International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

Archives

TuEngr+Logo
:: International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

http://TuEngr.com



ISSN 2228-9860
eISSN 1906-9642
CODEN: ITJEA8


FEATURE PEER-REVIEWED ARTICLE

Vol.13(6)(2022)

  • Secure IoT Architecture in Mobile Ad-hoc Network Against Malicious Attacks Using Blockchain-based BATMAN

    Neha Khandelwal, Shashikant Gupta (Department of Computer Science Engineering, ITM University, Gwalior, INDIA).

    Disciplinary: Information Technology.

    ➤ FullText

    doi: 10.14456/ITJEMAST.2022.123

    Keywords: Internet of things; Wireless Network; Byzantine fault tolerance; Blockchain technology; Trust management; Extended-BATMAN (E-BATMAN).

    Abstract
    It is possible to build a decentralised wireless network using Internet of Things (IoT) sensors and other IoT-based devices. Wireless connections allow all network nodes to be moved around at will. They can connect and construct a network without current network infrastructure. Using blockchain technology in a wireless ad-hoc context, an IoT-based MANET is a fresh research topic. The key challenge for ad-hoc blockchain applications is to cope with the high computational cost of block validation while keeping blockchain features and incorporating nodes. This article presents a blockchain-based mobile network as a potential application of the ensemble approach, which has been covered in other articles. The suggested technique for MANETS routing uses the Byzantine Fault Tolerance (BFT) protocol. It is possible to integrate Blockchain into an IoT-based MANET (BATMAN) using advanced mobile ad-hoc networking (MANET) (BATMAN). Extended-BATMAN (E-BATMAN) is a method of integrating blockchain technology into the BATMAN protocol using IoT-based MANETs. Blockchain is a safe, distributed, and trustworthy platform, with each node performing its security procedures. Four characteristics are used to evaluate the proposed ensemble method: pdr, average e2e latency, network throughput, and algorithm vitality use. All of these components outperform the existing traditional techniques using the recommended ensemble approach.

    Paper ID: 13A6R

    Cite this article:

    Khandelwal, N., Gupta, S. (2022). Secure IoT Architecture in Mobile Ad-hoc Network Against Malicious Attacks Using Blockchain-based BATMAN. International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies, 13(6), 13A6R, 1-15. http://TUENGR.COM/V13/13A6R.pdf DOI: 10.14456/ITJEMAST.2022.123

References

  1. Aublin PL, Mokhtar SB, Que'ma V.Rbft: Redundant byzantine fault tolerance. In 2013 IEEE 33rd International Conference on Distributed Computing Systems.2013: 297-306.
  2. Clausen T, Jacquet P, Adjih C, Laouiti A, Minet P, Muhlethaler P, Qayyum A, Viennot L. Optimized link state routing protocol (OLSR). 2003. https://hal.inria.fr/inria-00471712
  3. Cordova D, Laube A, Pujolle G, et al. Blockgraph: A blockchain for mobile ad hoc networks. In 2020 4th Cyber Security in Networking Conference (CSNet), IEEE. 2020:1-8.
  4. Dennis R, Owen G. Rep on the Block: A next generation reputation system based on the Blockchain. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE. 2015:131-8.
  5. Eschenauer L, Gligor VD, Baras J (2002) On trust establish- ment in mobile ad-hoc networks. In: International workshop on security protocols, Springer, 2002:47-66.
  6. Hernandez-Orallo E, Olmos MDS, Cano JC, Calafate CT, Manzoni P.Cocowa: A collaborative contact-based watchdog for detecting selfish nodes. IEEE transactions on mobile computing. 2014;14(6):1162-75.
  7. Johnson D, Ntlatlapa NS, Aichele C (2008) Simple prag- matic approach to mesh routing using batman.2nd IFIP International Symposium on Wireless Communications and Information Technology in Developing Countries, CSIR, Pretoria, South Africa.
  8. Kannhavong B, Nakayama H, Kato N, Nemoto Y, Ja- malipour A.Analysis of the node isolation attack against olsr-based mobile ad hoc networks.In 2006 International Symposium on Computer Networks, IEEE, 2006:30-5.
  9. Kotla R, Dahlin M. High throughput byzantine fault tolerance. In 2004International Conference on Dependable Systems and Networks, IEEE. 2004:575-84.
  10. Kulla E, Ikeda M, Barolli L, Miho R. Impact of source and destination movement on manet performance considering batman and aodv protocols. In 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, IEEE. 2010:94-101.
  11. Kulla E, Ikeda M, Hiyama M, Barolli L, Miho R. Performance evaluation of olsr and batman protocols for vertical topology using indoor stairs testbed. In2011 International Conference on Broadband and Wireless Computing, Communication and Applications, IEEE. 2011:159-66.
  12. Kulla E, Hiyama M, Ikeda M, Barolli L. Performance comparison of OLSR and BATMAN routing protocols by a MANET testbed in stairs environment. Computers & Mathematics with Applications. 2012a;63(2):339-49.
  13. Kulla E, Ikeda M, Oda T, Barolli L, Xhafa F, Takizawa M. Multimedia transmissions over a manet testbed: problems and issues. In the6th International Conference on Complex, Intelligent, and Software Intensive Systems, IEEE. 2012b;141-147.
  14. Laube A, Martin S, Al Agha K. A solution to the split & merge problem for blockchain-based applications in ad hoc networks. In the 8th International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), IEEE. 2019;1-6.
  15. Liu G, Dong H, Yan Z, Zhou X, Shimizu S. B4SDC: A blockchain system for security data collection in MANETs. IEEE Transactions on Big Data. 2020.DOI: 10.1109/TBDATA.2020.2981438
  16. Lwin MT, Yim J, Ko YB.Blockchain-based lightweight trust management in mobile ad-hoc networks.Sensors. 2020;20(3):698.
  17. Machado C, Westphall CM. Blockchain incentivized data forwarding in manets: Strategies and challenges. Ad Hoc Networks. 2021;110:102321.
  18. Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehaviour in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking, 2000;255-265.
  19. NaOmar M, Challal Y, Bouabdallah A. Certification- based trust models in mobile ad hoc networks: A survey and taxonomy. Journal of Network and Computer Applications. 2012;35(1):268-286
  20. Peiris P, Rajapakse C, Jayawardena B. Blockchain-based distributed reputation model for ensuring trust in mobile adhoc networks. In 2020 International Research Conference on Smart Computing and Systems Engineering (SCSE), IEEE. 2020:51-56.
  21. Perkins C, Royer EM, Das S. Ad-hoc on demand distance Vector routing (AODV). 2003. http://media.gradebuddy.com/documents/3107203/4e440567-1f3b-4e47-8585-8d2c24b05758.pdf
  22. Sanchez-Iborra R, Cano MD, Garcia-Haro J. Performance evaluation of batman routing protocol for voip services: a qoe perspective. IEEE Transactions on Wireless Communications. 2014;13(9):4947-4958.


Other issues:
Vol.13(5)(2022)
Vol.13(4)(2022)
Vol.13(3)(2022)
Archives




Call-for-Papers

Call-for-Scientific Papers
Call-for-Research Papers:
ITJEMAST invites you to submit high quality papers for full peer-review and possible publication in areas pertaining engineering, science, management and technology, especially interdisciplinary/ cross-disciplinary/ multidisciplinary subjects.

To publish your work in the next available issue, your manuscripts together with copyright transfer document signed by all authors can be submitted via email to Editor @ TuEngr.com (please see all detail from Instructions for Authors)



Publication and peer-reviewed process:
After the peer-review process, articles will be on-line published in the available next issue. However, the International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies cannot guarantee the exact publication time as the process may take longer time, subject to peer-review approval and adjustment of the submitted articles.