Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol

被引:7
|
作者
Vanitha, K. [1 ]
Rahaman, A. M. J. Zubair [2 ]
机构
[1] Al Ameen Engn Coll, Dept CSE, Erode, Tamil Nadu, India
[2] Al Ameen Engn Coll, Erode, Tamil Nadu, India
关键词
Packet dropping; Secure protocol; Detection efficiency; HLA; Malicious nodes; PRF;
D O I
10.1007/s10586-018-1958-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
MANETs have grown into a usually used network for countless applications. Mostly, a transmission medium perspective undergoes with thoughtful security worries, which may be focused to packet dropping. In the network, when packet forward the drooping of valuable packets may occur due to the presence of malicious nodes. The major sources in MANET for packet losses are malicious packet dropping and link error. A node can perform unkindly and could harm the process of sending the packet. In order to overcome the issues and to have an efficient detection process of malicious drop with better secure performances, the improved failure aware third party Auditor (IFTPA) based homomorphism linear authenticator (HLA) mechanism (IFHM) is proposed with the secured ad hoc on demand distance vector (SAODV). The proposed approach permitsthe trustworthiness verification of packet loss information and malicious node detection by dropping identifying of routing and data packet. Packet dropping is because of the both link error and occurrence of malicious nodes, which can identify by SAODV. To make certain efficiency, the authentication service is implemented in the protocol. However, to succeed storage scalability, the protocol implements the pseudo random function (PRF) in the system to fix the secret key of a client to its uniqueness using the secret key of its server.
引用
收藏
页码:13453 / 13461
页数:9
相关论文
共 50 条
  • [31] FSM based Intrusion Detection of Packet Dropping Attack using Trustworthy Watchdog Nodes
    Chandan R.R.
    Mishra P.K.
    Recent Advances in Computer Science and Communications, 2021, 14 (09) : 2817 - 2827
  • [32] An Efficient Cluster based Routing Protocol for MANET
    Sharma, Dhirendra Kumar
    Kumar, Chiranjeev
    Mandal, Surajit
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 224 - 229
  • [33] Hop distance based routing protocol for MANET
    Cuckov, Filip
    Song, Min
    2007 IEEE 66TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2007, : 11 - 15
  • [34] MANET Routing Protocol for Improving Routing Discovery Based on AODV
    Zhang Jianwu
    Zou Jingyuan
    Zhao Qi
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 197 - 200
  • [35] Anomaly Detection in MANET Using Zone Based AODV Routing Protocol
    Lakshmi, G. S. Prasanna
    Patil, Shantakumar B.
    Patil, Premjyothi
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 454 - 468
  • [36] Manet node based mobile gateway with unspecific manet routing protocol
    Mo, Yijun
    Huang, Jing
    Huang, Benxiong
    2006 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES,VOLS 1-3, 2006, : 71 - +
  • [37] Detection of malicious packet dropping attacks in RPL-based internet of things
    Shin, Sooyeon
    Kim, Kyounghoon
    Kwon, Taekyoung
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 31 (02) : 133 - 141
  • [38] Performance analysis of modified on-demand multicast routing protocol for MANET using non forwarding nodes
    Benazer, S. Sakena
    Dawood, M. Sheik
    Suganya, G.
    Ramanathan, Sulochanan Karthick
    MATERIALS TODAY-PROCEEDINGS, 2021, 45 : 2603 - 2605
  • [39] The advanced wireless sensor networks' routing protocol to detect malicious nodes and behavior
    Arab, Anoushe
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2023, 46 (07) : 805 - 812
  • [40] Performance of Secured Zone Routing Protocol due to the Effect of Malicious Nodes in MANETs
    Ravilla, Dilli
    Putta, Chandra Shekar Reddy
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,