Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks
Mobile ad hoc Networks (MANET), being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination. Various solutions have been put forth so far in literature in order to mitigate the effects of th...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Zagreb Faculty of Electrical Engineering and Computing
2016-09-01
|
Series: | Journal of Computing and Information Technology |
Subjects: | |
Online Access: | http://cit.fer.hr/index.php/CIT/article/view/2835/2101 |
id |
doaj-603b3ae2750546f69d3778fecec83bd0 |
---|---|
record_format |
Article |
spelling |
doaj-603b3ae2750546f69d3778fecec83bd02020-11-24T23:31:20ZengUniversity of Zagreb Faculty of Electrical Engineering and ComputingJournal of Computing and Information Technology1330-11361846-39082016-09-0124323725210.20532/cit.2016.1002835Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc NetworksRutuja Shah0Sumathy Subramaniam 1Dhinesh Babu Lekala Dasarathan2School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India Mobile ad hoc Networks (MANET), being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination. Various solutions have been put forth so far in literature in order to mitigate the effects of these attacks on the network performance and to improve the reliability of the network. However, these attacks are still prominently a serious threat in MANET. Hence, a trust based routing strategy termed Secure-BEFORE routing (Best FOrwarding Route Estimation) is proposed to ensure optimal route estimation in computing the trust value and hop counts using the dummy packets inside the network at 1-hop level. It is observed that the overall performance of the network is improved in providing one-hop level security by maintaining the packet equivalence ratio. Malicious and suspicious nodes are isolated and eliminated from the network, based on their behavior. http://cit.fer.hr/index.php/CIT/article/view/2835/2101black hole attackgray hole attackworm hole attacksecure-BEFORE routingSRNT (MANET) |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Rutuja Shah Sumathy Subramaniam Dhinesh Babu Lekala Dasarathan |
spellingShingle |
Rutuja Shah Sumathy Subramaniam Dhinesh Babu Lekala Dasarathan Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks Journal of Computing and Information Technology black hole attack gray hole attack worm hole attack secure-BEFORE routing SRNT (MANET) |
author_facet |
Rutuja Shah Sumathy Subramaniam Dhinesh Babu Lekala Dasarathan |
author_sort |
Rutuja Shah |
title |
Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks |
title_short |
Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks |
title_full |
Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks |
title_fullStr |
Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks |
title_full_unstemmed |
Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks |
title_sort |
mitigating malicious attacks using trust based secure-before routing strategy in mobile ad hoc networks |
publisher |
University of Zagreb Faculty of Electrical Engineering and Computing |
series |
Journal of Computing and Information Technology |
issn |
1330-1136 1846-3908 |
publishDate |
2016-09-01 |
description |
Mobile ad hoc Networks (MANET), being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination. Various solutions have been put forth so far in literature in order to mitigate the effects of these attacks on the network performance and to improve the reliability of the network. However, these attacks are still prominently a serious threat in MANET. Hence, a trust based routing strategy termed Secure-BEFORE routing (Best FOrwarding Route Estimation) is proposed to ensure optimal route estimation in computing the trust value and hop counts using the dummy packets inside the
network at 1-hop level. It is observed that the overall performance of the network is improved in providing one-hop level security by maintaining the packet equivalence ratio. Malicious and suspicious nodes are isolated and eliminated from the network, based on their behavior. |
topic |
black hole attack gray hole attack worm hole attack secure-BEFORE routing SRNT (MANET) |
url |
http://cit.fer.hr/index.php/CIT/article/view/2835/2101 |
work_keys_str_mv |
AT rutujashah mitigatingmaliciousattacksusingtrustbasedsecurebeforeroutingstrategyinmobileadhocnetworks AT sumathysubramaniam mitigatingmaliciousattacksusingtrustbasedsecurebeforeroutingstrategyinmobileadhocnetworks AT dhineshbabulekaladasarathan mitigatingmaliciousattacksusingtrustbasedsecurebeforeroutingstrategyinmobileadhocnetworks |
_version_ |
1725538322636341248 |