Identifying Malicious Node Using Trust Value in Cluster Based MANET (IMTVCM)

被引:0
|
作者
Annadurai, P. [1 ]
Vijayalaksmi, S. [2 ]
机构
[1] Arignar Anna Govt Arts & Sci Coll, Dept Comp Sci, Karaikal, Puducherry Stat, India
[2] Hindustan Univ, Dept Comp Applicat, Madras, Tamil Nadu, India
来源
2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT) | 2014年
关键词
clustering; trust; authentication; services; malicious node; MANET;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc network is an autonomous collection of mobile nodes communicating over wireless links where the node scan communicate with each other in temporary manner with no centralized administration and in a dynamic topology that changes frequently. A malicious node can constantly report incorrect information to other nodes in the network, which can lead to whole network down. The proposed work identifying malicious node using trust value in cluster based MANET is used to detect the malicious node in cluster. The cluster formation process is realized by grouping nearby nodes to form a cluster. To every cluster, cluster head is assigned based on the energy of the nodes. The trust value calculation is used to find the behavior of the node. It is calculated by Cluster Member (CM), direct and indirect trust value. The trust value of the cluster member is maintained in the counter table. During the data transmission time, the Cluster Head (CH) monitors its cluster member behavior. When any misbehavior is monitored by cluster head means, it sends the request about that misbehaving node to its nearby node (NN) to get the direct trust value (DTV).And also CH sends the request to other cluster members about that misbehaving node. If that cluster members are having value about that misbehaving node means, it sends the indirect trust value to the CH. Otherwise cluster members ignores the request send by CH. The goal of the proposed work is identify the malicious nodes in the cluster using the trust values in effective manner. Simulation result in NS-2 accurately predicts the performance of proposed scheme in terms of cluster energy level analysis, routing performance, system performance under varying network conditions.
引用
收藏
页码:1150 / 1158
页数:9
相关论文
共 50 条
  • [11] A Reliable Data Delivery Using Trust Management System Based on Node Behaviour Predication in MANET
    Pavani, V. L.
    Sathyanarayana, B.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 280 - 285
  • [12] Performance Analysis of Malicious and Residual Node Detection in Manet Using Deep Learning Techniques
    Srikanth, P.
    Kalyani, P.
    Sagar, Lalit Kumar
    Ramapraba, P. S.
    Sudha, V
    Sujatha, G.
    Narasimharao, Jonnadula
    Ravulapalli, Lakshmi Tulasi
    JOURNAL OF NEW MATERIALS FOR ELECTROCHEMICAL SYSTEMS, 2025, 28 (01) : 48 - 55
  • [13] Watchdog malicious node detection and isolation using deep learning for secured communication in MANET
    Narmadha, A. S.
    Maheswari, S.
    Deepa, S. N.
    AUTOMATIKA, 2023, 64 (04) : 996 - 1009
  • [14] Cluster based Multihop Security Protocol in MANET using ECC
    Ammayappan, Kavitha
    Sastry, V. N.
    Negi, Atul
    2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 1323 - +
  • [15] Cluster-based multiple malicious node detection using honeypot-AODV in MANETs
    Sampada, H. K.
    Shobha, K. R.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (01) : 1 - 29
  • [16] Reputation based Trust Allocation and Fault Node Identification with Data Recovery in MANET
    Dubey, Meenakshi
    Patheja, P. S.
    Lokhande, Vijay
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [17] TRUST BASED ALGORITHM FOR CANDIDATE NODE SELECTION IN HYBRID MANET-DTN
    Papaj, Jan
    Dobos, Lubomir
    ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2014, 12 (04) : 271 - 278
  • [18] A Fair Trust-Based Malicious Node Detection and Isolation Scheme for WSNs
    Zawaideh, Firas
    Salamah, Muhammed
    Al-Bahadili, Hussein
    PROCEEDINGS OF 2017 2ND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF INFORMATION TECHNOLOGY IN DEVELOPING RENEWABLE ENERGY PROCESSES & SYSTEMS (IT-DREPS 2017), 2017,
  • [19] Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks
    L. Gandhimathi
    G. Murugaboopathi
    Wireless Personal Communications, 2021, 117 : 1209 - 1222
  • [20] Address allocation for MANET merge and partition using cluster based routing
    Singh, Sugandha
    Rajpal, Navin
    Sharma, Ashok
    SPRINGERPLUS, 2014, 3