Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Advance Security in Mobile Ad Hoc Network Using Direct and Indirect Observation

Author : C.Balaraman 1 Mr.M.Balamurugan 2

Date of Publication :7th April 2015

Abstract: The dynamic behavior of MANETs may lead to many security vulnerabilities. To avoid the hackers, a globally trust management that enhances security in MANETs is used. The trust management scheme has two methods, trust from direct observation method and trust from indirect observation method. The direct observation method source can monitor one hop neighbor node. On the other hand, with indirect observation, source will send recommendation message to all the neighbor nodes, and each neighbor will send the trust value of its neighbors to source node. Source will validate the message and select the best route without malicious activities. The two trust modal are combined to produce more accurate trust values and it provide more security. Reputation is added in trust evaluation. Modified AODV protocol is used here for solving black hole attack in MANETs.

Reference :

    1. Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai,Defending Against Collaborative Attacks By Malicious Nodes In MANETs:A cooperative Bait Detection Approach,2014. page number:1-11.
    2. A.Baadache and A.Belmehdi,“Avoiding blackhole and cooperative blackhole attacks in wireless adhoc networks,”Intl.J.Comput.Sci. Inf.Security, vol. 7, 1, 2010.Page number : 35-43
    3. K.Vishnu and A.J Paul, “Detection and removal of cooperative black/gray hole attack in Mobile ad hoc networks,” Int. J. Comput. Appl., vol. 1, no. 22, 2010.page number: 28–32.
    4. P.-C. Tsou, J.-M. Chang, H.-C. Chao, and J.-L. Chen,“CBDS:A cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture,” in Proc. 2 ndIntl.Conf.WirelessCommun.,VITAE,Chenai,India,F eb.28–Mar.,03,2011,page number: 1–5.
    5. S. Corson and J. Macker, RFC 2501, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations,Jan. 1999. (Last retrieved March 18, 2013).page number:1-6.
    6. W. Kozma and L. Lazos, “REAct: resource-efficient accountability for node misbehavior in ad hoc networks based on random audits,” in Proc.WiSec, 2009,page number:103–110

Recent Article