Trust Based Secure AOMDV with Homomorphic Encryption for Multi Path Mobile ADHOC Network

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-4
Year of Publication : 2019
Authors : Farsana Rasheed C, Satheesh N Kaimal
  10.14445/22312803/IJCTT-V67I4P110

MLA

MLA Style: Farsana Rasheed C, Satheesh N Kaimal "Trust Based Secure AOMDV with Homomorphic Encryption for Multi Path Mobile ADHOC Network" International Journal of Engineering Trends and Technology 67.4 (2019): 44-48.

APA Style: Farsana Rasheed C, Satheesh N Kaimal (2019). Trust Based Secure AOMDV with Homomorphic Encryption for Multi Path Mobile ADHOC Network. International Journal of Engineering Trends and Technology, 67(4), 44-48.

Abstract
A design of a protocol and the security of network in MANET is the vibrant research area for the past several years. In this paper we suggest a new method to provide reliable and secure data transmission in MANETs with under possible black hole attacks and Sybil attacks based on trust based multipath ad hoc on-demand multipath distancevectorrouting (T-AOMDV) protocol and homomorphic encryption scheme for security. Simulation results show the improvement of packet delivery ratio and network throughput, and decrement in network packet loss and delay in the presence of black hole nodes and sybil nodes in our proposed method

Reference
[1] Wikipediawebsite. [online]. Available: https://en.wikipedia.org/wiki/Mobile_ad_hoc_network
[2] Sachin Lalar and Arun Kumar Yadav, “Comparative study of routing protocols in MANET”, ISSN, 22 March ,2017
[3] Smita Singh, Shradha Singh,Soniya jain,S.R. Biradar, “Comparison and Study of AOMDV and DSDV Routing Protocols in MANET Using NS-2”, IJCSE, 2012
[4] Wikipediawebsite. [online]. Available: https://en.wikipedia.org/wiki/black_hole_(networking)
[5] Quora website [online]. Available:https://www.quora.com/How-does-fully-homomorphic-encryption-really-work
[6] Imrich Chlamtac, Marcoconti and Jennifer j-n Liu, “Mobile Ad Hoc Networking: Imperatives and Challenges, Ad Hoc Networks”, vol. 1, no. 1, pp. 13-64, July, 2003
[7] Elbasher Elmadhi, Seong Moo Yoo, Kumar Sharshembiev, “Securing Data Forwarding Against Back Hole Attack in Mobile Ad Hoc Networks”,IEEE, 2018
[8] Harsh PratapSingh, Virendra pal Singh,Rashmi Singh, “Cooperative blackhole/ greyhole attack detection and prevention in mobile ad hoc network: a review”, International Journal of Computer Applications (0975 – 8887) volume 64– no.3, February, 2013
[9] P. Narendra Reddy, CH. Vishnuvardhan, V. Ramesh, “Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Mobile Computing,2013
[10] Mahesh K. Marina, Samir R. Das, “On-Demand Multipath Distance Vector Routing In Ad Hoc Networks”, IEEE, 2001
[11] C H. Niranjan Kumar, Satyanarayana, “Detection of Sybil Attack Using Position Verification Method in Manets”, International Journal of Modern Trends in Engineering and Research,2014
[12] Youssef Gahi1, MouhcineGuennoun, ZouhairGuennoun, Khalil El-Khatib, “An Encrypted Trust-Based Routing Protocol”, IEEE,2012

Keywords
T-AOMDV, mobile adhoc network, homomorphic encryption,AODV, blackhole attack, sybil attack.