CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Design and Development of Trust Based Approach to Mitigate Various Attacks in Mobile Ad-hoc Network

Published on October 2015 by Nilesh N. Dangare, R.S. Mangrulkar
International Conference on Advancements in Engineering and Technology (ICAET 2015)
Foundation of Computer Science USA
ICQUEST2015 - Number 8
October 2015
Authors: Nilesh N. Dangare, R.S. Mangrulkar
f6cc7303-b60a-4808-bd16-bd6dd9600576

Nilesh N. Dangare, R.S. Mangrulkar . Design and Development of Trust Based Approach to Mitigate Various Attacks in Mobile Ad-hoc Network. International Conference on Advancements in Engineering and Technology (ICAET 2015). ICQUEST2015, 8 (October 2015), 27-32.

@article{
author = { Nilesh N. Dangare, R.S. Mangrulkar },
title = { Design and Development of Trust Based Approach to Mitigate Various Attacks in Mobile Ad-hoc Network },
journal = { International Conference on Advancements in Engineering and Technology (ICAET 2015) },
issue_date = { October 2015 },
volume = { ICQUEST2015 },
number = { 8 },
month = { October },
year = { 2015 },
issn = 0975-8887,
pages = { 27-32 },
numpages = 6,
url = { /proceedings/icquest2015/number8/23033-2903/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advancements in Engineering and Technology (ICAET 2015)
%A Nilesh N. Dangare
%A R.S. Mangrulkar
%T Design and Development of Trust Based Approach to Mitigate Various Attacks in Mobile Ad-hoc Network
%J International Conference on Advancements in Engineering and Technology (ICAET 2015)
%@ 0975-8887
%V ICQUEST2015
%N 8
%P 27-32
%D 2015
%I International Journal of Computer Applications
Abstract

Mobile ad-hoc network (MANET) is used widely today. The work of MANET is totally depends on the cooperation of various nodes in the network. As we compared with the wired network, wireless network has various advantages, such as MANET doesn't require any infrastructure; it is decentralized system and dynamic in nature. Hence MANET is popular in various areas such as Military application, wireless sensor network, Public network and more. But these advantages of MANET may become disadvantages: As its openness, decentralized and dynamic nature, it is highly prone to various attacks. That's why security is the challenging job in MANET. Various existing system for detection of attacks is in-efficient and may require more computation and space as in cryptography technique. In this paper, the focus is given on the Trust based approach to mitigate the attack. In Trust based approach, the most trusted path is selected rather than the shortest path.

References
  1. Pallavi Kharti, "Using Identity and Trust with Key Management for achieving Security in Ad-hoc network", IEEE, 978-1-4799-2572-8/2014.
  2. Muhammad Ali, Subhan Ahmed and Ahsan Mehmood, "Deployment of Security Algorithm in MANETs", IJCCSE, May 2014.
  3. Prof. Ramya S. Pure, Gauri Patil and Manzoor Hussaion, "Trust based solution using counter strategies for Routing attacks in MANET", IJISET, Vol. 1, Issue 4, June 2014.
  4. Poonam Gera, Kumkum Garg and Manoj Mishra, "Trust-based Multi- Path Routing for Enhancing Data Security in MANETs", International Journal of Network & Security, Vol. 16, No. 2, PP. 102-111, March 2014.
  5. Prema Jagtap, Seema Ladhe and Sachin Chavan, "Numerous Approaches to Overcome from Black hole Attack in MANET", IJSER, Vol. 5, Issue 2, February 2014.
  6. Naveen Kumar Gupta and Kavita Pandey, "Trust Based Ad-hoc On Demand routing Protocol for MANET", IEEE, 978-1-4799-0192-0/2013.
  7. Deepika Kukreja, Umang Singh and B. V. R. Reddy, "A Survey of Trust Based Routing protocols in MANETs",Journal of Advances in Computer Networks, Vol. 1, No. 4, December 2013.
  8. Priyanka Takalkar and Aaradhana Deshmukh, "Trust Based Secure Data Transmission Model in MANET", International Journal of Emerging Technology and Advanced Engineering, Vol. 3, Issue 11, November 2013.
  9. Naveen Kumar Gupta and Amita Garg, "Trust and shortest path selection based routing protocol for mobile ad-hoc netowrks", IJCA, Vol. 76, No. 12, August 2013.
  10. Pallavi Khatri and Aamir Mohammed, "TDSR: Trust Based DSR Routing Protocol for Securing MANET", International Journal of Networking & Parallel Computing, vol. 1, Issue 3, January 2013.
  11. Radha Krishna Bar, Jyotsna Kumal Mandal and Moirangthem Marjit Singh, "Quality of Sservice of mobile ad-hoc network through Trust based AODV routing protocol by exclusion of Black-hole attack", Science Direct, CIMTA 2013.
  12. Sumathy Subramaniam, R. Saravanan and Pooja K. Prakash, "Trusted Based Routing to Improve Network Lifetime of Mobile Ad-hoc Net- works", Journal of Computing and Information Technology, CIT 21, 2013.
  13. Issac Woungang, Mohmmed S. Obaidat, Sanjay Kumar Dhurandher, Han-Chieh Chao and Chris Liu, "Trust enhanced Message Security Protocol For Mobile Ad-hoc Networks", IEEE ICC 2012.
  14. N. Bhalaji and A. Shanmugam, "Dynamic Trust Based method to Mitigate Grayhole Attack in Mobile Ad-hoc network", International Conference on Communication Technology and System Design, 2012, 881-888.
  15. Ahmed M. Abd El-Haleem and Ihab A. Ali, "TRIUMF: Trust-Based Routing Protocol with control degree of Selfishness for Securing MANET against Packet Dropping Attack", International Journal of Computer Science Issues, Vol. 8, Issue 4, No. 1, July 2011.
  16. N. Bhalaji and Dr. A. Shanmugam, "Defense Strategy using Trust based model to mitigate active attacks in DSR based mobile ad-hoc network", Journal of Advances in Information Technology, Vol. 2, No. 2, May 2011.
  17. Zhen Yan, Peng Zhang and Teemupekka Virtanen, "Trust Evaluation Based Security Solution in Ad-hoc Networks", 2011.
  18. M. K. Denko, T. sun, and I. Woungang, "Trust Management in ubiqui- tous Computing: a Bayesion approach", Computer Communication, vol 34, Issue 3, pp. 398- 406, 2011.
  19. P. Narula, S. K. Dhurandhar, S. Mishra and I. Woungang, "Security in Mobile Ad-hoc Networks using soft-encryption and Trust based multipath routing", Computer Communication, vol 31, pp. 760-769, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-hoc Network Attacks Trust Based Routing.