Security Improvement of AODV Routing Protocol through IPSO-IDRS Mechanism for Ad-hoc Networks
Prasanth Venkatareddy, Subhash Kulkarni2

1Shruti Dixit*, Department of Electronics and Communication, UIT, RGPV, Bhopal, India.
2Rakesh Singhai, Department of Electronics and Communication, UIT, RGPV, Bhopal. 

Manuscript received on September 16, 2019. | Revised Manuscript received on 25 September, 2019. | Manuscript published on October 10, 2019. | PP: 1009-1015 | Volume-8 Issue-12, October 2019. | Retrieval Number: K14890981119/2019©BEIESP | DOI: 10.35940/ijitee.K1489.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Ad-hoc network is vulnerable to different types of attacks because of its vigorously changing topology, limited storage capacity, absence of centralized infrastructure etc. Adhoc On Demand Distance Vector (AODV) is established protocol for routing for this type of networks. AODV is exposed to black hole attack due to the inadequacy of security consideration. The malicious nodes drop all information packets rather than sending it to the neighboring node. In this research paper, Anomaly based intrusion detection system (IDS) known as Particle swarm optimization (PSO) is purposefully utilized to detect the misbehavior activities in the network. In AODV routing protocol, swarm agents are used for identifying misbehavior activities of nodes based on dropping behavior of data packets. An intrusion response system (IRS) is activated after the detection of an intrusion. It is necessary to take action against black hole attack or reduce the effect of the damage caused by the attack. IDS and a response system are integrated for detection and removal of the source of an attack respectively. The guard nodes are placed in the network with the aim to oppose black hole attackers and in this way IR is initiated. The malevolent nodes detected by PSO are bypassed and new routing paths are established using guard nodes. This research has been carried out for analyzing the influence of malicious nodes and guard nodes on varying network size vice versa. The simulation study of proposed technique integrated particle swarm optimization intrusion detection response system (IPSO-IDRS) explains how it is better in terms of the performance metric like throughput and PDR.
Keywords: Particle Swarm Optimization, Intrusion Detection Systems, Intrusion Response System, Black Hole Attack, Guard Nodes, AODV.
Scope of the Article: Discrete Optimization