Trust Based Secure AOMDV with Homomorphic Encryption for Multi Path Mobile ADHOC Network
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2019 by IJCTT Journal|
|Year of Publication : 2019|
|Authors : Farsana Rasheed C, Satheesh N Kaimal|
|DOI : 10.14445/22312803/IJCTT-V67I4P110|
MLA Style: Farsana Rasheed C, Satheesh N Kaimal "Trust Based Secure AOMDV with Homomorphic Encryption for Multi Path Mobile ADHOC Network" International Journal of Computer Trends and Technology 67.4 (2019): 44-48.
APA Style:Farsana Rasheed C, Satheesh N Kaimal (2019). Trust Based Secure AOMDV with Homomorphic Encryption for Multi Path Mobile ADHOC Network. International Journal of Computer Trends and Technology, 67(4), 44-48.
A design of a protocol and the security of network in MANET is the vibrant research area for the past several years. In this paper we suggest a new method to provide reliable and secure data transmission in MANETs with under possible black hole attacks and Sybil attacks based on trust based multipath ad hoc on-demand multipath distancevectorrouting (T-AOMDV) protocol and homomorphic encryption scheme for security. Simulation results show the improvement of packet delivery ratio and network throughput, and decrement in network packet loss and delay in the presence of black hole nodes and sybil nodes in our proposed method
 Wikipediawebsite. [online]. Available: https://en.wikipedia.org/wiki/Mobile_ad_hoc_network
 Sachin Lalar and Arun Kumar Yadav, “Comparative study of routing protocols in MANET”, ISSN, 22 March ,2017
 Smita Singh, Shradha Singh,Soniya jain,S.R. Biradar, “Comparison and Study of AOMDV and DSDV Routing Protocols in MANET Using NS-2”, IJCSE, 2012
 Wikipediawebsite. [online]. Available: https://en.wikipedia.org/wiki/black_hole_(networking)
 Quora website [online]. Available:https://www.quora.com/How-does-fully-homomorphic-encryption-really-work
 Imrich Chlamtac, Marcoconti and Jennifer j-n Liu, “Mobile Ad Hoc Networking: Imperatives and Challenges, Ad Hoc Networks”, vol. 1, no. 1, pp. 13-64, July, 2003
 Elbasher Elmadhi, Seong Moo Yoo, Kumar Sharshembiev, “Securing Data Forwarding Against Back Hole Attack in Mobile Ad Hoc Networks”,IEEE, 2018
 Harsh PratapSingh, Virendra pal Singh,Rashmi Singh, “Cooperative blackhole/ greyhole attack detection and prevention in mobile ad hoc network: a review”, International Journal of Computer Applications (0975 – 8887) volume 64– no.3, February, 2013
 P. Narendra Reddy, CH. Vishnuvardhan, V. Ramesh, “Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Mobile Computing,2013
 Mahesh K. Marina, Samir R. Das, “On-Demand Multipath Distance Vector Routing In Ad Hoc Networks”, IEEE, 2001
 C H. Niranjan Kumar, Satyanarayana, “Detection of Sybil Attack Using Position Verification Method in Manets”, International Journal of Modern Trends in Engineering and Research,2014
 Youssef Gahi1, MouhcineGuennoun, ZouhairGuennoun, Khalil El-Khatib, “An Encrypted Trust-Based Routing Protocol”, IEEE,2012
T-AOMDV, mobile adhoc network, homomorphic encryption,AODV, blackhole attack, sybil attack.