Abstract
MANETs have grown into a usually used network for countless applications. Mostly, a transmission medium perspective undergoes with thoughtful security worries, which may be focused to packet dropping. In the network, when packet forward the drooping of valuable packets may occur due to the presence of malicious nodes. The major sources in MANET for packet losses are malicious packet dropping and link error. A node can perform unkindly and could harm the process of sending the packet. In order to overcome the issues and to have an efficient detection process of malicious drop with better secure performances, the improved failure aware third party Auditor (IFTPA) based homomorphism linear authenticator (HLA) mechanism (IFHM) is proposed with the secured ad hoc on demand distance vector (SAODV). The proposed approach permitsthe trustworthiness verification of packet loss information and malicious node detection by dropping identifying of routing and data packet. Packet dropping is because of the both link error and occurrence of malicious nodes, which can identify by SAODV. To make certain efficiency, the authentication service is implemented in the protocol. However, to succeed storage scalability, the protocol implements the pseudo random function (PRF) in the system to fix the secret key of a client to its uniqueness using the secret key of its server.


















Similar content being viewed by others
References
Vinodhini, A., Prabaharan, G.: Detecting packet dropping attacks and preserving privacy path using optimal link state routing in wanets. In: Proceedings of 41st IRF International Conference, 24 April, 2016, pp. 36–40
Sindhuja, M., Sahaya Princy, A.: Privacy and detecting malicious packet dropping in wireless ad hoc network. Int. J. Eng. Comput. Sci. 4(11), 15041–15044 (2015)
Shetty, S.S.: Detecting truthfulness of packet dropping attacks in WANETs. Asian J. Eng. Technol. Innov. 4(7), 80–83 (2016)
Sneha, C.S., Jose, B.: Detecting packet dropping attack in wireless ad hoc network. Int. J. Cybern. Inf. (IJCI) 5(2), 117–124 (2016)
George, N., Sujitha, M.: Truthful detection of packet dropping attack in MANET. Int. J. Adv. Res. Comput. Commun. Eng. 4(7), 317–320 (2015)
Patel, N.J., Jhaveri, R.H.: Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: a survey. In: 2015 International Conference on Signal Processing and Communication Engineering Systems (SPACES), 2015 International Conference on SPACES-2015, pp. 468–472
Patel, K.N., Jhaveri, R.H.: Addressing packet dropping misbehavior using metaheuristic approach: A survey. In: 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), Visakhapatnam, 2015, pp. 1–6
Soliyal, N., Bhadauria, H.S.: Preventing packet dropping attack on AODV based routing in mobile ad-hoc MANET. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, 2016, pp. 1371–1375
Bhagyashree, S., Uppar, A.S.: Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing. Int. J. Innov. Res. Electr. Electron. Instrum. Control Eng. 3(1), 218–221 (2015)
Shu, T., Krunz, M.: Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks. IEEE Trans. Mob. Comput. 14(4), 813–828 (2015)
Chandinee Saraswathy, K., Keerthi, D., Padma, G.: HLA based third party auditing for secure cloud storage. Int. J. Comput. Sci. Inf. Technol. 5(2), 1526–1532 (2014)
Deepa, V., Jyotheeswari, P., Neerugatti, V.: A privacy-preserving unpadded RSA based-third party auditing protocol for cloud storage secure. SIJ Trans. Comput. Sci. Eng. Appl. (CSEA) 2(5), 171–176 (2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vanitha, K., Zubair Rahaman, A.M.J. Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol. Cluster Comput 22 (Suppl 6), 13453–13461 (2019). https://doi.org/10.1007/s10586-018-1958-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-1958-9