshold, it is
or network failures. classified as a malicious node.
• If a node requests excessive bandwidth, it may be a
• Challenges in Detection: bandwidth attacker.
• Malicious nodes disguise themselves as legitimate nodes. • Node Bypassing Technique:
• High mobility of nodes makes attack detection complex. • Malicious nodes are bypassed during route discovery to
• Traditional security mechanisms are difficult to implement prevent them from affecting communication.
due to resource constraints.
• Impact on Network Performance: Alternative safe routes are chosen dynamically.
• Increased packet loss leads to poor Quality of Service (QoS). • Bandwidth Redistribution: The network reallocates
• Reduced throughput and network congestion. bandwidth resources to prevent attackers from consuming
• Increased energy consumption due to retransmissions. excessive bandwidth.
• Objective of the Research: To develop a technique that • Enhancing Security Without Overhead: The proposed
efficiently detects and mitigates packet solution does not require complex cryptographic security
mechanisms, making it lightweight and efficient for real-time
scenarios.
Contents: Architecture
and Flow charts
• Flowchart:
Architecture:
• The network ensures only trusted nodes
participate in routing.
Key Takeaways
• Action: Malicious nodes are bypassed, and alternate routes are used.
• Action:
• Restore bandwidth levels.
• Bypass attacker nodes.
• Redistribute bandwidth fairly.
Title: Real World Applications, Challenges and Future scope
Real-World Applications:
• Defense and Military Networks – Ensures secure battlefield communication and prevents malicious packet drops.
• Disaster Response Networks – Provides reliable communication for rescue teams during natural disasters.
• Vehicular Ad-hoc Networks (VANETs) – Secures vehicle-to-vehicle communication, preventing traffic congestion and
accidents.
• Healthcare and Telemedicine – Supports real-time patient monitoring and secure data transmission for remote
surgeries.
• Smart Cities and IoT Networks – Protects sensor-based infrastructures like smart grids, traffic systems, and
surveillance networks.
• Underwater Sensor Networks – Used in marine exploration and environmental monitoring to prevent data loss in
challenging conditions.
Challenges:
Future Scope: