Skip to main content

2016 | OriginalPaper | Buchkapitel

Trust Appraisal Based Neighbour Defense Secure Routing to Mitigate Various Attacks in Most Vulnerable Wireless Ad hoc Network

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Mobile Ad hoc network is the most growing field as it is dynamic in nature and requires no central authority to manage it. In this paper we have worked on routing layer of MANET. We have worked upon AODV (Ad hoc on-demand distance vector) routing protocol. In this paper we have developed a very vulnerable network and a number of attackers and also modified AODV with our trust-based approach. To the best of our knowledge no one has implemented strong attackers and prevented them. In our approach each node monitors its neighbours’ activities and develops a trust table which in turn is very difficult to maintain when there is no cooperation between nodes. Based on the trust table it decides whether to eliminate the attacker. We have also optimized HELLO packet of AODV in such a way that it propagates information about malicious node among other available nodes and isolates the attacker from the entire network. At the end we present the results which clearly show that proposed protocols perform better than AODV in vulnerable situation. To evaluate the performance, we have carried out an extensive simulation study of AODV and modified AODV using NS2.35 with and without attacker showing significant improvement in Packet Delivery Fraction (PDF), Packet Drop Ratio (PDR), Average Throughput (AT), Normalized Routing Load (NRL) and E2E (Average End-2-End delay).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ad-hoc-mobile-wireless-networks-principles-protocols-and-applications—By Subir Kumar Sarkar and Basavraju. February 5, 2013 by CRC Press Reference—349 Pages—ISBN 9781466514461 Ad-hoc-mobile-wireless-networks-principles-protocols-and-applications—By Subir Kumar Sarkar and Basavraju. February 5, 2013 by CRC Press Reference—349 Pages—ISBN 9781466514461
2.
Zurück zum Zitat Gandhi, S., Chaubey, S., Tada, N., Trivedi, S.: Scenario-based performance comparison of reactive, proactive & hybrid protocols in MANET. In: 2nd IEEE International Conference on Computer Communication and Informatics (ICCCI-2012), 10–12, January 2012 Gandhi, S., Chaubey, S., Tada, N., Trivedi, S.: Scenario-based performance comparison of reactive, proactive & hybrid protocols in MANET. In: 2nd IEEE International Conference on Computer Communication and Informatics (ICCCI-2012), 10–12, January 2012
3.
Zurück zum Zitat Perkins, C.E., Royer, E.M., Das, S.R.: Ad-hoc on-demand distance vector routing. In: Proceedings of the International Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90–100 (1999) Perkins, C.E., Royer, E.M., Das, S.R.: Ad-hoc on-demand distance vector routing. In: Proceedings of the International Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90–100 (1999)
5.
Zurück zum Zitat Zapata, M.G., Asokan, N.: Securing Ad hoc routing protocols, In: Proc. 1st ACM Workshop on Wireless Security, pp. 1–10 (2002) Zapata, M.G., Asokan, N.: Securing Ad hoc routing protocols, In: Proc. 1st ACM Workshop on Wireless Security, pp. 1–10 (2002)
7.
Zurück zum Zitat Pirzada, A.A., McDonald, C., Datta, A.: Performance comparison of trust-based reactive routing protocols. IEEE Trans. Mobile Comput. 5(6), 695–710 (2006)CrossRef Pirzada, A.A., McDonald, C., Datta, A.: Performance comparison of trust-based reactive routing protocols. IEEE Trans. Mobile Comput. 5(6), 695–710 (2006)CrossRef
8.
Zurück zum Zitat Goyal, Priyanka: S.B., Singh, A.: A literature review of security attack in mobile Ad-hoc networks. Int. J. Comput. Appl. 9(12), 0975–8887 (2010) Goyal, Priyanka: S.B., Singh, A.: A literature review of security attack in mobile Ad-hoc networks. Int. J. Comput. Appl. 9(12), 0975–8887 (2010)
Metadaten
Titel
Trust Appraisal Based Neighbour Defense Secure Routing to Mitigate Various Attacks in Most Vulnerable Wireless Ad hoc Network
verfasst von
Tada Naren
Patalia Tejas
Patel Chirag
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-30933-0_33

Premium Partner