Abstract
The Mobile Ad hoc network is the most growing field as it is dynamic in nature and requires no central authority to manage it. In this paper we have worked on routing layer of MANET. We have worked upon AODV (Ad hoc on-demand distance vector) routing protocol. In this paper we have developed a very vulnerable network and a number of attackers and also modified AODV with our trust-based approach. To the best of our knowledge no one has implemented strong attackers and prevented them. In our approach each node monitors its neighbours’ activities and develops a trust table which in turn is very difficult to maintain when there is no cooperation between nodes. Based on the trust table it decides whether to eliminate the attacker. We have also optimized HELLO packet of AODV in such a way that it propagates information about malicious node among other available nodes and isolates the attacker from the entire network. At the end we present the results which clearly show that proposed protocols perform better than AODV in vulnerable situation. To evaluate the performance, we have carried out an extensive simulation study of AODV and modified AODV using NS2.35 with and without attacker showing significant improvement in Packet Delivery Fraction (PDF), Packet Drop Ratio (PDR), Average Throughput (AT), Normalized Routing Load (NRL) and E2E (Average End-2-End delay).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ad-hoc-mobile-wireless-networks-principles-protocols-and-applications—By Subir Kumar Sarkar and Basavraju. February 5, 2013 by CRC Press Reference—349 Pages—ISBN 9781466514461
Gandhi, S., Chaubey, S., Tada, N., Trivedi, S.: Scenario-based performance comparison of reactive, proactive & hybrid protocols in MANET. In: 2nd IEEE International Conference on Computer Communication and Informatics (ICCCI-2012), 10–12, January 2012
Perkins, C.E., Royer, E.M., Das, S.R.: Ad-hoc on-demand distance vector routing. In: Proceedings of the International Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90–100 (1999)
RFC 3561 (AODV); http://www.ietf.org/rfc/rfc3561.txt
Zapata, M.G., Asokan, N.: Securing Ad hoc routing protocols, In: Proc. 1st ACM Workshop on Wireless Security, pp. 1–10 (2002)
Internet draft of SAODV https://tools.ietf.org/html/draft-guerrero-manet-saodv-03
Pirzada, A.A., McDonald, C., Datta, A.: Performance comparison of trust-based reactive routing protocols. IEEE Trans. Mobile Comput. 5(6), 695–710 (2006)
Goyal, Priyanka: S.B., Singh, A.: A literature review of security attack in mobile Ad-hoc networks. Int. J. Comput. Appl. 9(12), 0975–8887 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Naren, T., Tejas, P., Chirag, P. (2016). Trust Appraisal Based Neighbour Defense Secure Routing to Mitigate Various Attacks in Most Vulnerable Wireless Ad hoc Network. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1. Smart Innovation, Systems and Technologies, vol 50. Springer, Cham. https://doi.org/10.1007/978-3-319-30933-0_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-30933-0_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30932-3
Online ISBN: 978-3-319-30933-0
eBook Packages: EngineeringEngineering (R0)