QoS of MANet Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack

被引:26
作者
Bar, Radha Krishna [1 ]
Mandal, Jyotsna Kumar [1 ]
Singh, Moirangthem Marjit [2 ]
机构
[1] Univ Kalyani, Dept Comp Sci & Engn, Nadia, W Bengal, India
[2] NERIST, Dept Comp Sci & Engn, Nirjuli, India
来源
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013 | 2013年 / 10卷
关键词
Black hole attack; AODV; Trust value; MANet;
D O I
10.1016/j.protcy.2013.12.392
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Black hole attack is a common security issue encountered in Mobile Adhoc Network (MANet) routing protocol. In this paper a trust value for each node has been obtained depending upon the packet forwarding ability of the node. A rank is generated based on this trust value. In the route discovery step of the AODV routing protocol a path is chosen in such a way that more trusted nodes are involved. Also a node can be excluded which is not trusted from the route. Thus the packet is transferred through a more trusted path rather than the shortest path. Results of simulation through the use of OMNeT++ simulation software shows that higher threshold values gives less packet drops providing more reliable communication. (C) 2013 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:530 / 537
页数:8
相关论文
共 14 条
  • [1] Al-Shurman M., 2004, Proceedings of the 42nd annual Southeast regional conference, P96
  • [2] [Anonymous], 2009, TAODV TRUSTED AODV R
  • [3] Chlamtac Imrich., 2003, Ad Hoc Networks, V1, P13, DOI DOI 10.1016/S1570-8705(03)00013-1
  • [4] Performance analysis of ad-hoc networks under black hole attacks
    Dokurer, Semih
    Erten, Y. M.
    Acar, Can Erkin
    [J]. PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, : 148 - 153
  • [5] Jain Ankit, 2010, J GLOBAL RES COMPUTE, V10
  • [6] Jassim Hothefa Sh., 2009, IEEE 9 MAL INT C COM
  • [7] Mangrulkar R. S., 2010, INT J COMPUTER APPL, V7
  • [8] Mekaetal Kamal Deep, 2006, P 2 SEC KNOWL MAN WO
  • [9] Menaka A., 2009, TRUST BASED SECURE R
  • [10] Perkins C., 2003, AD HOC ON DEMAND DIS