SlideShare a Scribd company logo
1 of 10
Download to read offline
http://www.iaeme.com/IJARET/index.asp 290 editor@iaeme.com
International Journal of Advanced Research in Engineering and Technology (IJARET)
Volume 10, Issue 2, March-April 2019, pp. 290-299, Article ID: IJARET_10_02_029
Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02
ISSN Print: 0976-6480 and ISSN Online: 0976-6499
© IAEME Publication
A SECURITY SCHEME BASED ON TRUST
ATTACK IN MANET
Syeda Kausar Fatima
Research Scholar JNTUH, Prof., DCET, Hyderabad, Principal NSAKCET,
Prof., ECE Dept, JNTUH, India.
Dr. Syeda Gauhar Fatima
Research Scholar JNTUH, Prof., DCET, Hyderabad, Principal NSAKCET,
Prof., ECE Dept, JNTUH, India.
Dr. Syed Abdul Sattar
Research Scholar JNTUH, Prof., DCET, Hyderabad, Principal NSAKCET,
Prof., ECE Dept, JNTUH, India.
Dr. D.Srinivasa Rao
Research Scholar JNTUH, Prof., DCET, Hyderabad, Principal NSAKCET,
Prof., ECE Dept, JNTUH, India.
ABSTRACT
Mobile ad hoc are gaining popularity because of availability of low-cost mobile
devices and its ability to provide instant wireless networking capabilities where
implementation of wired network is not possible or costly. MANETs are vulnerable to
various types of attack because of its features like continuous changing topology,
resource constraints and unavailability of any centralized infrastructure. Many denials
of service type of attacks are possible in the MANET and one of these type attacks is
flooding attack in which malicious node sends the useless packets to consume the
valuable network resources. Flooding attack is possible in all most all on demand
routing protocol. In this paper we present a novel technique to mitigate the effect of
RREQ flooding attack in MANET using trust estimation function in DSR on demand
routing protocol.
Keywords Mobile Ad-hoc Networks, Denial of service, Flooding Attack.
Cite this Article: Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul
Sattar and Dr. D.Srinivasa Rao, A Security Scheme Based On Trust Attack In Manet,
International Journal of Advanced Research in Engineering and Technology, 10(2),
2019, pp. 290-299.
http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa
Rao
http://www.iaeme.com/IJARET/index.asp 291 editor@iaeme.com
1. INTRODUCTION
Mobile ad hoc networks have been gaining popularity because of availability of low-cost
mobile devices and its ability to provide instant wireless networking capabilities where
implementation of wired network is not possible or costly. MANET is a collection of mobile
nodes with routing capabilities and connected with wireless link. Mobile node can directly
communicate to each other if they fall in the radio coverage range of each other [1]. In order to
forward the packet to the node which are beyond the coverage range, MANET uses the concept
of multi hop communication. Nodes in the MANET are free to move, which dynamically
changes the topology of the network. It does not require any expensive infrastructure to support
the mobility [2]. Creating the Ad hoc networks is possible where implementation of
infrastructure is not possible or expensive.
MANET are generally formed for short range communication. The performance/speed of
the network depends on the number of devices; it degrades as the number of devices increases
because all the devices shares the available network resources.
Like conventional wired network MANET also uses routing protocols to route the packets
to its destination. Ad hoc networks routing protocols are divided into two categories: Proactive
and reactive [3].
Proactive routing protocols are also known as “table driven” routing. In this, all the nodes
store the routing information about other node present in the networks and routing updates are
propagated in the network whenever network topology changes.
The advantage of proactive routing protocol is that node experiences minimal delay when
route is needed, and unexpired route is available in the routing table, but the disadvantage of
proactive routing is that these are not scalable, and maintenance of routing table requires
substantial network resources. In the case of reactive routing protocol, route between the nodes
is searched only when node wants to communicate with another node. To discover the routes,
they use route discovery procedure which in turns uses the flooding method. In this, initiator
forwards the RREQ packet to all of its neighbor’s. If neighbor has the route for destination,
they reply otherwise forward the RREQ to the next node. In this way RREQ packet reaches to
the destination which sends the reply to RREQ. But the method which is used to facilitate route
discovery are used by the Intruders or the malicious node to consume the network resources
which may lead to flooding attack.
In this paper, we propose a novel technique which uses the DSR on demand routing protocol
to reduce the effect of RREQ flooding attack in the networks with high node mobility.
The organization of this paper is as follows. Section 2 provides the overview of related
work. Section 3 described the Flooding attacks and its types. Section 4 presents the DSR routing
protocol. Section 5 presents our proposal to prevent the RREQ flooding attack. Section 6 shows
the result of the proposed technique, and finally, the section 7 concludes the paper.
2. RELATED WORK
Significant works have been done in securing the ad hoc network. Some researches defined the
method for secure routing, but secure routing also can not able to handle the flooding attack.
The first flooding attack prevention (FAP) method was proposed in [4]. In their paper, first
they described RREQ flooding and data flooding. This was the first paper that addressed the
prevention of flooding attack in ad hoc network. The authors proposed the separate approach
for RREQ flooding and data flooding. To resist the RREQ flooding, they defined the neighbor
suppression method which prioritizes the node based on the number of RREQ received. A node
gets higher priority if it sends less numbers of RREQ packets and defined the threshold value.
To deal with data flooding they used path cutoff method. In this method when node identifies
A Security Scheme Based on Trust Attack in Manet
http://www.iaeme.com/IJARET/index.asp 292 editor@iaeme.com
that sender is originating data flooding then it cutoff the path and sends the route error message.
In this way attack is prevented up to some extent but the disadvantage of this method is flooding
packet still exists in the network.
This limitation of FAP is eliminated by [5] presented threshold prevention. In this method
they defined the fixed threshold value for every node in the network. If any node receives the
RREQ flooding packet more than the threshold value, then the sender is assumed as an attacker
and all the packets from attacker is discarded by the receiver node. This method eliminates the
flooding packet but if the intruder has the idea about the threshold value then it can bypass the
TP mechanism. Normal node with high mobility is treated as the malicious node.
In [6], the author proposed the distributive approach to resist the flooding attack. In this
method they have used the two-threshold value; RATE_LIMIT and BLACKLIST_LIMIT. If
RREQ count of any node is less then RATE_LIMIT then the request is processed otherwise
check whether it is less then BLACKLIST_LIMIT, if yes then black list the node but if the
count is greater than RREQ_LIMIT and less than BLACKLIST_LIMIT then put the RREQ in
the delay queue and process after queue time out occurs. This method can Handel the network
with high mobility.
In [7], the author analyzed the flooding attack in anonymous communication. They used the
threshold tuple which consist of three components: transmission threshold, blacklist threshold
and white listing threshold. if any node generates RREQ packet more than transmission
threshold then its neighbor discards the packet if it crosses the transmission threshold more than
blacklist threshold then its black list the node. But to deal with accidental blacklisting they
defined white listing threshold. If any node performs good for number of intervals equal to
white listing threshold then it again starts treating as a normal node.
In [8], the author used the extended DSR protocol based on the trust function to mitigate
the effects of flooding attack. In this work, based on the trust value they categorized the nodes
in three categories: Friends, acquaintance and stranger. Stranger are the non-trusted node,
friends are the trusted node and acquaintance has the trust values more than stranger and less
than friends. based on relationship they define the three-threshold value. If any node receives
the RREQ packets, then checks the relationship and based on that it checks for the threshold
value if it is less than the threshold then forwards the packet otherwise discard the packet and
blacklist the neighbor node. The main problem with this method was it does not work well with
higher node mobility.
To prevent the flooding attack in MANET that can work well in higher node mobility
situation, we proposed a novel technique which uses the trust estimation function and delay
queue in basic DSR routing protocol.
3. DSR
The Dynamic Source Routing (DSR) protocol is an on-demand routing protocol. [2,9]. DSR
protocol maintains the route cache to store the route to the mobile node it is aware. This protocol
composed of two major phases: route discovery and route maintenance. Whenever any node
has the data to send, first it checks the route cache for the route to the destination. if it has the
unexpired route, then it uses it otherwise initiate a route discovery process by broadcasting the
RREQ packet which contains the source address and the destination address. Whenever any
intermediate node receives the RREQ, and it does not have the route to the destination it adds
its own address in the route record and forward to its neighbor. RREP is generated whenever
RREQ reaches to destination node or intermediate node which has the route to destination in
its route cache. Route maintenance mechanism is used to detect whether the path to the
destination exist or not. Route maintenance uses the route error message and acknowledgement
Route error message is initiated whenever the destination’s data link layer recognizes any
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa
Rao
http://www.iaeme.com/IJARET/index.asp 293 editor@iaeme.com
transmission error. DSR is suited for small to medium sized networks as its packet overhead
(not packet data overhead) can scale all the way down to zero when all nodes are relatively
stationary. The packet data overhead will increase significantly for networks with larger hop
diameters as more routing information will need to be contained in the packet headers.
4. FLOODING ATTACK
Flooding attack is a denial of service type of attack in which the malicious node broadcast the
excessive false packet in the network to consume the available resources so that valid or
legitimated user can not able to use the network resources for valid communication. Because
of the limited resource constraints in the mobile ad hoc networks resource consumption due to
flooding attack reduces the throughput of the network.
The flooding attack is possible in all most all the on-demand routing, even in the secure on
demand routing SRP, SAODV, ARAN, Ariadne etc. Depending upon the type of packet used
to flood the network, flooding attack can be categorized in two categories.
RREQ flooding DATA flooding
5. RREQ FLOODING
In the RREQ flooding attack, the attacker broadcast the many RREQ packets per time interval
to the IP address which does not exist in the network and disable the limited flooding feature.
On demand routing protocols uses the route discovery process to obtain the route between
the two nodes. In the route discovery the source node broadcast the RREQ packets in the
network. Because the priority of the RREQ control packet is higher than data packet then at the
high load also RREQ packet are transmitted. A malicious node exploits this feature of on
demand routing to launch the RREQ flooding attack.
6. DATA FLOODING
In the data flooding, malicious node floods the network by sending useless data packets. To
launch the data flooding, first malicious node built a path to all the nodes then sends the large
amount of bogus data packets. These useless data packet exhausts the network resources and
hence legitimated user can not able to use the resources for valid communication.
7. PROPOSED APPROACH
The proposed flooding attack detection and prevention model is distributed cooperative model
in which all the node locally run the intrusion detection code and cooperate with each other to
detect and prevent flooding attack in the network.
In our work we have used the Dynamic Source Routing (DSR) routing protocol along with
the trust estimation function. Because the communication between the node in the MANET
depends on the cooperation and the trust level on its neighbors so to calculate the trust level,
we have used the trust estimation function in the Route discovery phase of the basic DSR
routing protocol which will calculate the trust level of each neighboring node. Various
parameters which are used for trust estimation are: Total number of RREQ packet sent by the
neighbor per unit time, total number of packets successfully transmitted by the neighbor, Ratio
of number of packets received correctly from the neighbor to the total number of received
packet.
In our scheme based on their relationship with the neighboring node, we have categorized
the node in three categories that are given below.
• Stranger,
• Acquaintance and Friend.
A Security Scheme Based on Trust Attack in Manet
http://www.iaeme.com/IJARET/index.asp 294 editor@iaeme.com
7.1. STRANGER
The strangers are the non-trusted node means a stranger node is a node with minimum trust
level. Initially when any node joins the network, then this trust relationship with its all the
neighbors are low or negligible this that node is treated as stranger.
7.2. ACQUANTANCE
These are the nodes which have the trust level between the friends and stranger. Means a node
is acquaintance to its neighbor means it has received some packets through that node.
7.3. FRIEND
Friends are most trusted nodes or the nodes with highest trust level can be treated as friends.
Here the higher trust level means neighbors had received or transfer many packets successfully
through this particular node.
During the route discovery phase of the DSR Routing protocol, the trust value is also
computed for all the neighbors of any node. The result of trust estimation function is the
relationship status of all of neighbors as friend, acquaintance or stranger.
Consider a MANET of figure 1 with seven nodes. (n0 – n6) where node n1, n2, n3, n4,n5,n6
are the neighbors node of node n0. Node n1 and n3 has a friend relationship with n0, node n2
and n4 are stranger to n0 and n5 and n6 are acquaintance to node n0. These relationships are
shown in the friendship table 1.
To detect the intrusion, in our scheme each node stores a friendship table. Friendship table
is used to store the relationship status of any node with its neighbors. The friendship table has
two columns. First the identifier or name of all of its neighboring node and second its
relationship status with the neighbor node that could be either friend, Acquaintance or stranger.
This table is referred every time when any node receives the packets.
Initially when node joins the networks they are considered as a stranger. A node is
considered as a stranger if nodes have never sent or receive message to or from the neighbor.
A node is considered as an acquaintance if its trust level is neither very neither low nor too high
means node receives some packet through this neighbor. If node receives many packets to or
from any node successfully, then trust level is very high the node is considered as a friend.
There is very high probability of attack from stranger but very low probability from friend.
Different threshold values are defined for different types of neighbors to become friend,
Acquaintance and stranger. Tracq and Trfri are the threshold values for the acquaintance and
the friend respectively. Along with this every node maintains a local counter to count RREQ
that is compared with threshold value of neighbors. If RREQ count is greater than Trfri then
neighbor is considered as a friend and if it is greater than Tracq and less than Trfri then neighbor
is acquaintance otherwise considered as a stranger.
To extend the method proposed in [5] for higher node mobility, we added the concept of
delay queue. Consider the situation where the node mobility is very higher so all most all the
nodes relationship status can be stranger or acquaintance because to become a friend to its
neighbor, node has to forward many packets successfully to its neighbor. But because of the
higher mobility nodes changes its position frequently so possibility of friend relationship is very
low. As we know that the threshold value of the stranger or acquaintance is lower than the
friends so if any node sends many RREQ packets per unit time because of the mobility this is
considered as misbehavior because its count exceeds threshold limits. Then according to
method proposed in [5], the neighbor node discards the packets and declare the node as a
intruder or malicious node, which is not true. So, to deal with such kind of situations we have
added the concept of delay queue here.
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa
Rao
http://www.iaeme.com/IJARET/index.asp 295 editor@iaeme.com
S: Stranger
A: Acquaintance
F: Friend
Figure 1 Nodes in a MANET with F-S-A relationship
Table 1 Friendship table of node n0
Neighbors
Relationship
status
n1 Friend
n2 Stranger
n3 Friend
n4 Stranger
n5 Acquaintance
n6 Acquaintance
In our scheme, to detect the flooding attack, when any node receives the RREQ from its
neighbors then it performs the following steps:
1. It increments the R[i] by one which is a counter maintained by every node for its
neighbor which indicates how many RREQ packets it has received from its
neighbor.
2. It checks the friendship table to check what type of relationship it is having with this
neighbor. It could be friend, acquaintance or stranger.
3. Compares the R[i] with the corresponding threshold values which is a node
maximum number of RREQ packets that can be allowed from its neighbor.
4. If the neighbor is friend node then it compares whether the R[i] is below the
threshold value Xtf then it forwards the packet to next hop otherwise discard the
packet and blacklist the node.
5. If the neighbor is acquaintance and the R[i] is less than Xta then it forwards the
packet otherwise put the node in to the delay queue and allow the node to forward
the some packets and analyze its behavior continuously, if still it is misbehaving
then declare as an intruder and blacklist the node otherwise treat a normal node.
n4
n6
n1
n3
n2
n0
n5
F
F
S
S
A
A
A Security Scheme Based on Trust Attack in Manet
http://www.iaeme.com/IJARET/index.asp 296 editor@iaeme.com
6. If the neighbor is stranger and R[i] is less than Xts then forward otherwise discard
the packet and blacklist the node.
8. SIMULATION RESULTS
We used the NS-2 simulator to analyze the performance of proposed scheme. The DSR
routing protocol is used for all simulation and the other simulation parameters are shown in the
table 2. The topology of the MANET depends on the pause time and mobility speed. It changes
frequently when pause time is less and mobility speed is more.
We compare the performance of original DSR protocol in presence of malicious node and
the performance of proposed technique in presence of malicious node. To evaluate the
performance of the system, we used total number of RREQ sent and RREQ received in the
network as a performance matrix.
Table 2 Simulation Parameters
No. of nodes 50
Simulation time 300 sec
Mobility speed 20 ms
Pause time 0 to 150 ms
Routing algorithm DSR
Mobility model Random waypoint
Simulation area 1500 X 300
Packets Rate 4/sec
Packet size 512
Traffic type CBR(UDP)
No. of malicious node 1 to 10
The figure shows the graph of total RREQ sent/receives versus malicious node with
mobility speed 20 and pause time zero (0). It is clear from the graph that total number of RREQ
packet in the network increases with malicious node because malicious node floods the RREQ
packet in the network.
Figure 2 Analysis of RREQ sent
0
10000
20000
30000
40000
50000
60000
70000
80000
90000
100000
1 3 5 10
Malicious node
without Prevention
with prevention
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa
Rao
http://www.iaeme.com/IJARET/index.asp 297 editor@iaeme.com
Figure 3 Analysis of RREQ received
The above figure shows that the proposed approach can able to prevent attack up to great
extent.
The Figure 4 shows the graph of total RREQ sent in the network with varying mobility
speed and pause time which uses the above simulation parameter with 10 malicious nodes. It
also compares the basic DSR routing with proposed method in the presence of malicious node
and it is clear that our propose approach efficiently reduces the flooded RREQ packets from the
network
Figure 4 Performance on different mobility speed and pause time
9. CONCLUSION
In this paper, we present a distributive approach to detect and prevent the RREQ flooding
attack. The effectiveness of the proposed technique depends on the selection of threshold
values. Although, the concept of delay queue reduces the probability of accidental blacklisting
of the node, but it also delays the detection of misbehaving node by allowing him sends more
packet until delay queue time out occurs. Further the proposed method can be extended to
prevent data flooding also.
0
200000
400000
600000
800000
1000000
1200000
1400000
1600000
1800000
1 3 5 10
Malicious node
Without Prevention
With Prevention
0
20000
40000
60000
80000
100000
120000
0/20 0/50 50/20 50/50 150/20 150/50
Mobility Speed and Pause time
without prevention
With Prevention
A Security Scheme Based on Trust Attack in Manet
http://www.iaeme.com/IJARET/index.asp 298 editor@iaeme.com
REFERENCES
[1] Lidong Zhou and Zygmunt J. HaasHappy sankranti/pongalhttp://crackspider.net/ “Securing
Ad Hoc Networks “In Proc IEEE, special issue on network security, November/December
1999.
[2] Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi” Investigating Intrusion
Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving
[3] Nodes” World Academy of Science, Engineering and Technology 44 2008
[4] Elizabeth M. Royer, University of California, Santa Barbara Chai-Keong Toh, Georgia
Institute of Technology” A Review of Current Routing Protocols for Ad Hoc Mobile
[5] Wireless Networks”IEEE personal communication,Apr 1999
[6] Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhang
[7] “Resisting Flooding Attacks in Ad Hoc Networks” Proceedings of the International
Conference on Information
[8] Technology: Coding and Computing (ITCC’05) 0-7695-2315-3/05 $ 20.00 IEEE
[9] Bo-Cang Peng and Chiu-Kuo Liang”Prevention techniques for flooding attack in Ad Hoc
Networks”
[10] Jian-Hua Song1, 2, Fan Hong1, Yu Zhang1 “Effective Filtering Scheme against RREQ
Flooding Attack in Mobile
[11] Ad Hoc Networks “Proceedings of the Seventh International Conference on Parallel
and Distributed
[12] Computing,Applications and Technologies (PDCAT'06)0-2736-1/06 $20.00 © 2006
[13] Venkat Balakrishnan, Vijay Varadharajan,and Uday Tupakula” Mitigating Flooding
attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications” The 2nd
International Conference on Wireless Broadband and
[14] Ultra-Wideband Communications (AusWireless 2007) 0-2842-2/07 $25.00 © 2007
[15] Revathi Venkataraman, M. Pushpalatha, Rishav Khemka and T. Rama Rao “prevention of
flooding attack in mobile ad hoc network”. International Conference on Advances in
Computing, Communication and Control (ICAC3’09).
[16] David B. Johnson David A. Maltz Josh Broch “DSR: The Dynamic Source Routing
Protocol for Multi-Hop Wireless Ad Hoc Networks “http://www.monarch.cs.cmu.edu/
[17] Ioanna Stamouli, Patroklos G. Argyroudis, and Hitesh Tewari” Real-time Intrusion
Detection for Ad hoc Networks” Proceedings of the Sixth IEEE International Symposium
on a World of Wireless Mobile and Multimedia Networks (WoWMoM’05) 0-7695-2342-
0/05 $20.00 © 2005 IEEE [11] V. Madhu Viswanatham and A.A. Chari”An Approach for
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa
Rao
http://www.iaeme.com/IJARET/index.asp 299 editor@iaeme.com
Detecting Attacks in Mobile Adhoc Networks” Journal of Computer Science 4 (3): 245-
251, 2008 ISSN 1549-3636 © 2008 Science Publications
[18] [12] Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad hoc Networks”, In Proc.
ACM/IEEE Int’l. Conf. on Mobile Computing and Networking, pp 275-283, 2000. [13] S.
Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehaviour in Mobile Ad
hoc Networks”, In Proc. ACM/IEEE Int’l Conf. on Mobile Computing and Networking, pp.
255-265, 2000.
[19] R.Ranjana and M.Rajaram, “Detecting Intrusion Attacks in Ad-hoc Networks," Asian
journal in information technology 6(7) 758-761,2007
[20] Dorothy E. Denning” AN INTRUSION-DETECTION MODEL” IEEE transaction on
software engineering, vol. 13, no. 7, pp 222-232, Feb 1987.

More Related Content

What's hot

Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byranjith kumar
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...IISTech2015
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
 
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSAN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSIAEME Publication
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETijsptm
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byjpstudcorner
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET Journal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...ijiert bestjournal
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
 

What's hot (16)

Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
 
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
 
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSAN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
 
zebra curtain
zebra curtainzebra curtain
zebra curtain
 
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNA Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSN
 

Similar to A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET

Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packeteSAT Publishing House
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
Public key based approach to mitigate wormhole attack repaired
Public key based approach to mitigate wormhole attack  repaired Public key based approach to mitigate wormhole attack  repaired
Public key based approach to mitigate wormhole attack repaired prjpublications
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...IJLT EMAS
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 

Similar to A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET (20)

Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
B010110514
B010110514B010110514
B010110514
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
ant2
ant2ant2
ant2
 
Public key based approach to mitigate wormhole attack repaired
Public key based approach to mitigate wormhole attack  repaired Public key based approach to mitigate wormhole attack  repaired
Public key based approach to mitigate wormhole attack repaired
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
 
He3413241328
He3413241328He3413241328
He3413241328
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
E41022938
E41022938E41022938
E41022938
 
A43030104
A43030104A43030104
A43030104
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 

Recently uploaded (20)

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET

  • 1. http://www.iaeme.com/IJARET/index.asp 290 editor@iaeme.com International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 10, Issue 2, March-April 2019, pp. 290-299, Article ID: IJARET_10_02_029 Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02 ISSN Print: 0976-6480 and ISSN Online: 0976-6499 © IAEME Publication A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET Syeda Kausar Fatima Research Scholar JNTUH, Prof., DCET, Hyderabad, Principal NSAKCET, Prof., ECE Dept, JNTUH, India. Dr. Syeda Gauhar Fatima Research Scholar JNTUH, Prof., DCET, Hyderabad, Principal NSAKCET, Prof., ECE Dept, JNTUH, India. Dr. Syed Abdul Sattar Research Scholar JNTUH, Prof., DCET, Hyderabad, Principal NSAKCET, Prof., ECE Dept, JNTUH, India. Dr. D.Srinivasa Rao Research Scholar JNTUH, Prof., DCET, Hyderabad, Principal NSAKCET, Prof., ECE Dept, JNTUH, India. ABSTRACT Mobile ad hoc are gaining popularity because of availability of low-cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denials of service type of attacks are possible in the MANET and one of these type attacks is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol. Keywords Mobile Ad-hoc Networks, Denial of service, Flooding Attack. Cite this Article: Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa Rao, A Security Scheme Based On Trust Attack In Manet, International Journal of Advanced Research in Engineering and Technology, 10(2), 2019, pp. 290-299. http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
  • 2. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa Rao http://www.iaeme.com/IJARET/index.asp 291 editor@iaeme.com 1. INTRODUCTION Mobile ad hoc networks have been gaining popularity because of availability of low-cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANET is a collection of mobile nodes with routing capabilities and connected with wireless link. Mobile node can directly communicate to each other if they fall in the radio coverage range of each other [1]. In order to forward the packet to the node which are beyond the coverage range, MANET uses the concept of multi hop communication. Nodes in the MANET are free to move, which dynamically changes the topology of the network. It does not require any expensive infrastructure to support the mobility [2]. Creating the Ad hoc networks is possible where implementation of infrastructure is not possible or expensive. MANET are generally formed for short range communication. The performance/speed of the network depends on the number of devices; it degrades as the number of devices increases because all the devices shares the available network resources. Like conventional wired network MANET also uses routing protocols to route the packets to its destination. Ad hoc networks routing protocols are divided into two categories: Proactive and reactive [3]. Proactive routing protocols are also known as “table driven” routing. In this, all the nodes store the routing information about other node present in the networks and routing updates are propagated in the network whenever network topology changes. The advantage of proactive routing protocol is that node experiences minimal delay when route is needed, and unexpired route is available in the routing table, but the disadvantage of proactive routing is that these are not scalable, and maintenance of routing table requires substantial network resources. In the case of reactive routing protocol, route between the nodes is searched only when node wants to communicate with another node. To discover the routes, they use route discovery procedure which in turns uses the flooding method. In this, initiator forwards the RREQ packet to all of its neighbor’s. If neighbor has the route for destination, they reply otherwise forward the RREQ to the next node. In this way RREQ packet reaches to the destination which sends the reply to RREQ. But the method which is used to facilitate route discovery are used by the Intruders or the malicious node to consume the network resources which may lead to flooding attack. In this paper, we propose a novel technique which uses the DSR on demand routing protocol to reduce the effect of RREQ flooding attack in the networks with high node mobility. The organization of this paper is as follows. Section 2 provides the overview of related work. Section 3 described the Flooding attacks and its types. Section 4 presents the DSR routing protocol. Section 5 presents our proposal to prevent the RREQ flooding attack. Section 6 shows the result of the proposed technique, and finally, the section 7 concludes the paper. 2. RELATED WORK Significant works have been done in securing the ad hoc network. Some researches defined the method for secure routing, but secure routing also can not able to handle the flooding attack. The first flooding attack prevention (FAP) method was proposed in [4]. In their paper, first they described RREQ flooding and data flooding. This was the first paper that addressed the prevention of flooding attack in ad hoc network. The authors proposed the separate approach for RREQ flooding and data flooding. To resist the RREQ flooding, they defined the neighbor suppression method which prioritizes the node based on the number of RREQ received. A node gets higher priority if it sends less numbers of RREQ packets and defined the threshold value. To deal with data flooding they used path cutoff method. In this method when node identifies
  • 3. A Security Scheme Based on Trust Attack in Manet http://www.iaeme.com/IJARET/index.asp 292 editor@iaeme.com that sender is originating data flooding then it cutoff the path and sends the route error message. In this way attack is prevented up to some extent but the disadvantage of this method is flooding packet still exists in the network. This limitation of FAP is eliminated by [5] presented threshold prevention. In this method they defined the fixed threshold value for every node in the network. If any node receives the RREQ flooding packet more than the threshold value, then the sender is assumed as an attacker and all the packets from attacker is discarded by the receiver node. This method eliminates the flooding packet but if the intruder has the idea about the threshold value then it can bypass the TP mechanism. Normal node with high mobility is treated as the malicious node. In [6], the author proposed the distributive approach to resist the flooding attack. In this method they have used the two-threshold value; RATE_LIMIT and BLACKLIST_LIMIT. If RREQ count of any node is less then RATE_LIMIT then the request is processed otherwise check whether it is less then BLACKLIST_LIMIT, if yes then black list the node but if the count is greater than RREQ_LIMIT and less than BLACKLIST_LIMIT then put the RREQ in the delay queue and process after queue time out occurs. This method can Handel the network with high mobility. In [7], the author analyzed the flooding attack in anonymous communication. They used the threshold tuple which consist of three components: transmission threshold, blacklist threshold and white listing threshold. if any node generates RREQ packet more than transmission threshold then its neighbor discards the packet if it crosses the transmission threshold more than blacklist threshold then its black list the node. But to deal with accidental blacklisting they defined white listing threshold. If any node performs good for number of intervals equal to white listing threshold then it again starts treating as a normal node. In [8], the author used the extended DSR protocol based on the trust function to mitigate the effects of flooding attack. In this work, based on the trust value they categorized the nodes in three categories: Friends, acquaintance and stranger. Stranger are the non-trusted node, friends are the trusted node and acquaintance has the trust values more than stranger and less than friends. based on relationship they define the three-threshold value. If any node receives the RREQ packets, then checks the relationship and based on that it checks for the threshold value if it is less than the threshold then forwards the packet otherwise discard the packet and blacklist the neighbor node. The main problem with this method was it does not work well with higher node mobility. To prevent the flooding attack in MANET that can work well in higher node mobility situation, we proposed a novel technique which uses the trust estimation function and delay queue in basic DSR routing protocol. 3. DSR The Dynamic Source Routing (DSR) protocol is an on-demand routing protocol. [2,9]. DSR protocol maintains the route cache to store the route to the mobile node it is aware. This protocol composed of two major phases: route discovery and route maintenance. Whenever any node has the data to send, first it checks the route cache for the route to the destination. if it has the unexpired route, then it uses it otherwise initiate a route discovery process by broadcasting the RREQ packet which contains the source address and the destination address. Whenever any intermediate node receives the RREQ, and it does not have the route to the destination it adds its own address in the route record and forward to its neighbor. RREP is generated whenever RREQ reaches to destination node or intermediate node which has the route to destination in its route cache. Route maintenance mechanism is used to detect whether the path to the destination exist or not. Route maintenance uses the route error message and acknowledgement Route error message is initiated whenever the destination’s data link layer recognizes any
  • 4. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa Rao http://www.iaeme.com/IJARET/index.asp 293 editor@iaeme.com transmission error. DSR is suited for small to medium sized networks as its packet overhead (not packet data overhead) can scale all the way down to zero when all nodes are relatively stationary. The packet data overhead will increase significantly for networks with larger hop diameters as more routing information will need to be contained in the packet headers. 4. FLOODING ATTACK Flooding attack is a denial of service type of attack in which the malicious node broadcast the excessive false packet in the network to consume the available resources so that valid or legitimated user can not able to use the network resources for valid communication. Because of the limited resource constraints in the mobile ad hoc networks resource consumption due to flooding attack reduces the throughput of the network. The flooding attack is possible in all most all the on-demand routing, even in the secure on demand routing SRP, SAODV, ARAN, Ariadne etc. Depending upon the type of packet used to flood the network, flooding attack can be categorized in two categories. RREQ flooding DATA flooding 5. RREQ FLOODING In the RREQ flooding attack, the attacker broadcast the many RREQ packets per time interval to the IP address which does not exist in the network and disable the limited flooding feature. On demand routing protocols uses the route discovery process to obtain the route between the two nodes. In the route discovery the source node broadcast the RREQ packets in the network. Because the priority of the RREQ control packet is higher than data packet then at the high load also RREQ packet are transmitted. A malicious node exploits this feature of on demand routing to launch the RREQ flooding attack. 6. DATA FLOODING In the data flooding, malicious node floods the network by sending useless data packets. To launch the data flooding, first malicious node built a path to all the nodes then sends the large amount of bogus data packets. These useless data packet exhausts the network resources and hence legitimated user can not able to use the resources for valid communication. 7. PROPOSED APPROACH The proposed flooding attack detection and prevention model is distributed cooperative model in which all the node locally run the intrusion detection code and cooperate with each other to detect and prevent flooding attack in the network. In our work we have used the Dynamic Source Routing (DSR) routing protocol along with the trust estimation function. Because the communication between the node in the MANET depends on the cooperation and the trust level on its neighbors so to calculate the trust level, we have used the trust estimation function in the Route discovery phase of the basic DSR routing protocol which will calculate the trust level of each neighboring node. Various parameters which are used for trust estimation are: Total number of RREQ packet sent by the neighbor per unit time, total number of packets successfully transmitted by the neighbor, Ratio of number of packets received correctly from the neighbor to the total number of received packet. In our scheme based on their relationship with the neighboring node, we have categorized the node in three categories that are given below. • Stranger, • Acquaintance and Friend.
  • 5. A Security Scheme Based on Trust Attack in Manet http://www.iaeme.com/IJARET/index.asp 294 editor@iaeme.com 7.1. STRANGER The strangers are the non-trusted node means a stranger node is a node with minimum trust level. Initially when any node joins the network, then this trust relationship with its all the neighbors are low or negligible this that node is treated as stranger. 7.2. ACQUANTANCE These are the nodes which have the trust level between the friends and stranger. Means a node is acquaintance to its neighbor means it has received some packets through that node. 7.3. FRIEND Friends are most trusted nodes or the nodes with highest trust level can be treated as friends. Here the higher trust level means neighbors had received or transfer many packets successfully through this particular node. During the route discovery phase of the DSR Routing protocol, the trust value is also computed for all the neighbors of any node. The result of trust estimation function is the relationship status of all of neighbors as friend, acquaintance or stranger. Consider a MANET of figure 1 with seven nodes. (n0 – n6) where node n1, n2, n3, n4,n5,n6 are the neighbors node of node n0. Node n1 and n3 has a friend relationship with n0, node n2 and n4 are stranger to n0 and n5 and n6 are acquaintance to node n0. These relationships are shown in the friendship table 1. To detect the intrusion, in our scheme each node stores a friendship table. Friendship table is used to store the relationship status of any node with its neighbors. The friendship table has two columns. First the identifier or name of all of its neighboring node and second its relationship status with the neighbor node that could be either friend, Acquaintance or stranger. This table is referred every time when any node receives the packets. Initially when node joins the networks they are considered as a stranger. A node is considered as a stranger if nodes have never sent or receive message to or from the neighbor. A node is considered as an acquaintance if its trust level is neither very neither low nor too high means node receives some packet through this neighbor. If node receives many packets to or from any node successfully, then trust level is very high the node is considered as a friend. There is very high probability of attack from stranger but very low probability from friend. Different threshold values are defined for different types of neighbors to become friend, Acquaintance and stranger. Tracq and Trfri are the threshold values for the acquaintance and the friend respectively. Along with this every node maintains a local counter to count RREQ that is compared with threshold value of neighbors. If RREQ count is greater than Trfri then neighbor is considered as a friend and if it is greater than Tracq and less than Trfri then neighbor is acquaintance otherwise considered as a stranger. To extend the method proposed in [5] for higher node mobility, we added the concept of delay queue. Consider the situation where the node mobility is very higher so all most all the nodes relationship status can be stranger or acquaintance because to become a friend to its neighbor, node has to forward many packets successfully to its neighbor. But because of the higher mobility nodes changes its position frequently so possibility of friend relationship is very low. As we know that the threshold value of the stranger or acquaintance is lower than the friends so if any node sends many RREQ packets per unit time because of the mobility this is considered as misbehavior because its count exceeds threshold limits. Then according to method proposed in [5], the neighbor node discards the packets and declare the node as a intruder or malicious node, which is not true. So, to deal with such kind of situations we have added the concept of delay queue here.
  • 6. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa Rao http://www.iaeme.com/IJARET/index.asp 295 editor@iaeme.com S: Stranger A: Acquaintance F: Friend Figure 1 Nodes in a MANET with F-S-A relationship Table 1 Friendship table of node n0 Neighbors Relationship status n1 Friend n2 Stranger n3 Friend n4 Stranger n5 Acquaintance n6 Acquaintance In our scheme, to detect the flooding attack, when any node receives the RREQ from its neighbors then it performs the following steps: 1. It increments the R[i] by one which is a counter maintained by every node for its neighbor which indicates how many RREQ packets it has received from its neighbor. 2. It checks the friendship table to check what type of relationship it is having with this neighbor. It could be friend, acquaintance or stranger. 3. Compares the R[i] with the corresponding threshold values which is a node maximum number of RREQ packets that can be allowed from its neighbor. 4. If the neighbor is friend node then it compares whether the R[i] is below the threshold value Xtf then it forwards the packet to next hop otherwise discard the packet and blacklist the node. 5. If the neighbor is acquaintance and the R[i] is less than Xta then it forwards the packet otherwise put the node in to the delay queue and allow the node to forward the some packets and analyze its behavior continuously, if still it is misbehaving then declare as an intruder and blacklist the node otherwise treat a normal node. n4 n6 n1 n3 n2 n0 n5 F F S S A A
  • 7. A Security Scheme Based on Trust Attack in Manet http://www.iaeme.com/IJARET/index.asp 296 editor@iaeme.com 6. If the neighbor is stranger and R[i] is less than Xts then forward otherwise discard the packet and blacklist the node. 8. SIMULATION RESULTS We used the NS-2 simulator to analyze the performance of proposed scheme. The DSR routing protocol is used for all simulation and the other simulation parameters are shown in the table 2. The topology of the MANET depends on the pause time and mobility speed. It changes frequently when pause time is less and mobility speed is more. We compare the performance of original DSR protocol in presence of malicious node and the performance of proposed technique in presence of malicious node. To evaluate the performance of the system, we used total number of RREQ sent and RREQ received in the network as a performance matrix. Table 2 Simulation Parameters No. of nodes 50 Simulation time 300 sec Mobility speed 20 ms Pause time 0 to 150 ms Routing algorithm DSR Mobility model Random waypoint Simulation area 1500 X 300 Packets Rate 4/sec Packet size 512 Traffic type CBR(UDP) No. of malicious node 1 to 10 The figure shows the graph of total RREQ sent/receives versus malicious node with mobility speed 20 and pause time zero (0). It is clear from the graph that total number of RREQ packet in the network increases with malicious node because malicious node floods the RREQ packet in the network. Figure 2 Analysis of RREQ sent 0 10000 20000 30000 40000 50000 60000 70000 80000 90000 100000 1 3 5 10 Malicious node without Prevention with prevention
  • 8. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa Rao http://www.iaeme.com/IJARET/index.asp 297 editor@iaeme.com Figure 3 Analysis of RREQ received The above figure shows that the proposed approach can able to prevent attack up to great extent. The Figure 4 shows the graph of total RREQ sent in the network with varying mobility speed and pause time which uses the above simulation parameter with 10 malicious nodes. It also compares the basic DSR routing with proposed method in the presence of malicious node and it is clear that our propose approach efficiently reduces the flooded RREQ packets from the network Figure 4 Performance on different mobility speed and pause time 9. CONCLUSION In this paper, we present a distributive approach to detect and prevent the RREQ flooding attack. The effectiveness of the proposed technique depends on the selection of threshold values. Although, the concept of delay queue reduces the probability of accidental blacklisting of the node, but it also delays the detection of misbehaving node by allowing him sends more packet until delay queue time out occurs. Further the proposed method can be extended to prevent data flooding also. 0 200000 400000 600000 800000 1000000 1200000 1400000 1600000 1800000 1 3 5 10 Malicious node Without Prevention With Prevention 0 20000 40000 60000 80000 100000 120000 0/20 0/50 50/20 50/50 150/20 150/50 Mobility Speed and Pause time without prevention With Prevention
  • 9. A Security Scheme Based on Trust Attack in Manet http://www.iaeme.com/IJARET/index.asp 298 editor@iaeme.com REFERENCES [1] Lidong Zhou and Zygmunt J. HaasHappy sankranti/pongalhttp://crackspider.net/ “Securing Ad Hoc Networks “In Proc IEEE, special issue on network security, November/December 1999. [2] Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi” Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving [3] Nodes” World Academy of Science, Engineering and Technology 44 2008 [4] Elizabeth M. Royer, University of California, Santa Barbara Chai-Keong Toh, Georgia Institute of Technology” A Review of Current Routing Protocols for Ad Hoc Mobile [5] Wireless Networks”IEEE personal communication,Apr 1999 [6] Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhang [7] “Resisting Flooding Attacks in Ad Hoc Networks” Proceedings of the International Conference on Information [8] Technology: Coding and Computing (ITCC’05) 0-7695-2315-3/05 $ 20.00 IEEE [9] Bo-Cang Peng and Chiu-Kuo Liang”Prevention techniques for flooding attack in Ad Hoc Networks” [10] Jian-Hua Song1, 2, Fan Hong1, Yu Zhang1 “Effective Filtering Scheme against RREQ Flooding Attack in Mobile [11] Ad Hoc Networks “Proceedings of the Seventh International Conference on Parallel and Distributed [12] Computing,Applications and Technologies (PDCAT'06)0-2736-1/06 $20.00 © 2006 [13] Venkat Balakrishnan, Vijay Varadharajan,and Uday Tupakula” Mitigating Flooding attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications” The 2nd International Conference on Wireless Broadband and [14] Ultra-Wideband Communications (AusWireless 2007) 0-2842-2/07 $25.00 © 2007 [15] Revathi Venkataraman, M. Pushpalatha, Rishav Khemka and T. Rama Rao “prevention of flooding attack in mobile ad hoc network”. International Conference on Advances in Computing, Communication and Control (ICAC3’09). [16] David B. Johnson David A. Maltz Josh Broch “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks “http://www.monarch.cs.cmu.edu/ [17] Ioanna Stamouli, Patroklos G. Argyroudis, and Hitesh Tewari” Real-time Intrusion Detection for Ad hoc Networks” Proceedings of the Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM’05) 0-7695-2342- 0/05 $20.00 © 2005 IEEE [11] V. Madhu Viswanatham and A.A. Chari”An Approach for
  • 10. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa Rao http://www.iaeme.com/IJARET/index.asp 299 editor@iaeme.com Detecting Attacks in Mobile Adhoc Networks” Journal of Computer Science 4 (3): 245- 251, 2008 ISSN 1549-3636 © 2008 Science Publications [18] [12] Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad hoc Networks”, In Proc. ACM/IEEE Int’l. Conf. on Mobile Computing and Networking, pp 275-283, 2000. [13] S. Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehaviour in Mobile Ad hoc Networks”, In Proc. ACM/IEEE Int’l Conf. on Mobile Computing and Networking, pp. 255-265, 2000. [19] R.Ranjana and M.Rajaram, “Detecting Intrusion Attacks in Ad-hoc Networks," Asian journal in information technology 6(7) 758-761,2007 [20] Dorothy E. Denning” AN INTRUSION-DETECTION MODEL” IEEE transaction on software engineering, vol. 13, no. 7, pp 222-232, Feb 1987.