CFP last date
22 April 2024
Reseach Article

Trust based Data Plane Security Mechanism for a Mobile Ad hoc Network through Acknowledgement Reports

by Shirina Samreen, G. Narsimha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 6
Year of Publication: 2015
Authors: Shirina Samreen, G. Narsimha
10.5120/ijca2015906926

Shirina Samreen, G. Narsimha . Trust based Data Plane Security Mechanism for a Mobile Ad hoc Network through Acknowledgement Reports. International Journal of Computer Applications. 129, 6 ( November 2015), 6-13. DOI=10.5120/ijca2015906926

@article{ 10.5120/ijca2015906926,
author = { Shirina Samreen, G. Narsimha },
title = { Trust based Data Plane Security Mechanism for a Mobile Ad hoc Network through Acknowledgement Reports },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 6 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number6/23075-2015906926/ },
doi = { 10.5120/ijca2015906926 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:40.704413+05:30
%A Shirina Samreen
%A G. Narsimha
%T Trust based Data Plane Security Mechanism for a Mobile Ad hoc Network through Acknowledgement Reports
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 6
%P 6-13
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Malicious packet drop attack over the data plane in a MANET involves malicious nodes dropping the data packets after the route formation. In this paper, a security mechanism has been proposed to detect those nodes which exhibit the malicious behavior by dropping the data packets during the data transmission phase after participating in the route establishment phase without exhibiting any malicious behavior. The detection is done based upon a trust management framework employing the Dempster Shafer Theory to represent the trust. The design of the trust management framework has been covered in earlier works and the current work focuses upon its application for the design of a novel security mechanism. Trust is computed based upon the forwarding behavior represented by acknowledgement reports submitted to the source node. The composition of the report ensures that the source node can verify its authenticity. Trust updates upon intermediate nodes are done by the source node at the end of a session which facilitates the secure route formation through the proposed mechanism. The efficiency and accuracy of the proposed security mechanism is validated using the network simulator ns2 and the experimental results show that the proposed mechanism outperforms the other schemes.

References
  1. Ming-Yang Su. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 2010
  2. M.Mohanapriya, Ilango Krishnamurthi. Modified DSR protocol for detection and removal of selective black hole attack in MANET. Comput and Elec Engg 2013
  3. Khalil And Bagchi: Stealthy Attacks In Wireless Ad Hoc Networks: Detection And Countermeasure, IEEE Trans On Mobile Computing, Vol. 10, No. 8, Aug 2011
  4. W. Kozma, and L. Lazos, “REAct: resource-efficient accountability for node misbehavior in ad hoc networks based on random audits”, Second ACM Conference on Wireless Network Security (WiSec), pp. 103-110, 2009
  5. Muhammad Zeshan, et al., “Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks”, Intern Seminar on Future Info Tech and Mgmt Engg, pp. 568- 572, Nov 2008
  6. Crepeau, C., et al., “A secure MANET routing Protocol with resilience against Byzantine behaviors of malicious or selfish nodes”. 21st IEEE Inter conf on Adv Info Net and App Workshops AINAW 2007, Canda (2007)
  7. Shirina Samreen and Dr. G. Narsimha, “Design of a Novel Trust Model and its application in Trust based Routing to defend against Dishonest Recommenders” in the International Journal of Computer Applications - IJCA, ISSN: 0975 – 8887, Volume 122, No. 2, pp-16-23, July 2015
Index Terms

Computer Science
Information Sciences

Keywords

Acknowledgement Reports Packet Droppers Trust Management Framework Reward Factor Punishment Factor.