Enhanced Trust Based Architecture in MANET using AODV Protocol to Eliminate Packet Dropping Attacks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2016 by IJETT Journal
Volume-34 Number-1
Year of Publication : 2016
Authors : R. Sathish Kumar, A. Aktharunissa, S. Koperundevi, S. Suganthi


R. Sathish Kumar, A. Aktharunissa, S. Koperundevi, S. Suganthi"Enhanced Trust Based Architecture in MANET using AODV Protocol to Eliminate Packet Dropping Attacks", International Journal of Engineering Trends and Technology (IJETT), V34(1),21-27 April 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

MANET is a multihop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time, without using any kind of fixed wired infrastructure. Secure routing is the milestone in mobile Adhoc networks. MANET is vulnerable to attacks from malicious nodes. The proposed trust scheme using AODV protocol calculates the trust between the nodes in MANET to detect and eliminate the malicious nodes from the transmission path. This technique calculates the trust value of all the nodes. It compares the trust values to detect and eliminate the malicious node from the transmission path. If the trust value is less than a trust threshold, the intermediate node is marked as malicious and rejected from the path. The packets are transmitted only through the nodes with high trust value. We experiment this by NS2 with better accuracy.


[1] Tao Shu and Marwan Krunz, ―Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks, IEEE Transactions on mobile computing, Vol. 14, No. 4, April 2015
[2] Sonja Buchegger, Jean-Yves Le Boudec, ―A Robust Reputation System for Mobile Ad-hoc Networks, EPFL IC Technical report IC 2003
[3] G.S. Mamatha, Dr. S.C. Sharma, ―Network Layer Attacks and Defense Mechanisms in MANETS- A Survey, International Journal of Computer Applications Volume 9– No.9, November 2010 [12] Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, ―Mobile ad hoc networking: imperatives and challenges, ScienceDirect Ad Hoc Networks 1 (2003) pp 13–64.
[4] Yacine Rebahi, Vicente .E Mujica-V and Dorgham Sisalem, ―A Reputation-Based Trust Mechanism for Ad hoc Networks, proceedings of IEEE symposium on computers and communications 2005.
[5] Rajan Shankaran, Vijay Varadharajan, Mehmet A. Orgun, and Michael Hitchens, ―Critical Issues in Trust Management for Mobile AdHoc Networks, Information Reuse and Integration,IEEE 2009.
[6] Jaydip Sen, ―A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks, Computer Research Repository of IEEE 2010.
[7] Hui Xiaa, Zhiping Jiaa, Xin Lia, Lei Jua, Edwin H.-M. Shab, ―Trust prediction and trust-based source routing in mobile ad hoc networks, ScienceDirect Ad hoc Networks 6 (2010).
[8] R. Sathish Kumar and S. Pariselvam , ―Formative Impact of Gauss Markov Mobility Model on Data Availability in MANET, Asian Journal of Information Technology 11(3): 108-116 ,2012.
[9] Ramprasad Kumawat and Vinay Somani ―Comparative Study of On -demand Routing Protocols for Mobile Adhoc Network, International Journal of Computer Applications Volume 27– No.10, August 2011.
[10] Vijayan R, Mareeswari V and Ramakrishna K, ―Energy based Trust solution for Detecting Selfish Nodes in MANET using Fuzzy logic, International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 3, June 2011 pp 647-652.
[11] Ji Guo , Alan Marshall, Bosheng Zhou, ―A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad hoc Networks‖, 2011 International Joint Conference of IEEE.
[12] Manoj V, Mohammed Aaqib ,Raghavendiran N and Vijayan R ―A Novel Security Framework Using Trust and Fuzzy Logic in MANET, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012.
[13] Pankaj Sharma and Yogendra Kumar Jain, TRUST based Secure AODV in MANET, Journal of Global Research in Computer Science Volume 3, No. 6, June 2012..
[14] C. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable data possession at untrusted stores, in Proc. ACM Conf. Comput. and Commun. Secur., Oct. 2007, pp. 598–610
[15] G. Ateniese, S. Kamara, and J. Katz, ―Proofs of storage from homomorphic identification protocols, in Proc. Int. Conf. Theory Appl. Cryptol. Inf. Security, 2009, pp. 319– 333.
[16] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, ―ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks, ACM Trans. Inf. Syst. Secur., vol. 10, no. 4, pp. 11–35, 2008.
[17] K. Balakrishnan, J. Deng, and P. K. Varshney, ―TWOACK: Preventing selfishness in mobile ad hoc networks, in Proc. IEEE Wireless Commun. Netw. Conf., 2005, pp. 2137–2142.
[18] D. Boneh, B. Lynn, and H. Shacham, ―Short signatures from the weil pairing, J. Cryptol., vol. 17, no. 4, pp. 297– 319, Sep. 2004.

Mobile Ad hoc Networks (MANETs), Ad-hoc On-demand Distance Vector (AODV), trust value, malicious node, PDP, Homomorphic linear authenticator (HLA), Proofs of storage (PoS).