Trust framework for attack resilience in MANET using AODV

被引:9
|
作者
Wadhwani, Ganesh Kumar [1 ]
Khatri, Sunil Kumar [2 ]
Mutto, S. K. [3 ]
机构
[1] Guru Gobind Singh Indraprastha Univ, Inst Innovat Technol & Management, Dept Comp Sci, New Delhi 110058, India
[2] Amity Univ Tashkent, Tashkent, Uzbekistan
[3] Univ Delhi, Dept Comp Sci, New Delhi 110007, India
关键词
MANET; Trust; Route Discovery; AODV; Blackhole Attack; MECHANISM;
D O I
10.1080/09720529.2020.1721885
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Mobile Ad-hoc network (MANET) is a collection of arbitrary moving autonomous nodes having routing capabilities. Theoretically, nodes are expected to cooperate with each other to facilitate communication with not directly connected nodes but in real scenario some of the nodes may be malicious. These compromised /malicious nodes may be part of the network or any other node trying to intrude in the network. A trust based framework is proposed in this paper to make the network resilient to malicious nodes. Trust is calculated using route request and route reply counter to make it simple and scalable. Ad Hoc OnDemand Distance Vector (AODV) routing protocol is used as the basic protocol. Performance analysis is done by varying malicious node density and calculating packet loss & average packet delay. It shows that the proposed framework along with trust calculating mechanism is giving better results as compared to basic routing protocol AODV in the presence of malicious nodes.
引用
下载
收藏
页码:209 / 220
页数:12
相关论文
共 50 条
  • [31] Avoidance of Co-operative black hole attack in AODV in MANET
    Thakker, Jay
    Desai, Jagruti
    Ragha, Lata
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1049 - 1053
  • [32] Advanced AODV Approach For Efficient Detection And Mitigation Of WORMHOLE Attack IN MANET
    Ghayvat, H.
    Pandya, S.
    Shah, S.
    Mukhopadhyay, S. C.
    Yap, M. H.
    Wandra, K. H.
    2016 10TH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST), 2016,
  • [33] AODV-Based Secure Routing Against Blackhole Attack in MANET
    Deshmukh, Sagar R.
    Chatur, P. N.
    Bhople, Nikhil B.
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1960 - 1964
  • [34] Enhancing Security Features & Performance of AODV Protocol under Attack for MANET
    Soni, Sunil J.
    Nayak, Suketu D.
    2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, : 325 - 328
  • [35] Energy and Trust Management Framework for MANET using Clustering Algorithm
    Gopala Krishnan, C.
    Nishan, A. H.
    Gomathi, S.
    Aravind Swaminathan, G.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (02) : 1267 - 1281
  • [36] Energy and Trust Management Framework for MANET using Clustering Algorithm
    C. Gopala Krishnan
    A. H. Nishan
    S. Gomathi
    G. Aravind Swaminathan
    Wireless Personal Communications, 2022, 122 : 1267 - 1281
  • [37] Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack
    Chavan, A. A.
    Kurule, D. S.
    Dere, P. U.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 835 - 844
  • [38] Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR
    Tripathi, Shripriya
    2019 5TH IEEE INTERNATIONAL WIE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (WIECON-ECE 2019), 2019,
  • [39] Analysis and Prevention of Wormhole Attack Using Trust And Reputation Management Scheme in MANET
    Parbin, Shabina
    Mahor, Leeladhar
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 225 - 228
  • [40] Black Hole Attack Detection in MANET Using Mobile Trust Points with Clustering
    Singh, Manjeet
    Singh, Prabhdeep
    SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 565 - 572