Trust-Based Secure On-Demand Multipath Routing Scheme In MANET |
Author(s): |
HETALBEN GEVARIYA , L.D.COLLEGE OF ENGINEERING; DHAVAL PARIKH, L D College of Engineering, ; |
Keywords: |
Trust-Based Secure On-Demand Multipath Routing, MANET |
Abstract |
Mobile Ad-hoc Network (MANET) of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed as an infrastructure-less or self-organized network. Nodes assist each other by passing data and control packets from one node to another, often beyond the wireless range of the original sender. The execution and survival of an ad-hoc network is solely dependent upon the cooperative and trusting nature of its nodes. However, this naïve dependency on the intermediate nodes makes the ad-hoc network vulnerable to passive and active attacks by the malicious nodes. Generally cryptographic mechanisms are used in the routing protocols to secure the routing information from tampering it by the attacker, but this approach can’t be deployed in real MANET network because of high computational cost and it can’t identify the attacker nodes. Recently many trust-based routing protocols have been introduced but each has its own advantages and disadvantages. In MANETs, trust is a challenging task and it is imperative for the nodes to work in a trusted and cooperative way. We propose a trust based secure on-demand multipath routing scheme which considers the behaviour of nodes and computes trust and accordingly sets the trustworthiness of the nodes in an Adhoc network to decrease the hazards from malicious nodes. Our propose scheme considers two parameters for computing the trust which are control packet forwarding ratio and data packet forwarding ratio. The primary goal of our proposed scheme is to mitigate nodes performing packet dropping and maximizes Packet Delivery Ratio and minimizes End-to-End Delay performance parameters. Performance comparison of S_AOMDV and exist AOMDV shows that S_AOMDV is able to achieve a remarkable improvement in packet delivery ratio, end-to end delay parameters and to reduce black-hole attack. |
Other Details |
Paper ID: NCACSETT4P051 Published in: Conference 10 : NCACSET 2017 Publication Date: 06/05/2017 Page(s): 212-219 |
Article Preview |
Download Article |
|