Research Publications Authored by SLIIT Staff

Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4195

This collection includes all SLIIT staff publications presented at external conferences and published in external journals. The materials are organized by faculty to facilitate easy retrieval.

Browse

Search Results

Now showing 1 - 5 of 5
  • Thumbnail Image
    PublicationEmbargo
    SecAODV-Lightweight Authentication for AODV Protocol
    (International Journal of Computer Applications, 2016) Jayakody, A; Samarasinghe, R; Kodituwakku, S. R
    In nature of the transmission medium the broadcast, Wireless sensor networks are vulnerable to security attacks. The nodes are placed in a hostile or dangerous environment where they are not tangibly safe in the MANETs. In many application, the data obtained from the sensing nodes need a false, or malicious node could intercept private information or could send false messages to nodes in the network. Among the major attacks Eavesdropping, Spoof Attack, Denial of Service, Wormhole attack, Sinkhole attack, Sybil attack, Selective Forwarding attack, Passive information gathering, Node capturing, and False or malicious node, Hello flood attack are common. In this paper, authors have proposed and implemented an efficient light weighted authentication secure routing protocol on top of an AODV. The focused area of the proposed routing protocol is increasing the network security of the MANET. Additionally, the paper evaluates the implemented protocol using NS2 simulator in different networks with SecAODV.
  • Thumbnail Image
    PublicationEmbargo
    Improving trusted routing by identifying malicious nodes in a MANET using reinforcement learning
    (IEEE, 2017-09-06) Mayadunna, H; De Silva, S. L; Wedage, L; Pabasara, S; Rupasinghe, L; Liyanapathirana, C; Kesavan, K; Nawarathna, C; Sampath, K. K
    Mobile ad-hoc networks (MANETs) are decentralized and self-organizing communication systems. They have become pervasive in the current technological framework. MANETs have become a vital solution to the services that need flexible establishments, dynamic and wireless connections such as military operations, healthcare systems, vehicular networks, mobile conferences, etc. Hence it is more important to estimate the trustworthiness of moving devices. In this research, we have proposed a model to improve a trusted routing in mobile ad-hoc networks by identifying malicious nodes. The proposed system uses Reinforcement Learning (RL) agent that learns to detect malicious nodes. The work focuses on a MANET with Ad-hoc On-demand Distance Vector (AODV) Protocol. Most of the systems were developed with the assumption of a small network with limited number of neighbours. But with the introduction of reinforcement learning concepts this work tries to minimize those limitations. The main objective of the research is to introduce a new model which has the capability to detect malicious nodes that decrease the performance of a MANET significantly. The malicious behaviour is simulated with black holes that move randomly across the network. After identifying the technology stack and concepts of RL, system design was designed and the implementation was carried out. Then tests were performed and defects and further improvements were identified. The research deliverables concluded that the proposed model arranges for highly accurate and reliable trust improvement by detecting malicious nodes in a dynamic MANET environment.
  • Thumbnail Image
    PublicationOpen Access
    Efficient, Authentication and Access control Implementation in Mobile Ad hoc Networks (MANET) as applied to Indoor Navigation Guidance System for Vision Impaired People
    (2012 International Conference on Indoor Positioning and Indoor Navigation, 2012-11) Rupasinghe, P. L; Abhayasinghe, N; Murray, I
    Indoor navigation systems are becoming increasingly popular. Blind and Low Vision users are prominently in need of indoor positioning and navigating systems as indoor navigation is a significant issue. Most of the efforts in creating such systems are using MANET (Mobile Ad-hoc Networks) as the base technology. However the properties of MANET’s inherently provide greater challenges in areas like security, reliability and performance. Most of research work was done on those different challenges in isolation. A holistic approach to address all these challenges in an implementation appears to be rare. Ad-hoc collaboration is usually an unplanned interaction or created "immediately on the fly". In MANET networks Authentication and access-control trust relations established through, on-line- available evidence, may be short-term and largely peer-to-peer, where the peers may not necessarily have a relevant network that can be placed into a recognizable trust hierarchy. Trust relations involving a captured node need to be invalidated, and new trust evidence need to be collected and evaluated to maintain node connectivity in the ad-hoc network This paper present the framework on Trust Relations based on friendships mechanism which is adopted from the theory of small-world phenomenon (i.e. six degrees of separation) initiated by Milgram, to provide rapid authentication. Continuity Efficient, Rapid Authentication is needed in practical implementations of an Indoor navigation system. Particularly when Low vision users are dependent on such system, a rogue node can be hazardous. Further research delivers a framework which combines reliability and performance, two important factors in practical implementation of an indoor navigation system.
  • Thumbnail Image
    PublicationEmbargo
    Compromising AODV for better performance
    (Faculty of Graduate Studies and Research, 2017-01-26) Jayakody, A.; Paranavithana, P.
    MANETs became a principal research area as a promising routing protocol for a large scale of applications, due to its' behavior of self-configuring ability according to the infrastructure. Energy efficient in MANETs is a significant area in MANETs related researchers. Nodes in a MANET networks are basically battery operated, and thus have access to a limited amount of energy. The lack of energy can lead to a link failure during an active communication session, which affects the throughput and energy wastage due to a re-run of the algorithm. These papers presents a modified AODV algorithm, where a node calculates its residual energy and select the best path based on the existing matrices and total energy of the path. During the RREQ packet exchange, each node adds its residual energy to the packet and forwards it until it reaches the destination. At the destination, the total energy value is copied to the RREP packet from RREQ packet and sent to the source node through the reverse path. During the process of route selection, the path with the highest energy value gets the priority.
  • Thumbnail Image
    PublicationOpen Access
    Modified expanding ring search in common node scenario for AODV
    (Faculty of Graduate Studies and Research, 2017-01-26) Jawadul, A. S.; Jayakody, A.
    Mobile ad-hoc networks (MANET) are a collection of nodes without any static infrastructure. Ad-hoc networks establish connections between nodes without the help of centralized nodes but with the help of its neighbour nodes. The nodes are movable and can change its position frequently, so it maintains a dynamic interconnection between nodes in the network and adapts to dynamic topologies. MANETs are characterized by dynamic mobile nodes, with limited battery sourced power. These mobile nodes also act as routers taking its roles such as finding new routes, acting as an intermediate node, deciding best routes and keep a connection with mobile nodes. Any mobile node in the network can make the connection directly to any node within its transmission range, but due to its limited power, its transmission range also limited. Reactive routing protocols are effective than proactive routing protocols on MANETs since it can reduce extra overheads. However, reactive routing protocol suffers from excessive flooding in route discovery process. Authors focus on an existing solution called Expanding Ring Search (ERS) which decreases the flooding by manipulating Time to live (TTL) in AODV. ERS is also is inefficient in some scenarios. When the source is far from the destination ERS is worse than flooding [4]. Authors proposing a modification in ERS to avoid this problem which will make ERS efficient when the MANET consists a node (common node) that frequently accessed by most of the nodes.