Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
SummarySecurity against routing attacks in MANET is most critical issue and traditional concepts of cryptography, authentication, or Watchdog are not that significant in mitigation of these attacks. In recent years, trust‐based approach provides a reputation system that compose of different components to provide security against routing attacks. In this paper, we provide an in‐depth analysis of various components that are used in trust‐based mechanism and techniques deployed in effective and efficient execution of task by the components. Trust‐based mechanisms generally have five components: monitoring and information gathering, trust calculation and evaluation unit, trust recommendation unit, decision‐making and dissemination of detection unit. All or some of these units cooperate together to provide a reliable communication environment with the aim to prevent routing attacks from participating in route formation process and detect attacking nodes simultaneously. Different routing attacks and measures in trust‐based mechanism along with some published work are discussed to understand the implementation of this type of mechanism. Various related issues are explored, discussed, and recommendations are pointed out for future research work in this field.
SummarySecurity against routing attacks in MANET is most critical issue and traditional concepts of cryptography, authentication, or Watchdog are not that significant in mitigation of these attacks. In recent years, trust‐based approach provides a reputation system that compose of different components to provide security against routing attacks. In this paper, we provide an in‐depth analysis of various components that are used in trust‐based mechanism and techniques deployed in effective and efficient execution of task by the components. Trust‐based mechanisms generally have five components: monitoring and information gathering, trust calculation and evaluation unit, trust recommendation unit, decision‐making and dissemination of detection unit. All or some of these units cooperate together to provide a reliable communication environment with the aim to prevent routing attacks from participating in route formation process and detect attacking nodes simultaneously. Different routing attacks and measures in trust‐based mechanism along with some published work are discussed to understand the implementation of this type of mechanism. Various related issues are explored, discussed, and recommendations are pointed out for future research work in this field.
Background: The blackhole infection can affect the collaborative communication in mobile networks. It is man-in-middle attack that seizes and deflects the route and avoids packet-forwarding in the network. The occurrence of collaborative-blackhole reduces the trust and trustworthiness over the network. Objective: A probabilistic and weighted analysis based protocol is proposed in this research for detection of cooperative blackhole nodes and generating the preventing route over the network. The aim of the work is to improve the communication reliability. Methods: In this paper, the communication behaviour is analyzed under associated and probabilistic measures using Data Routing Information (DRI) table to discover the blackhole attack. It applies a dual check based on participation and communication constraints to estimate the node criticality. The evaluation is performed by neighbours and neighbour-on-neighbour nodes with weights and threshold specific decisions. These measures are evaluated through composite and integrated measures and presented as decision metrics. The parametric and probabilistic checks are conducted as a comprehensive evaluation within the proposed PSAODV (Probabilistic Secure Adhoc On Demand Distance Vector) protocol. Results: The simulation of PSAODV protocol is conducted in NS2 environment on various scenarios with mobility, density and traffic type variations. The scenarios are defined with a higher density of blackhole nodes within the network. The adaptive weights are identified by simulating the network with different weight combinations. These weights are employed within the PSAODV protocol to configure it with the maximum benefits. The analytical evaluations are taken against AODV and SAODV protocols and identified the performance enhancement in terms of Packet Delivery Ratio (PDR) Ratio, delay, attack detection ratio parameters. Conclusion: A significant improvement in attack detection is achieved by this proposed PSAODV protocol. The proposed protocol improved the reliability and effectiveness of mobile network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.