An Efficient and Secure Routing in MANET using Trust Model
An Efficient and Secure Routing in MANET using Trust Model |
||
|
||
© 2022 by IJETT Journal | ||
Volume-70 Issue-9 |
||
Year of Publication : 2022 | ||
Authors : Anugraha, Krishnaveni |
||
DOI : 10.14445/22315381/IJETT-V70I9P232 |
How to Cite?
Anugraha, Krishnaveni, "An Efficient and Secure Routing in MANET using Trust Model" International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 330-336, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I9P232
Abstract
MANET is utilised in various applications due to its ability to the faster establishment of networks. The network
will run well if mobile nodes trust one another and collaborate. Routing is difficult, and vulnerabilities are regularly exposed
due to the frequent connection failures and dynamic topology induced by node mobility. As a consequence, security
measures that can reduce the impacts of multiple assaults should be included in the MANET's routing. This research
proposes a node trust evaluation approach based on cluster structure and a trust-based model security routing (TSR). The
proposed technique used a hierarchical structure to improve the efficiency of node reliability evaluation. Because it assures
node reliability evaluation, path establishment between nodes, and safe data exchange, the proposed method in this research
can sustain network performance in the presence of hostile nodes. The integrity of data transfer is increased via node-tonode key exchange without CA. The suggested trust-based model security routing strategy outperformed the competition
regarding packet delivery ratio, throughput, average delay, and packet loss.
Keywords
Adhoc, MANET, Trust, Routing, Performance.
Reference
[1] K. Sumathi, and A. Priyadharshini, “Energy Optimization in Manets using on-Demand Routing Protocol,” Procedia Computer
Science, vol. 47, pp. 460-470, 2015.
[2] M. Malathi, and S.Jayashri, “Robust against Route Failure using Power Proficient Reliable Routing in MANET,” Alexandria
Engineering Journal, vol. 57, no. 1, pp. 11-21, 2018.
[3] S.Chavhan, P. Venkataram, “Emergent Intelligence Based Qos Routing in MANET,” Procedia Computer Science, vol. 52, pp. 659-
664, 2015.
[4] A.Koul, and H.Kaur, “Quality of Service Oriented Secure Routing Model for Mobile Ad Hoc Networks,” in Proceedings of the 2017
International Conference on Intelligent Systems, Metaheuristics& Swarm Intelligence, pp. 88-92, 2017.
[5] S. N. Shah, and R. H. Jhaveri, “A Trust-Based Scheme Against Packet Dropping Attacks in Manets,” in 2nd International
Conference on Applied and Theoretical Computing and Communication Technology, iCATccT, pp. 68-75, 2016.
[6] R. H. Jhaveri, N. M. Patel, D. C. Jinwala, J. H. Ortiz, and A. P. de la Cruz, “A Composite Trust Model for Secure Routing in Mobile
Ad-Hoc Networks,” Ad Hoc Networks, vol. 2, pp. 19-45, 2017.
[7] G. Singal, V.Laxmi, M. S. Gaur, S. Todi, V. Rao, M. Tripathi, and R.Kushwaha, “Multi-Constraints Link Stable Multicast Routing
Protocol in Manets,” Ad Hoc Networks, vol. 63, pp. 115-128, 2017.
[8] Y. M. Khamayseh, S. A. Aljawarneh, and A. E. Asaad, “Ensuring Survivability Against Black Hole Attacks in MANETS for
Preserving Energy Efficiency, Sustainable Computing,” Informatics and Systems, vol. 18, pp. 90-100, 2018.
[9] P. S. Rajendra Prasad, “Efficient Performance Analysis of Energy Aware on Demand Routing Protocol in Mobile Ad-Hoc Network,”
Engineering Reports, vol. 2, no. 3, pp. 1-14, 2019.
[10] N. M. Quy, N. T. Ban, and V. K. Quy, “An Adaptive on-Demand Routing Protocol with Qos Support for Urban-Manets,” IAENG
International Journal of Computer Science, vol. 49, no. 1, pp. 1-8, 2022.
[11] R. K. Sahu, and N. S. Chaudhari, “Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique,” Electronics,
vol. 7, no. 5, pp. 56, 2018.
[12] H. H. Choi, and J. R. Lee, “Local Flooding-Based on-Demand Routing Protocol for Mobile Ad Hoc Networks,” IEEE Access, vol. 7,
pp. 85937-85948, 2019.
[13] H. N. Saha, and P.Mitra, “Intelligent Energy Aware Fidelity Based on-Demand Secure Routing Protocol for MANET,” International
Journal of Computer Network & Information Security, vol. 10, no. 4, pp. 48-64, 2018.
[14] S. K. Duvvuri, and S.Ramakrishna, “Adaptive Neuro-Fuzzy Inference System Based on-Demand Fault Tolerant Routing Protocol
(ANFIS-ODFTR) for Manets,” International Journal of Computer Networks and Applications, vol. 8, no. 6, pp. 719-729, 2021.
[15] R. Hinge, and J. Dubey, “Opinion Based Trusted AODV Routing Protocol for MANET,” in Proceedings of the Second International
Conference on Information and Communication Technology for Competitive Strategies, pp. 1-5, 2016.
[16] A. Koul, and H.Kaur, “Quality of Service Oriented Secure Routing Model for Mobile Ad Hoc Networks,” In Proceedings of the
International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 88-92, 2017.
[17] S. Gurung, and S.Chauhan, “A Novel Approach for Mitigating Route Request Flooding Attack in MANET,” Wireless Networks, vol.
24, no. 8, pp. 2899-2914, 2018.
[18] H. Ehsan, and F. A. Khan, “Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs,” in 2012 IEEE 11th
International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1181-1187, 2012.
[19] P. Choudhury, S. Nandi, A. Pal, and N. C. Debnath, “Mitigating Route Request Flooding Attack in MANET using Node
Reputation,” in IEEE 10th International Conference on Industrial Informatics, pp. 1010-1015, 2012.
[20] V. Laxmi, D. Mehta, M. S. Gaur, P.Faruki, and C. Lal, “Impact Analysis of JellyFish Attack on TCP-based Mobile Ad-Hoc
Networks,” in Proceedings of the 6th International Conference on Security of Information and Networks, pp. 189-195, 2013.
[21] B. P. Pooja, M. P. Manish, and B. P. Megha, “Jellyfish Attack Detection and Prevention in MANET,” in 2017 Third International
Conference on Sensing, Signal Processing and Security (ICSSS), pp. 54-60, 2017.
[22] D. Bhawsar, and A. Suryavanshi, “Collaborative Intrusion Detection and Prevention Against Jellyfish Attack in MANET,”
International Journal of Computer Applications, vol. 129, no. 13, pp. 37-42, 2015.
[23] M. Abu Zant, and A.Yasin, “Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol AIF_AODV,” Security
and Communication Networks, vol. 2019, pp. 1-13, 2019.
[24] Z. A. Zardari, J. He, M. S.Pathan, S. Qureshi, M. I. Hussain, F.Razaque, and N.Zhu, “Detection and Prevention of Jellyfish Attacks
Using KNN Algorithm and Trusted Routing Scheme in Manet,” International Journal of Network Security, vol. 23, no. 1, pp. 77-87,
2021.
[25] A. Al Sharah, T. Oyedare, and S. Shetty, “Detecting and Mitigating Smart Insider Jamming Attacks in Manets Using ReputationBased Coalition Game,” Journal of Computer Networks and Communications, vol. 2016, pp. 1-14, 2016.
[26] K. Manojkumar, S. Devi, "Jamming Attack in Wireless Sensor Networks using Ant Colony Algorithm," SSRG International Journal
of Computer Science and Engineering, vol. 8, no. 2, pp. 6-9, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSEV8I2P102
[27] M.Supriya, Dr.T.Adilakshmi, "Secure Routing using ISMO for Wireless Sensor Networks," SSRG International Journal of
Computer Science and Engineering, vol. 8, no. 12, pp. 14-20, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSEV8I12P103
[28] S Yasaswini, G.M.Naik, P G K Sirisha, "Efficient Loss Recovery in Ad Hoc Networks," SSRG International Journal of Computer
Science and Engineering, vol. 4, no. 1, pp. 1-7, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I1P101
[29] Nelesh Sharma, Dr. NirupamaTiwari, "Implementation of Multipath AODV for Enhanced Performance in Wireless Ad hoc
Network," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 9, pp. 15-19, 2019.
Crossref, https://doi.org/10.14445/23488387/IJCSE-V6I9P104.