Congestion Control Through IDA Process for Malicious Node in MANETs
Seyed Amin Ahmadi Olounabadi1, Avula Damodaram2, V Kamakshi Prasad3, PVS Srinivas4

1Seyed Amin Ahmadi Olounabadi*, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University Hyderabad (JNTUH), Hyderabad, Telangana.
2Avula. Damodaram, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University Hyderabad (JNTUH), Hyderabad, Telangana.
3V Kamakshi Prasad, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University Hyderabad (JNTUH), Hyderabad, Telangana.
4PVS SRINIVAS, Department of Computer Science and Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, Telangana.
Manuscript received on February 10, 2020. | Revised Manuscript received on February 20, 2020. | Manuscript published on March 30, 2020. | PP: 1227-1230 | Volume-8 Issue-6, March 2020. | Retrieval Number: F7499038620/2020©BEIESP | DOI: 10.35940/ijrte.F7499.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile Ad Hoc Network is an array of mobile networks that connect without a base station with each other. The networks are automatically established or on request when certain nodes come into the shared mobility region and agree to collaborate for the transmission and exchange of data. Because of its deployment nature, MANETs are more vulnerable to different type of attack. The reliability of the ad hoc mobile network is difficult due to its essential features including complex topology, a flexible format, limited power, limited bandwidth and remote communication. Mechanisms for protection such as encryption or authentication cannot alone identify harmful nodes in ad-hoc networks. Therefore, we propose and implement the Congestion control through Intrusion Detection Approach (IDA), this intrusion detection approach designed specifically for MANET. This tool can be used even in the case of incorrect wrongdoing reports to identify fraudulent nodes. This approach can identify extremely dangerous nodes, and thus improves protection and network efficiency, relative to other detection methods.
Keywords: MANET, IDA, Enhanced Adaptive Acknowledgement, Malicious Node.
Scope of the Article: Robotics and control.