Skip to main content

Trust Appraisal Based Neighbour Defense Secure Routing to Mitigate Various Attacks in Most Vulnerable Wireless Ad hoc Network

  • Conference paper
  • First Online:
Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 50))

Abstract

The Mobile Ad hoc network is the most growing field as it is dynamic in nature and requires no central authority to manage it. In this paper we have worked on routing layer of MANET. We have worked upon AODV (Ad hoc on-demand distance vector) routing protocol. In this paper we have developed a very vulnerable network and a number of attackers and also modified AODV with our trust-based approach. To the best of our knowledge no one has implemented strong attackers and prevented them. In our approach each node monitors its neighbours’ activities and develops a trust table which in turn is very difficult to maintain when there is no cooperation between nodes. Based on the trust table it decides whether to eliminate the attacker. We have also optimized HELLO packet of AODV in such a way that it propagates information about malicious node among other available nodes and isolates the attacker from the entire network. At the end we present the results which clearly show that proposed protocols perform better than AODV in vulnerable situation. To evaluate the performance, we have carried out an extensive simulation study of AODV and modified AODV using NS2.35 with and without attacker showing significant improvement in Packet Delivery Fraction (PDF), Packet Drop Ratio (PDR), Average Throughput (AT), Normalized Routing Load (NRL) and E2E (Average End-2-End delay).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ad-hoc-mobile-wireless-networks-principles-protocols-and-applications—By Subir Kumar Sarkar and Basavraju. February 5, 2013 by CRC Press Reference—349 Pages—ISBN 9781466514461

    Google Scholar 

  2. Gandhi, S., Chaubey, S., Tada, N., Trivedi, S.: Scenario-based performance comparison of reactive, proactive & hybrid protocols in MANET. In: 2nd IEEE International Conference on Computer Communication and Informatics (ICCCI-2012), 10–12, January 2012

    Google Scholar 

  3. Perkins, C.E., Royer, E.M., Das, S.R.: Ad-hoc on-demand distance vector routing. In: Proceedings of the International Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90–100 (1999)

    Google Scholar 

  4. RFC 3561 (AODV); http://www.ietf.org/rfc/rfc3561.txt

  5. Zapata, M.G., Asokan, N.: Securing Ad hoc routing protocols, In: Proc. 1st ACM Workshop on Wireless Security, pp. 1–10 (2002)

    Google Scholar 

  6. Internet draft of SAODV https://tools.ietf.org/html/draft-guerrero-manet-saodv-03

  7. Pirzada, A.A., McDonald, C., Datta, A.: Performance comparison of trust-based reactive routing protocols. IEEE Trans. Mobile Comput. 5(6), 695–710 (2006)

    Article  Google Scholar 

  8. Goyal, Priyanka: S.B., Singh, A.: A literature review of security attack in mobile Ad-hoc networks. Int. J. Comput. Appl. 9(12), 0975–8887 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tada Naren .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Naren, T., Tejas, P., Chirag, P. (2016). Trust Appraisal Based Neighbour Defense Secure Routing to Mitigate Various Attacks in Most Vulnerable Wireless Ad hoc Network. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1. Smart Innovation, Systems and Technologies, vol 50. Springer, Cham. https://doi.org/10.1007/978-3-319-30933-0_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30933-0_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30932-3

  • Online ISBN: 978-3-319-30933-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics