An Efficient and Secure Routing in MANET using Trust Model

An Efficient and Secure Routing in MANET using Trust Model

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-9
Year of Publication : 2022
Authors : Anugraha, Krishnaveni
DOI : 10.14445/22315381/IJETT-V70I9P232

How to Cite?

Anugraha, Krishnaveni, "An Efficient and Secure Routing in MANET using Trust Model" International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 330-336, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I9P232

Abstract
MANET is utilised in various applications due to its ability to the faster establishment of networks. The network will run well if mobile nodes trust one another and collaborate. Routing is difficult, and vulnerabilities are regularly exposed due to the frequent connection failures and dynamic topology induced by node mobility. As a consequence, security measures that can reduce the impacts of multiple assaults should be included in the MANET's routing. This research proposes a node trust evaluation approach based on cluster structure and a trust-based model security routing (TSR). The proposed technique used a hierarchical structure to improve the efficiency of node reliability evaluation. Because it assures node reliability evaluation, path establishment between nodes, and safe data exchange, the proposed method in this research can sustain network performance in the presence of hostile nodes. The integrity of data transfer is increased via node-tonode key exchange without CA. The suggested trust-based model security routing strategy outperformed the competition regarding packet delivery ratio, throughput, average delay, and packet loss.

Keywords
Adhoc, MANET, Trust, Routing, Performance.

Reference
[1] K. Sumathi, and A. Priyadharshini, “Energy Optimization in Manets using on-Demand Routing Protocol,” Procedia Computer Science, vol. 47, pp. 460-470, 2015.
[2] M. Malathi, and S.Jayashri, “Robust against Route Failure using Power Proficient Reliable Routing in MANET,” Alexandria Engineering Journal, vol. 57, no. 1, pp. 11-21, 2018.
[3] S.Chavhan, P. Venkataram, “Emergent Intelligence Based Qos Routing in MANET,” Procedia Computer Science, vol. 52, pp. 659- 664, 2015.
[4] A.Koul, and H.Kaur, “Quality of Service Oriented Secure Routing Model for Mobile Ad Hoc Networks,” in Proceedings of the 2017 International Conference on Intelligent Systems, Metaheuristics& Swarm Intelligence, pp. 88-92, 2017.
[5] S. N. Shah, and R. H. Jhaveri, “A Trust-Based Scheme Against Packet Dropping Attacks in Manets,” in 2nd International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT, pp. 68-75, 2016.
[6] R. H. Jhaveri, N. M. Patel, D. C. Jinwala, J. H. Ortiz, and A. P. de la Cruz, “A Composite Trust Model for Secure Routing in Mobile Ad-Hoc Networks,” Ad Hoc Networks, vol. 2, pp. 19-45, 2017.
[7] G. Singal, V.Laxmi, M. S. Gaur, S. Todi, V. Rao, M. Tripathi, and R.Kushwaha, “Multi-Constraints Link Stable Multicast Routing Protocol in Manets,” Ad Hoc Networks, vol. 63, pp. 115-128, 2017.
[8] Y. M. Khamayseh, S. A. Aljawarneh, and A. E. Asaad, “Ensuring Survivability Against Black Hole Attacks in MANETS for Preserving Energy Efficiency, Sustainable Computing,” Informatics and Systems, vol. 18, pp. 90-100, 2018.
[9] P. S. Rajendra Prasad, “Efficient Performance Analysis of Energy Aware on Demand Routing Protocol in Mobile Ad-Hoc Network,” Engineering Reports, vol. 2, no. 3, pp. 1-14, 2019.
[10] N. M. Quy, N. T. Ban, and V. K. Quy, “An Adaptive on-Demand Routing Protocol with Qos Support for Urban-Manets,” IAENG International Journal of Computer Science, vol. 49, no. 1, pp. 1-8, 2022.
[11] R. K. Sahu, and N. S. Chaudhari, “Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique,” Electronics, vol. 7, no. 5, pp. 56, 2018.
[12] H. H. Choi, and J. R. Lee, “Local Flooding-Based on-Demand Routing Protocol for Mobile Ad Hoc Networks,” IEEE Access, vol. 7, pp. 85937-85948, 2019.
[13] H. N. Saha, and P.Mitra, “Intelligent Energy Aware Fidelity Based on-Demand Secure Routing Protocol for MANET,” International Journal of Computer Network & Information Security, vol. 10, no. 4, pp. 48-64, 2018.
[14] S. K. Duvvuri, and S.Ramakrishna, “Adaptive Neuro-Fuzzy Inference System Based on-Demand Fault Tolerant Routing Protocol (ANFIS-ODFTR) for Manets,” International Journal of Computer Networks and Applications, vol. 8, no. 6, pp. 719-729, 2021.
[15] R. Hinge, and J. Dubey, “Opinion Based Trusted AODV Routing Protocol for MANET,” in Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, pp. 1-5, 2016.
[16] A. Koul, and H.Kaur, “Quality of Service Oriented Secure Routing Model for Mobile Ad Hoc Networks,” In Proceedings of the International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 88-92, 2017.
[17] S. Gurung, and S.Chauhan, “A Novel Approach for Mitigating Route Request Flooding Attack in MANET,” Wireless Networks, vol. 24, no. 8, pp. 2899-2914, 2018.
[18] H. Ehsan, and F. A. Khan, “Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs,” in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1181-1187, 2012.
[19] P. Choudhury, S. Nandi, A. Pal, and N. C. Debnath, “Mitigating Route Request Flooding Attack in MANET using Node Reputation,” in IEEE 10th International Conference on Industrial Informatics, pp. 1010-1015, 2012.
[20] V. Laxmi, D. Mehta, M. S. Gaur, P.Faruki, and C. Lal, “Impact Analysis of JellyFish Attack on TCP-based Mobile Ad-Hoc Networks,” in Proceedings of the 6th International Conference on Security of Information and Networks, pp. 189-195, 2013.
[21] B. P. Pooja, M. P. Manish, and B. P. Megha, “Jellyfish Attack Detection and Prevention in MANET,” in 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS), pp. 54-60, 2017.
[22] D. Bhawsar, and A. Suryavanshi, “Collaborative Intrusion Detection and Prevention Against Jellyfish Attack in MANET,” International Journal of Computer Applications, vol. 129, no. 13, pp. 37-42, 2015.
[23] M. Abu Zant, and A.Yasin, “Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol AIF_AODV,” Security and Communication Networks, vol. 2019, pp. 1-13, 2019.
[24] Z. A. Zardari, J. He, M. S.Pathan, S. Qureshi, M. I. Hussain, F.Razaque, and N.Zhu, “Detection and Prevention of Jellyfish Attacks Using KNN Algorithm and Trusted Routing Scheme in Manet,” International Journal of Network Security, vol. 23, no. 1, pp. 77-87, 2021.
[25] A. Al Sharah, T. Oyedare, and S. Shetty, “Detecting and Mitigating Smart Insider Jamming Attacks in Manets Using ReputationBased Coalition Game,” Journal of Computer Networks and Communications, vol. 2016, pp. 1-14, 2016.
[26] K. Manojkumar, S. Devi, "Jamming Attack in Wireless Sensor Networks using Ant Colony Algorithm," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 2, pp. 6-9, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSEV8I2P102
[27] M.Supriya, Dr.T.Adilakshmi, "Secure Routing using ISMO for Wireless Sensor Networks," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 12, pp. 14-20, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSEV8I12P103
[28] S Yasaswini, G.M.Naik, P G K Sirisha, "Efficient Loss Recovery in Ad Hoc Networks," SSRG International Journal of Computer Science and Engineering, vol. 4, no. 1, pp. 1-7, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I1P101
[29] Nelesh Sharma, Dr. NirupamaTiwari, "Implementation of Multipath AODV for Enhanced Performance in Wireless Ad hoc Network," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 9, pp. 15-19, 2019. Crossref, https://doi.org/10.14445/23488387/IJCSE-V6I9P104.