ArticlePDF Available

Likelihood based Node Fitness Evaluation Method for Data Authentication in MANET

Authors:
  • University College of Engineering,BIT Campus,Anna University,Trichy,Tamilnadu

Abstract and Figures

Mobile nodes in ad hoc network are easily compromised by attackers. Due to the presence of attackers, the network may be overloaded which leads to least security. In this research work, Likelihood based Node Fitness Evaluation Method (LNFEM) is introduced and developed based on trust model. The trust model consists of three phases. In first phase, trust model is defined based on trust generation and computation. Node recommendation is used to produce the trust vector. In second phase, the clustered secure routing is adopted to provide seamless connectivity in the presence of attackers. In third phase, direct evaluation system is used to inter relate the direct and indirect observation. The proposed method is evaluated using network simulation tool (NS2.3). The performance metrics are throughput, data authentication ratio, data confidentiality rate, control overhead and propagation delay. From the simulation results, the proposed method achieves better performance compared to the existing methods. Keywords Likelihood function, trust computation, trust generation, cluster, throughput, data authentication ratio, data confidentiality rate and control overhead.
Content may be subject to copyright.
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 5835 - 5842
5835
ISSN: 2005-4238 IJAST
Copyright 2019 SERSC
Likelihood based Node Fitness Evaluation Method for Data
Authentication in MANET
S. Pramela Devi*, Dr.V. Eswaramoorthy2, Dr. K. Vinoth Kumar3 and T.
Jayasankar4
1*Assistant Professor, Department of CSE, MVJ College of Engineering, Channasandra, Bangalore.
2Associate Professor, Department of ECE, SSM Institute of Engineering and Technology,Dindigul.
3Associate Professor, Department of CSE, SSM Institute of Engineering and Technology, Dindigul.
4Assistanr Professor, Department of ECE, Bharathidhasan Institute of Technology, Trichirappalli.
Abstract
Mobile nodes in ad hoc network are easily compromised by attackers. Due to the presence of
attackers, the network may be overloaded which leads to least security. In this research work,
Likelihood based Node Fitness Evaluation Method (LNFEM) is introduced and developed based on
trust model. The trust model consists of three phases. In first phase, trust model is defined based on
trust generation and computation. Node recommendation is used to produce the trust vector. In second
phase, the clustered secure routing is adopted to provide seamless connectivity in the presence of
attackers. In third phase, direct evaluation system is used to inter relate the direct and indirect
observation. The proposed method is evaluated using network simulation tool (NS2.3). The performance
metrics are throughput, data authentication ratio, data confidentiality rate, control overhead and
propagation delay. From the simulation results, the proposed method achieves better performance
compared to the existing methods.
Keywords Likelihood function, trust computation, trust generation, cluster, throughput, data authentication
ratio, data confidentiality rate and control overhead.
1.Introduction
In this modern world, handheld devices like laptops, mobile phones and tablets are very
important and play a major role in everyone’s life. Mobile ad hoc network is a kind of network
where it support vehicle networks very well. It is helpful in disaster management, emergency
applications, earth quake and so on. MANET is a powerful platform which provides connectivity,
mobility and flexibility to all devices in the world.
Security is an important concern in ad hoc networks due to weak signal strength, limited
physical resources and less protection of mobile nodes. Trust can act as important role to provide
the authentication of ad hoc networks. Due to bandwidth constraints, it is not at all possible the
participation of all nodes in the network. Both cryptography and trust model can be combined to
provide the entire security in the network.
2. Previous Work
Ankita Gupta and Abhishek Dubey [1] proposed the trust based approach to prevent
black hole attack using dynamic source routing protocol. In this routing, before packet forwarding
process, the entire route stability was found to prevent attackers inside the network. The secure
routes were established from source to destination by deploying the trust enhanced approach. The
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 5835 - 5842
5836
ISSN: 2005-4238 IJAST
Copyright 2019 SERSC
multiple routes were found to provide reliable and efficient data transmission. The shortest routes
are found using effective algorithms which will improve the network performance dramatically.
Shanthi et.al [2] presented the weighted path mechanism to improve the quality of service
to reduce delay. The path speed determines the priority of the path between source to sink nodes.
The quality of the paths was determined by the weighted path procedure. The speed of the path
and network routes determines the path speed after effective packet transmission. It leads to the
reduction of delay, overhead and packet loss. The high dependability reduced the maximum packet
transfer and validation administration.
Niloofar Movahedian Attar [3] identified the secure routes in the ad hoc environment. The
on demand vector routing was discovered from source to sink node to support the prevention of
malicious nodes. The equation was derived to estimate the trust vector in order to find the secure
routes. The performance of the protocol was analyzed and summarized effectively during omnet
simulation environment.
Rajesh Yamparala and Balamurugan Perumal [4] developed the effective routing method
using group key management concept to ensure secure data transmission. The different qualities of
attack were found to provide authenticated nodes. The main aim of this protocol was to identify the
packet dropping attack using hybrid cryptography. The session keys for the nodes were arranged to
build secure trust model to sort out the several attackers during packet transmission.
Rohi Tariq et.al [5] proposed the secure on demand vector routing protocol to prevent the
black hole and denial of service attack. The hop count of routes was increased due to the presence
of malicious node. All route request packets towards the intermediate nodes are identified towards
the positive data transmission. The source node sends the packets to neighbor node without
knowing the presence of black hole attacks. These attackers were reduced by adopting crypto
mechanism.
Zulfiqar Ali Zardari et.al [6] proposed the intrusion detection system with connecting
domain set to balance energy and nonexistence of blacklisted nodes. The localized approach was
used to find the location of nearby connecting domain sets of nodes. The complete character of all
nodes can be retried using the selected intrusion detection system node to broadcast status of
packet. Finally the malicious node and black listed nodes were identified and removed using the
proposed intrusion detection system.
Perumal Raghavan Kavitha and Rajeswari Mukesh [7] developed the enhanced
polynomial reduction algorithm to tackle the security issues in the clustered ad hoc environment.
The strong key authentication based on two set of primitive polynomial procedure to identify the
effective routes in a short span of time. The neighbor routers are used to produce the
acknowledgements and also to identify the impersonation to reduce overhead.
Adwan Yasin and Mahmoud Abu Zant [8] developed the timer based baited technique to resist the
black hole attacks based on timers and baiting messages. The fake id was creased in the baiting
phase based on timer which reaches the threshold. The best paths were found based on behavior of
the attackers. The black hole attackers were identified and removed from the network using the
baiting technique. The TTL (Time-To-live) value was to isolate the congestion from the fake
requests.
Saranya and Padmapriya [9] proposed the system to reduce and prevent the both black
hole & grayhole attack in MANET grayhole attack based secure routing algorithm. The impact of
the attackers was identified and reduced using on demand routing. The control packet algorithm
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 5835 - 5842
5837
ISSN: 2005-4238 IJAST
Copyright 2019 SERSC
was proposed to investigate the behavior of black hole and gray hole attacks. The elliptic curve
cryptography technique was used to reduce the impact of attacks to provide authentication.
Gopinath and Vinoth Kumar [10] presented the novel technique to detect the wormhole
attack. The introduced technique was the improvement of Delphi technique to detect and isolate
the malicious node. The per hop delay was estimated based on congestion and link failure. The
threshold delay was calculated to reduce the packet loss and misbehaving nodes.
3. Likelihood based Node Fitness Evaluation Method (LNFEM)
In this section, trust model is developed to find the trustworthy path and effective packet
delivery in ad hoc network. The concept of clustered network environment is determined to initiate
the stable routing. The direct reliability and indirect reliability metric are estimated to good and bad
nodes. There are three major steps to identify the good and false forwarding nodes.
1. The first one is number of data packets successfully forwarded without dropping from
source to destination.
2. The second step is to identify the packet dropping between neighbor nodes.
3. The third one is to detect the falsely injected packets in routing without the knowledge
of source and destination node.
Likelihood based node fitness evaluation method is proposed here to ensure data
authentication. It consists of three major models. The first model is trust model which ensures end
to end reliable packet delivery and availability of nodes. The second model is trust generation and
the third is trust computation model. Both models are used to ensure data and node authentication.
3.1 Trust Model for Revocation of Reliability
In this first model, cluster is formed with group of cluster members and the Cluster Head
(CH) is chosen based on node recommendation and node reputation. The node recommendation is
used to identify the reliable intermediate nodes in the cluster region. CH initiates the data
transmission process and the trade-off between reliability withdrawals and reliability starting
phase. The CH manager is created based on the voting by CH. This manager assigns aging metric
to each node which may hide the reliability value. It can be preset based on requirement of the
user. In MANET, packets may be dropped due to the network congestion, network contentions and
selfish as well as misbehaving nodes. Bad nodes are the nodes which drops the packets slowly.
CH divide the members into a group based on threshold factor. Based on the resultant vector of
each node, the CH broadcasts the trust vector value to the remaining cluster members.
The following steps to ensure the trust model of data delivery.
Intermediate node discovery:
In this phase, the list of trusted intermediate nodes is maintained along with reliability
metrics. In route discovery phase, end to end route is discovered from source to sink node with
good nodes. In route maintenance phase, each node is monitored by CH manager and it can
withdraw the route discovery process if the link failures occur unconditionally.
3.2 Generation of Node Trust
In this phase, the trust is calculated by CH and cluster members. If the lifetime of trust
value is expired, the trust cancellation procedure can be adopted to begin the trust calculation. Both
CH and cluster members are used to gather the behaviors of nodes based on route evidences. All
CH managers gather and record the data about good and bad event in its store table. The
probability distribution model is adopted to combine the feedback and node reputation.
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 5835 - 5842
5838
ISSN: 2005-4238 IJAST
Copyright 2019 SERSC
3.3 Node Trust Calculation
In intermediate node management phase, CH collects the information about all nodes and
trust values of cluster members. It broadcasts beacon messages and store all node IDs in the store
table. Based on node recommendation, CH computes the trust value. The following steps are used
to identify the high trust value.
Step 1: CH broadcast the trust value to all neighbor nodes.
Step 2: The store table aggregator sends the beacon signal if the fake Id persists in the table.
Step 3: The likelihood function of node is estimated with zero mean and it is presented as,
( )
=
+=
22
2
2
log
2
1
,, tt
t
t
lBPml
Step 4: The likelihood of good behaving nodes is increased and trust cancellation begins properly.
3.4 Direct Evaluation System
In this phase, each cluster member can overhear the packets from the fake node based on
trust metric. The bayesian inference is used to build the direct evaluation system. Figure 1 shows
the illustration of direct evaluation system.
Application layer
Networking layer
Trust approach
Trust revocation
Trust Generation
Figure 1. Direct evaluation system
4. Simulation Results
The proposed method is evaluated using network simulator tool NS 2,35. The simulation
area size is 1200 x 1200 sq.m. The packet size of simulation is 256 bytes. Table 1. illustrates the
simulation settings and parameters.
Table1. Simulation and Setting Parameters of LNFEM
No. of Nodes
100
Area Size
1200 X 1200 sq.m
Mac
802.11
Radio Range
100 meter
Simulation Time
100 sec
Traffic Source
Poisson
Packet Size
256 bytes
Mobility Model
Random Way
Protocol
DSR
The following metrics are used to analyze the performance of proposed method.
Throughput: It is the number of packets transmitted per time.
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 5835 - 5842
5839
ISSN: 2005-4238 IJAST
Copyright 2019 SERSC
Propagation delay: The number of packets propagated from source to intermediate nodes.
Control Overhead: It is the excessive number of packets over a period of time.
Data Authentication ratio: It is the number of nodes authenticated to the number of nodes
deployed.
Figure 2 illustrates the performance of proposed method in terms of throughput. Compared to
the existing schemes, the proposed scheme LNFEM achieves least throughput due to more traffic.
Figure 2. Throughput Vs No. of Packets
Figure 3 shows the analysis of propagation delay while varying time in x axis. Compared to the
existing schemes, the proposed scheme achieves less delay due to the computation of trust.
Figure 3. Propagation delay Vs Time
Figure 4 provides the analysis of Data authentication ratio. In x axis, the number of data packets
is varied. Due to the presence of data trust computation and generation method, the proposed
method achieves high ratio compared to existing schemes.
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 5835 - 5842
5840
ISSN: 2005-4238 IJAST
Copyright 2019 SERSC
Figure 4. Data Authentication Ratio Vs No. of Data packets
Figure 5 shows the results of control overhead while varying the mobility in x axis. From the
results, it is seen that LNFEM achieves less control overhead than existing schemes.
Figure 5. Control Overhead Vs Mobility
Figure 6 shows the results of data confidentiality rate to ensure the protection of data from the
attackers. From the results, the proposed method achieves high rate than existing schemes.
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 5835 - 5842
5841
ISSN: 2005-4238 IJAST
Copyright 2019 SERSC
Figure 6. Data Confidentiality rate Vs Speed
5. Conclusion
In the research community, Mobile ad hoc networks are the inseparable part of networks
where nodes are randomly deployed in the network. Due to dynamic nature, the reliability is
getting degraded. Trust evaluation is a major concern in the network. In this research work,
Likelihood based Node Fitness Evaluation Method is introduced based on the computation of node
trust. The cluster is formed with group of cluster members. The trust is estimated and distributed to
all intermediate nodes where the nodes use the trust vectors to forward the packets. Simulation
results are performed using network simulator tool. From the results, the proposed method
achieves better performance in terms of data authentication ratio, data confidentiality rate, control
overhead, propagation delay and throughput. In future, it is planned to implement IoT based secure
routing in MANET for real time applications.
REFERENCES
[1] Ankita Gupta, Abhishek Dubey, Advanced Technique Using Trust Based Approach for
Prevention of Black Hole Attack in Mobile Ad Hoc Network’, International Journal for
Research in Engineering Application & Management (IJREAM), Vol-04, Issue-02, May
2018, pp.84-89.
[2] Gopinath, S., Vinoth Kumar, K. & Jaya Sankar, T. Secure location aware routing protocol
with authentication for data integrity. Cluster Comput 22, 1360913618 (2019).
https://doi.org/10.1007/s10586-018-2020-7
[3] P M. Shanthi, A. Dalvin Vinoth Kumar, L. Arockiam, “ A Technique to Enhance Quality of
Service using weighted Path Mechanism”, International Journal of Scientific Research in
Computer Science, Engineering and Information Technology, Vol.2, No.4, 2017, pp.413-
417.
[4] Niloofar Movahedian Attar, “Dynamic Detection of Secure Routes in Ad hoc Networks”,
Emerging Science Journal, Vol.1, No.4, 2017, pp.233-238.
[5] Rajesh Yamparala, Balamurugan Perumal, "Secure Data Transmission with Effective
Routing Method Using Group Key Management Techniques-A Survey", International
Information and Engineering Technology Association, Vol.52, No.3, 2019, pp.253-256.
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 5835 - 5842
5842
ISSN: 2005-4238 IJAST
Copyright 2019 SERSC
[6] Rohi Tariq, Sheeraz Ahmed Corresp., Raees Shah Sani , Zeeshan Najam , Shahryar
Shafique, Securing ad hoc on-demand distance vector routing protocol against the black
hole DoS attack in MANETs”, 2019, Peer J prints, 1-40.
[7] Zulfiqar Ali Zardari , Jingsha He , Nafei Zhu, Khalid Hussain Mohammadani , Muhammad
Salman Pathan , Muhammad Iftikhar Hussain and Muhammad Qasim Memon, “A Dual
Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion
Detection System and a Connected Dominating Set in MANETs”, Future Internet, 2019,
pp.1-17.
[8] Perumal Raghavan Kavitha, Rajeswari Mukesh, “Detection of Impersonation Attack in
MANET Using Polynomial Reduction Algorithm”, International Journal of Network
Security, Vol.20, No.2, PP.381-389, Mar. 2018.
[9] Adwan Yasin and Mahmoud Abu Zant, “Detecting and Isolating Black-Hole Attacks in
MANET Using Timer Based Baited Technique”, Wireless Communications and Mobile
Computing, 2018, pp.1-11.
[10] K.Vinoth Kumar, T.Jayasankar, V.Srinivasan, .Prabhakaran, “Fuzzy Logic based Efficient
Multipath Routing for Mobile Ad-hoc Networks” Applied Mathematics & Information
Sciences(AMIS), ISSN: 1935-0090 (Print): EISSN: 2325-0399
(Online),vol.11,no.2,March 2017
[11] Saranya. R and Padmapriya. R, “Contradiction Based Gray-Hole Attack Minimization for
Ad-Hoc Networks”, International Journal of Advanced Research in Computer and
Communication Engineering, Vol. 7, Issue 2, February 2018, pp.8-14.
[12] K.Vinoth Kumar, Dr.V.Eswaramoorthy, S.Nagakumararaj and J.Wilson, “Fuzzy Clustering
Enchanced Multipath Routing to Enhance the Network Lifetime in Wireless Sensor
Networks”, International Journal Of Scientific & Technology Research Volume 8, Issue 11,
November 2019.
[13] K.Vinoth Kumar, Dr.S.Bhavani, “Trust Based Multipath Authentication Protocol for Mobile
Ad Hoc Network” Journal of Computational and Theoretical Nanoscience (CTN), ISSN:
1546-1955 (Print): EISSN: 1546-1963 (Online), Volume 12, Number 12, December 2015,
pp. 5479-5485(7) DOI: https://doi.org/10.1166/jctn.2015.4552.
... The black hole attack detection and isolation modelis a novel strategy was deployed to recognize and withdraw the malicious node from the network [8]. The novel routing mechanism was integrated based on cluster method and blacklist routing scheme. ...
Article
Full-text available
Ad hoc sensor network is a new kind of wireless networks where the sensor node or mobile sensor node can be communicated randomly. In the absence of access point, attackers are entered easily without the knowledge of source or neighbour node. Worm hole attack in the network records the packet in one route and drops it in another route which may cause congestion in the network. In this research work, Reliable Wormhole Detection System (RWDS) is proposed to provide secure routing and authentication for environmental monitoring. The system consists of three phases. In first phase, reliable routes are discovered from source to sink node. In second phase, extended coverage approach is introduced to estimate the energy during route maintenance phase. In third phase, worm hole detection
Article
Full-text available
A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don’t cooperate with other nodes and disturb the network through false routing information. In this paper, we propose a prominent technique, called dual attack detection for black and gray hole attacks (DDBG), for MANETs. The proposed DDBG technique selects the intrusion detection system (IDS) node using the connected dominating set (CDS) technique with two additional features; the energy and its nonexistence in the blacklist are also checked before putting the nodes into the IDS set. The CDS is an effective, distinguished, and localized approach for detecting nearly-connected dominating sets of nodes in a small range in mobile ad hoc networks. The selected IDS nodes broadcast a kind of status packet within a size of the dominating set for retrieving the complete behavioral information from their nodes. Later, IDS nodes use our DDBG technique to analyze the collected behavioral information to detect the malicious nodes and add them to the blacklist if the behavior of the node is suspicious. Our experimental results show that the quality of the service parameters of the proposed technique outperforms the existing routing schemes.
Article
Full-text available
Mobile Ad hoc Network (MANET) is a type of wireless networks that provides numerous applications in different areas. Security of MANET had become one of the hottest topics in networks fields. MANET is vulnerable to different types of attacks that affect its functionality and connectivity. The black-hole attack is considered one of the most widespread active attacks that degrade the performance and reliability of the network as a result of dropping all incoming packets by the malicious node. Black-hole node aims to fool every node in the network that wants to communicate with another node by pretending that it always has the best path to the destination node. AODV is a reactive routing protocol that has no techniques to detect and neutralize the black-hole node in the network. In this research, we enhanced AODV by integrating a new lightweight technique that uses timers and baiting in order to detect and isolate single and cooperative black-hole attacks. During the dynamic topology changing the suggested technique enables the MANET nodes to detect and isolate the black-hole nodes in the network. The implementation of the proposed technique is performed by using NS-2.35 simulation tools. The results of the suggested technique in terms of Throughput, End-to-End Delay, and Packet Delivery Ratio are very close to the native AODV without black holes.
Article
Full-text available
Similar to mobile ad hoc network (MANET), cloud computing also has properties including wireless communication within predesigned network and also limitations such as network privacy and performance. With regards to MANET security is a prime concern where the security is compromised through several attackers. Attacks can be of two types—active and passive. These attacks are prone to network devices and the network is made unavailable. It is hard to identify the location of unknown nodes and attacks when there is a mobility period. Prior studies show that schemes are introduced by authors to protect location of nodes that are genuine from attackers. The MANETs make use of a security routing scheme for the purpose of establishing a secure route along with a secure transmission of data. The main threat to security in case of the MANET is its integrity, privacy and non-repudiation. In order to combat with such threats to security there are several protocols to routing that have been designed for the reduction of the threats in security in the MANET. The need for such protocols that are scalable and energy efficient with the small, low power as well as inexpensive positioning instruments has resulted in the introduction of various routing protocols that are location-based with a promising choice in terms of MANETs. In this study, to strike a balance between location authentication and node identity secure location aware routing protocol (SCLARP) is developed. In the first module of the proposed study, introduction of network and attack model take place, which can follow the rules of secure authentication; whereas, in the second part of the protocol, along with location integrity, secure multicast tree is formed. The main focus of this module is the development of secure multicast groups. In the final module, deployment of public key encryption and decryption scheme take place which deploys in protecting the node from the attackers. As soon as the plain text from the side of the decryption is got the source nod or the parent node will broadcast all data packets to its destination. From the results of the study, it is shown that SCLARP performs better with regards to location and packet integrity, node authentication ratio, end-to-end delay and packet delivery ratio.
Article
Full-text available
The present paper focused on ad hoc networks with an emphasis on their dynamic nature. After an introduction to ad hoc networks, there are the AODV (Ad hoc On-demand Distance Vector) routing protocol with the node malicious behaviour and consequent damages to ad hoc networks. Then, trust is described as one of the solutions for identifying secure routes when there are malicious nodes in the network. Accordingly, the paper focuses on the proposed solutions that are based on the parameter trust and the prevention of the impact of malicious networks and vulnerable connections to identify a secure route. Then, an equation is presented to calculate trust using packet forwarding rate to select a secure route for sending data packets. The proposed model was implemented on OMNET++ to evaluate the network performance. The feature of the proposed method is better performance than of the methods TVAODV and AODV. Using the proposed method, packet delivery rate increases more significantly when malicious nodes increases than that of the basic method AODV and TVAODV. There is thus a lower packet dropping rate.
Article
Full-text available
Security is a major issue in ad hoc networks. Due to high mobility of nodes, the network partition occurs that leads to network unavailability. The nodes are compromised by the attackers that make lack of data integrity as well as authentication. To overcome this issues several research work concentrated on trust model and authentication schemes to achieve the security challenges. In this research work, the Trust based Multipath Authentication Protocol (TMAP) to attain data integrity and authentication. It consists of three phases. First, the authenticated multipath routing is established from source to destination node to achieve load balancing and path reliability. Second, the trust model is designed based on trust count value of node and path. Third, the signature generation and verification process is developed to provide secure data information throughout the entire path. Based on the simulation results, the proposed protocol achieves better results than previous schemes.
Article
Wireless Sensor Networks (WSNs) energy potency has used a restricted battery. We have a tendency to given a multi-parameter higher cognitive process cluster head choice below fuzzy surroundings. Fuzzy clustering technique is employed for the choice of cluster heads in WSNs. Three criteria as well as residual energy distance of the nodes from main node and the variety of neighbor nodes measure the throughput. So we have to optimize the quantity of cluster heads. The simulation result shows that this approach is simpler in increasing the property among every cluster and conjointly localizing high intensity traffic among a cluster.
Article
Mobile Ad hoc Networks (MANETs) are a subclass of remote network system having exceptional characteristics of dynamic system topology and moving nodes. The utilization of remote advances is expanding and it impacts in the improvement of new hypotheses and structures for the interchanges. One of these new advancements is the portable systems. The routing is a fundamental part in the achievement of the secure communication in these structures. Routing method is the basic and essential execution factor in the Mobile Ad-hoc Network. The routing methods in MANET are practiced to deal with much number of nodes with limited resources. There is an assortment of routing method exist in MANET. Because of the dynamic topology and non-framework, network members collaborate with their neighbors to route the data packets. Cryptographic methodologies have been familiar with secure gathering for example, Private and Public Key Infrastructure. The self-governing and circulated nature of MANETs requests a decentralized validation administration, where Public Key Infrastructure is viewed as a superior arrangement. Key administration in the MANET is a critical issue concerning the security of the network communication. By setting up key administration technique, arrangement can be given to administrations like confirmation, information respectability and information classification. Secure routing and information transmission have an important role in Ad Hoc system as it is increasingly defenseless against numerous attacks because of its auxiliary qualities. In this paper, a survey is done on different routing methods, secure communication process and methods to improve the unwavering quality of information transmission.
Article
Secure routing among multiple routers become a complex process in Mobile Ad-hoc NETworks (MANETs) due to the presence of adversary nodes. An adversary node which compromises the honest node as well as it will use all secrets of compromised node. By these capabilities, the attacker launches impersonation attacks against secure transmission. Strengthening the personal key and monitoring the behavior of each node is crucial avoid impersonation attack. This paper proposed the Enhancing Polynomial reduction algorithm for Secure routing against Impersonation in Clustered MANET to tackle above secure routing issues. To provide the personal key with less key storage overhead, the clusters network based on the exible weight clustering algorithm. To avert impersonation, the polynomial reduction algorithm which initially exploits the strong key authentication via two separate transactions which forward the set of primitive polynomial with key function and the same with anyone random number in a successive manner. Also, the polynomial reduction algorithm considers the acknowledgments with attached hop-counts from the intermediate routers to identify the impersonation when the attacker acts as an intermediate router resulting in high control overhead. Therefore, the proposed introduces the Energy Efficient Polynomial Reduction (EPR) algorithm that reduces the overhead by sending the consolidated acknowledgment for same cluster nodes.
Article
The reliable data delivery is the main problem of Mobile Ad-Hoc Networks (MANET). Due to node mobility, heavy packet dropping occurs, which leads to packet overhead and links break. The previous routing protocols are vulnerable to node mobility especially for large-scale networks. Due to this issue, an Efficient Multipath Routing Protocol (EMRP) using fuzzy logic controller is proposed which takes advantage of the stateless property of geographic routing and the broadcast nature of wireless medium. In this protocol, both stability and mobility are calculated to determine network reliability. The reliable multipath is constructed based on network topology. Both link and node reliability is determined to enable novel routing based on calculation of stability. Fuzzy logic control procedure is implemented with reliability to increase the network performance. This system is used in ad hoc network to determine its reliability. The proposed protocol is simulated with Network Simulator (NS2.34) tool to attain better stability and network reliability and also improves the network life time compared to Existing protocols EMLARP.
Advanced Technique Using Trust Based Approach for Prevention of Black Hole Attack in Mobile Ad Hoc Network
  • Ankita Gupta
  • Abhishek Dubey
Ankita Gupta, Abhishek Dubey, " Advanced Technique Using Trust Based Approach for Prevention of Black Hole Attack in Mobile Ad Hoc Network', International Journal for Research in Engineering Application & Management (IJREAM), Vol-04, Issue-02, May 2018, pp.84-89.