An Improved Trust Based Approach For Detecting Malicious Nodes in MANET

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-41 Number-1
Year of Publication : 2016
Authors : Nachammai. M, Dr. N. Radha


Nachammai. M, Dr. N. Radha "An Improved Trust Based Approach For Detecting Malicious Nodes in MANET". International Journal of Computer Trends and Technology (IJCTT) V41(1):54-58, November 2016. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Mobile ad hoc network (MANET) is an infrastructure-less network of mobile devices connected wirelessly. MANET is used widely today because of its nature as self configuring, easy to move independently in any directions. MANET acts like a router and therefore changes its links to other devices frequently. Due to its nature MANET has been used in various applications like Military applications, Wireless Sensor Network and so on. As its infrastructure-less and dynamic nature, it is highly affected by various attacks like black hole attack, gray hole attack, DoS attack and many collaborative attacks. Hence security is the main challenge in MANET. Many existing work has done on the basis of detecting attacks by using various approaches like Intrusion Detection, Bait detection, Cooperative malicious detection and so on. But this Trust based approach mainly focuses on detecting the malicious nodes on the trusted path than the shortest path as discovered by using DSR mechanism.

[1] Vishvas Haridas Kshirsagar and Ashok M. Kanthe, "Trust Based Solution To Packet Drop Attack in the MANET", Journal of Multidisciplinary Engineering Science and Technology (JMEST), vol. 2, no. 7, pp. 1927-1930, 2015.
[2] Aravindh S, Vinoth R S and Vijayan R, "A Trust Based Approach for Detection and Isolation of Malicious nodes in the MANET", International Journal of Engineering and Technology (IJET), vol. 5, no. 1, pp. 193-199, 2013.
[3] Kamini Singh, Gyan Singh and Arpit Agrawal, "A Trust based Approach for Detection and Prevention of Wormhole Attack in MANET", International Journal of Computer Applications, vol. 94, no. 20, pp. 1-5, 2014.
[4] Sangeeta Bhatti and Meenakshi Sharma, "A novel Algorithmic Approach for Detection of Sybil Attack in MANET", Advanced Research in Computer Science and Software Engineering, vol. 5, no. 5, pp. 1680-1685, 2015.
[5] A. Jayanand and N. Chenthil Kumaran, "Trust Based Collaborative Attack Detection in MANET", Asian Journal of Information Technology, vol. 15, no. 4, pp. 808-816, 2016.
[6] Ji Guo and Alan Marshall, "A New Trust Management Framework for Detecting Malicious and Selfish Behavior for Mobile Ad hoc Networks", International Joint Conference of IEEE, pp. 142-149, 2011.
[7] Hisham Dahshan, Fatma Elsayed, Alaa Rohiem, Aly Elmoghazy and James Irvine, "A Trust Based Threshold", Vehicular Technology Conference (VTC Fall), IEEE, 2014.
[8] Bo YAANG, Ryo YAMAMOTO and Yoshiaki TANAKA, "Dempster-Shafer Evidence Theory Based Trust Management Strategy against Cooperative Black Hole Attacks and Gray Hole Attacks in MANETs", ICACT Transactions on the Advanced Communications Technology (TACT), vol. 2, no. 3, pp. 223-232, 2013.
[9] N. Bhalaji and A. Shanmugam, "Dynamic Trust Based Method to Mitigate Gray hole Attack in Mobile Adhoc Networks", International Conference on Communication Technology and System Design, Elsevier, vol. 30, pp. 881-888, 2012.
[10] Priyanka Takalkar and Aaradhana Deshmukh, "Trust Based Secure Data Communication in MANET", International Journal of Engineering Technology and Advanced Engineering, vol. 4, no. 12, pp. 542-546, 2014.
[11] Bhimsingh Bohara and Varun Sharma, "Analysis and Prevention of effects of gray hole attacks on Routing Protocol in Mobile Ad-hoc Networks", International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 6, pp. 2468-2472, 2013.
[12] Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, "Trust Value Algorithm: A Secure approach against Packet drop Attack in wireless Ad-hoc Networks", International Journal of Network Security and its Application (IJNSA), vol. 5, no. 3, pp. 99-111, 2013.
[13] Renu Dalal, Manju Khari and Yudhvir Singh, "Different ways to achieve trust in MANET", International Journal on AdHoc Networking Systems (IJANS), vol. 2, no. 2, pp. 53-64, 2012.
[14] Dharmesh Patel and Yask Patel, "Intrusion Detection Systems for Trust based Routing in Ad-Hoc Networks", International Journal of Computer Science and Information Technology and Security (IJCSITS), vol. 2, no. 6, pp. 1160-1165, 2012.
[15] Priyanka Donga and Shraddha Joshi, "A Review On Trust Based Method To Detect Black Hole Attack In MANET", International Journal of Advanced Research in Computer and Communication Engineering, vol. 5, no.6, pp. 728-732, 2016.

MANET, Collaborative attacks, DSR and Trust based approach.