Skip to main content

Advertisement

Log in

Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The mobile ad hoc network (MANET) is communication network of a mobile node without any prior infrastructure of communication. The network does not have any static support; it dynamically creates the network as per requirement by using available mobile nodes. This network has a challenging security problem. The security issue mainly contains a denial of service attacks like packet drop attack, black-hole attack, gray-hole attack, etc. The mobile ad-hoc network is an open environment so the working is based on mutual trust between mobile nodes. The MANETs are vulnerable to packet drop attack in which packets travel through the different node. The network while communicating, the node drops the packet, but it is not attracting the neighboring nodes to drop the packets. This proposed algorithm works with existing routing protocol. The concept of trusted list is used for secure communication path. The trusted list along with trust values show how many times node was participated in the communication. It differentiates between altruism and selfishness in MANET with the help of energy level of mobile components. The trust and energy models are used for security and for the differentiation between altruism and selfishness respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Neelavathy Pari, S., & Sridharan, D. (2011). Mitigating routing misbehaviour in self organizing mobile ad hoc network using K-neighbourhood local reputation system. In IEEE-international conference on recent trends information technology, ICRTIT, Chennai, June 3–5, 2011.

  2. Buchegger, S., & Le Boudec, J. Y. (2002). Performance analysis of the CONFIDENT protocol. In Proceedings 3rd ACM international symposium on mobile ad hoc networking and computing (MOBIHOC 02), Lausanne, Switzerland, Technical Report, DSC/2001/001, June 2002.

  3. Kanthe, A. M., Simunic, D., & Prasad, R. (2012). The impact of packet drop attack and solution on overall performance of AODV in mobile ad hoc networks. In IJRTE, ISSN:2249-8958 (Vol. 2), Dec 2012.

  4. Chen, I.-R., Guo, J., Bao, F., & Cho, J.-H. (2014). Trust management in mobile ad hoc networks for bias minimization and application performance maximization. Elsevier B. V Journal with ISSN:1570-8705.

  5. Cho, J.-H., & Chen, I.-R. (2013). On the tradeoff between altruism and selfishness in MANET. Elsevier B. V Journal with ISSN:2217-2234.

  6. Perkins, C., Royer, E. B., & Das, S. (1999). Ad hoc on-demand distance vector routing. In Proceeding of the 2nd IEEE workshops on mobile computing system and applications (WMCSA) (pp. 90–100).

  7. Kshirsagar, V., Kanthe, A. M., & Simunic, D. (2014). Analytical approach towards packet drop attack in mobile ad hoc networks. In IEEE ICCIC.

  8. http://www.isi.edu/nsnam/ns.

  9. Cordasco, J., & Wetzel, S. (2007). Cryptographic vs. trust-based methods for MANET routing security. In STM.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishvas Haridas Kshirsagar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kshirsagar, V.H., Kanthe, A.M. & Simunic, D. Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks. Wireless Pers Commun 100, 311–320 (2018). https://doi.org/10.1007/s11277-017-5070-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-5070-x

Keywords

Navigation