A Novel Wolf Based Trust Accumulation Approach for Preventing the Malicious Activities in Mobile Ad Hoc Network

被引:8
作者
Vatambeti, Ramesh [1 ]
机构
[1] Presidency Univ, Sch Engn, Dept Comp Sci & Engn, Bangalore 560064, Karnataka, India
关键词
Mobile ad-hoc network; Black hole attack; Grey hole attack; Wireless mesh network; Secure routing; ATTACK DETECTION; HOLE ATTACK; PREDICTION; ENERGY;
D O I
10.1007/s11277-020-07316-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile Ad hoc Network is self-organized and movable in nature, it is widely used in various applications including military and private sectors. However, security is one of the key concerns in routing because of the moving nodes; thus it is usually affected by Black Hole and Grey Hole attack. These types of malicious activities are more harmful to the network channel, and once the attack is happened it is difficult to predict and mitigate. To end this problem the current research proposed a novel Grey Wolf Trust Accumulation (GWTA) Schema in wireless mesh network architecture, thus the attacks are identified by the finest function of the GWTA model. Moreover, the predicted attacked nodes are replaced to the last position of the network medium to prevent the packet loss. Furthermore, the comparison studies proved the effectiveness of the proposed model by attaining less packet drop and high throughput ratio rate.
引用
收藏
页码:2141 / 2166
页数:26
相关论文
共 37 条
[1]   Energy and Velocity Based Tree Multicast Routing in Mobile Ad-Hoc Networks [J].
Abu Sufian ;
Banerjee, Anuradha ;
Dutta, Paramartha .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (04) :2191-2209
[2]   An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis [J].
Bala, K. ;
Jothi, S. ;
Chandrasekar, A. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6) :15205-15212
[3]   Movement guided management of topology (MGMT) with balanced load in mobile ad hoc networks [J].
Banerjee A. ;
Dutta P. ;
Sufian A. .
International Journal of Information Technology, 2019, 11 (1) :149-158
[4]  
Bhuvaneswari R, 2018, CLUSTER COMPUTING
[5]  
Darwish SM, 2019, INT C ADV MACH LEARN, P1
[6]  
Dorovolomo J, 2020, ROUT RES HIGH EDUC, P123
[7]   Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks [J].
Elmahdi, Elbasher ;
Yoo, Seong-Moo ;
Sharshembiev, Kumar .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
[8]  
Farheen N. S. S., 2020, J KING SAUD UNIV-COM, P1
[9]   A novel approach for mitigating gray hole attack in MANET [J].
Gurung, Shashi ;
Chauhan, Siddhartha .
WIRELESS NETWORKS, 2018, 24 (02) :565-579
[10]   A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks [J].
Islabudeen, M. ;
Devi, M. K. Kavitha .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (01) :193-224