Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ABSTRACT
computing trust value of the node of MANET. The
Mobile ad hoc Network (MANET) is a collection of
approach uses generation of dummy packets by the
network devices which are connected through the
source node and send to the destination node. Problem
wireless links. It is used to exchange the information.
is taken as, to develop an approach that can secure and
Thus in order to make the communication in MANET
enhance the performance of Reactive Routing Protocol
more secure we are exploring an approach based on
family.
trust method to secure MANETs against attacks such as
black hole attack, gray hole and DOS attack. The
Key Words: Key Words: MANET, Black Hole Attack,
proposed approach detects malicious node by
Gray Hole Attack, DOS Attack, Trust Computation
2. Preparations of variance (threshold) values. On the basis of the assigned weight for the network
nodes we select the node as next hop node. The
3. Computations of trust of routing nodes. selection of next node is performed which has the
max weight or trust. This process is taken place after
4. Supporting the one hop acknowledgment a specified time interval. This process is repeated for
and reply. all the network nodes but when any node continue 3
times find below the threshold limit then the node is
5. Find the secure path. added to the blacklist and permanently block that
node communication for the whole network.
4. Proposed Technique
5. Results Analysis End to end delay on network refers to the time taken
for a packet to be transmitted across a network from
Different performance parameters of the proposed source to destination device. In order to simulate the
network security technique are reported in this performance X axis contains the malicious nodes and
section. the Y axis contains the end to end delay in terms of
milliseconds. According to the obtained performance
5.1 End to End Delay of the networks the proposed algorithm consumes
less time for propagation of data as compared to the
traditional routing protocol under attack conditions.
5.2 Throughput
comparative throughput of the two different
It is defined as packets delivered over the total configurations under attack condition is simulated in
simulation time. It is the usual rate of successful these diagram the X axis contains the malicious
delivery of a message over a communication nodes and Y axis contains the throughput of the
medium. The throughput is measured in the form of network according to the obtained results the
bits or bps, and occasionally is measured in the form throughput of the proposed algorithm is much
of data packets per time slot or data packets per efficient than the traditional routing technique.
second. The
5.3 Packet Delivery Ratio Given diagram shows the performance of the
Packet delivery ratio (PDR) provides information networks under attack conditions in terms of PDR. In
about the performance of any routing protocols, this diagram the X axis contains malicious nodes and
where PDR is estimated using the formula given [5] the Y axis contains the PDR in terms of percentage.
According to the obtained results the performance of
the proposed algorithm is much better in attack
conditions.
5.4 Broadcasting Request in DOS Attack Y axis contains no of request send. According to the
Given diagram shows the performance of the obtained performance of the network the proposed
networks under attack conditions in terms of total algorithm consumes less broadcasting request for
broadcasting request in simulation time. In this packet as compared to the traditional routing protocol
diagram the X axis contains malicious nodes and the under attack conditions.
5.5 Proposed Integrated Routing Protocol end delay, packet delivery ratio, throughput is
The implementation of the proposed integrated expected and compared with the traditionally
routing protocol is performed in NS 2 environment. available routing protocol. The performance
the generated trace files the performance outcomes summaries of the implemented integrated routing
are evaluated. During results evaluation the end to protocols are given using table 2 & 3.
Thus in order to investigate the security issues there The implementation of the proposed routing protocol
are a number of research articles are explored and the is performed in network simulator 2 environment and
attacks and their effect in network are studied. After using the generated trace files the performance
that a crucial attack namely black hole, gray hole, outcomes are evaluated. During results evaluation the
DOS attack is selected for finding the effective end to end delay, packet delivery ratio, throughput
solution. Thus using the AODV routing protocol and routing overhead is expected and compared with
improvement a new secure routing protocol is the traditionally available routing protocol. The
developed. The proposed secure routing protocol first performance outcomes demonstrate the effectiveness
evaluates the network characteristics and using the of the proposed routing protocol as compared to other
network behavior the threshold (variance) values are methods available. According to the given
estimated then it compare with node’s PDR. These performance summary the proposed routing protocol
threshold values are used for taking decisions in is much adoptable as compared to the traditional
network for discovering the secure path which protect routing protocols.
from Black hole, Gray hole and DOS attack in
network.
7. References
[1] A. Boukerch, L. Xu and K. EL-Khatib, “ Trust-based [6] A. Jain and V. Tokekar. Classification of denial of service
security for wireless ad hoc and sensor networks ” attacks in mobile ad hoc networks. In Proceedings of
Computer Communications, no. 30, pp. 2413–2427, 2007. International Conference on Computational Intelligence
[2] Kannan Govindan, Member IEEE and Prasant and Communication Networks (CICN), pages 256–261,
Mohapatra, “ Trust Computations and Trust Dynamics in 2011.
Mobile Adhoc Networks: A Survey ” IEEE [7] Perkins, C. Belding-Royer, E. Das, “ Adhoc on- Demand
COMMUNICATIONS SURVEYS & TUTORIALS, Distance Vector (AODV) Routing” ,July 2003.
VOL. 14, NO. 2, SECOND QUARTER 2012 279, 1553- [9] L. Tamilselvan, and V. Sankarnarayanam, “ Preventing of
877X/12/$31.00 c_ 2012 IEEE. Blackhole Attack in MANET ”. The Second International
[3] Nikita Verma, Ashish kumar jain, “Trust Management in Conference on Wireless Broadband and Ultra Wideband
mobile ad hoc networks : A Survey ” International Communication 2007,vol, no, pp21,Sydney.
Conference on Electronics, Communication & Aerospace [1 Ashish Kumar Jain, Vrinda Tokekar, “Security
Technology (ICECA 2017) 453-458 IEEE 21-22 April, 0] Enhancement in MANETs using Fuzzy based Trust
2017 Coimbatore. Computation against Black hole Attacks” International
Congress on Information Communication Technology
[4] Ravi Parihar, Ashish Jain, “Support Vector Machine (ICICT), 11-12 December, 2016 Bangkok.
through Detecting Packet Dropping Misbehaving Nodes [1 Shweta Shah, Madhu Sharma, Ashish Jain, “Wormhole
in MANET ” International Conference on Electronics, 1] Attacks in Mobile Ad hoc Networks”, Symposium on
Collasal Data Analysis and Networking, IEEE, 18-19
Communication and Aerospace Technology (ICECA
March, 2016, Pages: 1 - 4, DOI:
2017) 481-486 IEEE 21-22 April, 2017 Coimbatore. 10.1109/CDAN.2016.7570868.
[5] Jain, A.K.; Tokekar, V., “Mitigating the effects of Black
hole attacks on AODV routing protocol in mobile ad hoc
networks”, Pervasive Computing (ICPC), 2015
International Conference Year: 2015 , Pages:1 - 6,
DOI: 10.1109/PERVASIVE.2015.7087174 IEEE
Conference Publications.