Abstract
The mobile ad hoc network (MANET) is communication network of a mobile node without any prior infrastructure of communication. The network does not have any static support; it dynamically creates the network as per requirement by using available mobile nodes. This network has a challenging security problem. The security issue mainly contains a denial of service attacks like packet drop attack, black-hole attack, gray-hole attack, etc. The mobile ad-hoc network is an open environment so the working is based on mutual trust between mobile nodes. The MANETs are vulnerable to packet drop attack in which packets travel through the different node. The network while communicating, the node drops the packet, but it is not attracting the neighboring nodes to drop the packets. This proposed algorithm works with existing routing protocol. The concept of trusted list is used for secure communication path. The trusted list along with trust values show how many times node was participated in the communication. It differentiates between altruism and selfishness in MANET with the help of energy level of mobile components. The trust and energy models are used for security and for the differentiation between altruism and selfishness respectively.
Similar content being viewed by others
References
Neelavathy Pari, S., & Sridharan, D. (2011). Mitigating routing misbehaviour in self organizing mobile ad hoc network using K-neighbourhood local reputation system. In IEEE-international conference on recent trends information technology, ICRTIT, Chennai, June 3–5, 2011.
Buchegger, S., & Le Boudec, J. Y. (2002). Performance analysis of the CONFIDENT protocol. In Proceedings 3rd ACM international symposium on mobile ad hoc networking and computing (MOBIHOC 02), Lausanne, Switzerland, Technical Report, DSC/2001/001, June 2002.
Kanthe, A. M., Simunic, D., & Prasad, R. (2012). The impact of packet drop attack and solution on overall performance of AODV in mobile ad hoc networks. In IJRTE, ISSN:2249-8958 (Vol. 2), Dec 2012.
Chen, I.-R., Guo, J., Bao, F., & Cho, J.-H. (2014). Trust management in mobile ad hoc networks for bias minimization and application performance maximization. Elsevier B. V Journal with ISSN:1570-8705.
Cho, J.-H., & Chen, I.-R. (2013). On the tradeoff between altruism and selfishness in MANET. Elsevier B. V Journal with ISSN:2217-2234.
Perkins, C., Royer, E. B., & Das, S. (1999). Ad hoc on-demand distance vector routing. In Proceeding of the 2nd IEEE workshops on mobile computing system and applications (WMCSA) (pp. 90–100).
Kshirsagar, V., Kanthe, A. M., & Simunic, D. (2014). Analytical approach towards packet drop attack in mobile ad hoc networks. In IEEE ICCIC.
Cordasco, J., & Wetzel, S. (2007). Cryptographic vs. trust-based methods for MANET routing security. In STM.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kshirsagar, V.H., Kanthe, A.M. & Simunic, D. Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks. Wireless Pers Commun 100, 311–320 (2018). https://doi.org/10.1007/s11277-017-5070-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-5070-x