Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks

Mobile ad hoc Networks (MANET), being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination. Various solutions have been put forth so far in literature in order to mitigate the effects of th...

Full description

Bibliographic Details
Main Authors: Rutuja Shah, Sumathy Subramaniam, Dhinesh Babu Lekala Dasarathan
Format: Article
Language:English
Published: University of Zagreb Faculty of Electrical Engineering and Computing 2016-09-01
Series:Journal of Computing and Information Technology
Subjects:
Online Access:http://cit.fer.hr/index.php/CIT/article/view/2835/2101
id doaj-603b3ae2750546f69d3778fecec83bd0
record_format Article
spelling doaj-603b3ae2750546f69d3778fecec83bd02020-11-24T23:31:20ZengUniversity of Zagreb Faculty of Electrical Engineering and ComputingJournal of Computing and Information Technology1330-11361846-39082016-09-0124323725210.20532/cit.2016.1002835Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc NetworksRutuja Shah0Sumathy Subramaniam 1Dhinesh Babu Lekala Dasarathan2School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India Mobile ad hoc Networks (MANET), being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination. Various solutions have been put forth so far in literature in order to mitigate the effects of these attacks on the network performance and to improve the reliability of the network. However, these attacks are still prominently a serious threat in MANET. Hence, a trust based routing strategy termed Secure-BEFORE routing (Best FOrwarding Route Estimation) is proposed to ensure optimal route estimation in computing the trust value and hop counts using the dummy packets inside the network at 1-hop level. It is observed that the overall performance of the network is improved in providing one-hop level security by maintaining the packet equivalence ratio. Malicious and suspicious nodes are isolated and eliminated from the network, based on their behavior. http://cit.fer.hr/index.php/CIT/article/view/2835/2101black hole attackgray hole attackworm hole attacksecure-BEFORE routingSRNT (MANET)
collection DOAJ
language English
format Article
sources DOAJ
author Rutuja Shah
Sumathy Subramaniam
Dhinesh Babu Lekala Dasarathan
spellingShingle Rutuja Shah
Sumathy Subramaniam
Dhinesh Babu Lekala Dasarathan
Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks
Journal of Computing and Information Technology
black hole attack
gray hole attack
worm hole attack
secure-BEFORE routing
SRNT (MANET)
author_facet Rutuja Shah
Sumathy Subramaniam
Dhinesh Babu Lekala Dasarathan
author_sort Rutuja Shah
title Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks
title_short Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks
title_full Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks
title_fullStr Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks
title_full_unstemmed Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks
title_sort mitigating malicious attacks using trust based secure-before routing strategy in mobile ad hoc networks
publisher University of Zagreb Faculty of Electrical Engineering and Computing
series Journal of Computing and Information Technology
issn 1330-1136
1846-3908
publishDate 2016-09-01
description Mobile ad hoc Networks (MANET), being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination. Various solutions have been put forth so far in literature in order to mitigate the effects of these attacks on the network performance and to improve the reliability of the network. However, these attacks are still prominently a serious threat in MANET. Hence, a trust based routing strategy termed Secure-BEFORE routing (Best FOrwarding Route Estimation) is proposed to ensure optimal route estimation in computing the trust value and hop counts using the dummy packets inside the network at 1-hop level. It is observed that the overall performance of the network is improved in providing one-hop level security by maintaining the packet equivalence ratio. Malicious and suspicious nodes are isolated and eliminated from the network, based on their behavior.
topic black hole attack
gray hole attack
worm hole attack
secure-BEFORE routing
SRNT (MANET)
url http://cit.fer.hr/index.php/CIT/article/view/2835/2101
work_keys_str_mv AT rutujashah mitigatingmaliciousattacksusingtrustbasedsecurebeforeroutingstrategyinmobileadhocnetworks
AT sumathysubramaniam mitigatingmaliciousattacksusingtrustbasedsecurebeforeroutingstrategyinmobileadhocnetworks
AT dhineshbabulekaladasarathan mitigatingmaliciousattacksusingtrustbasedsecurebeforeroutingstrategyinmobileadhocnetworks
_version_ 1725538322636341248