Node Disposition State Verification For Secure Routing In Mobile Ad Hoc Networks

K Sreenivasulu*, E. V. Prasad**, A. Subramanayam***
* Professor & H.O.D, Department of Computer Science and Engineering, Madina Engineering College, Kadapa, A.P, India.
** Professor & Director, LBRCE, Mylavaram, Krishna (Dist.) A.P, India.
*** Professor & Dean Department of Computer Science and Engineering, AITS, Rajampeta, A.P, India.
Periodicity:February - April'2014
DOI : https://doi.org/10.26634/jmt.1.1.2914

Abstract

A Mobile Ad hoc Network is a collection of wireless mobile nodes that are capable of communicating with each other or without the use of any centralized infrastructure. This paper is concerned with a strategic secure routing in a completely Disseminated Disposition State in ad hoc networks. The authors have taken an initiative in enhancing the existing Disposition State Authentication plans to apply in MANETs, such as adaptive termination timer and selective deviation tests, so as to administer blockage and quick convergence. The protocol Node Disposition State Verification (NDSV) has been developed based on the AODV (Ad hoc On Demand Distance Vector) protocol by incorporating two performance measures, Eigen Vector and Degree Centrality to evaluate the individual trust claims and to identify the right nodes for communication, respectively. This protocol is implemented and tested using Network Simulator-2 (NS-2) in the presence of blackhole attacks to prove its robustness and to demonstrate the achievement for better throughput and response time with regard to negligible jitter effort.

Keywords

MANET, Disposition State, Trust, Ad Hoc Routing, Black Hole Attacks, Sparse Network.

How to Cite this Article?

Sreenivasulu, K., Prasad, E. V., and Subramanayam, A. (2014). Node Disposition State Verification For Secure Routing In Mobile Ad Hoc Networks. i-manager’s Journal on Mobile Applications and Technologies, 1(1), 24-30. https://doi.org/10.26634/jmt.1.1.2914

References

[1]. S. Buchegger, (2008). "Reputation Networks for Self Organized Networks: Lessons Learned". In IEEE Technology and Society Magazine, Toward Fourth Generation Wireless, pp. 1-10.
[2]. K.Sreenivasulu, E.V.Prasad and A.Subramanyam, (2012).“Performance Analysis of MANET Reactive Routing under Security”. International Journal of Computer Applications, Vol. 60, No.7.
[3]. P.Michiardi and R. Molva, (2002). "CORE:A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Adhoc Networks", Proc. IFIP CMS.
[4]. Sonja Buchegger and Jean-Yves Le Boudec, (2002). “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes Fairness In Dynamic Ad-hoc Networks”. In Proc. of IEEE/ACM MobiHOC.
[5]. H. Yang, et. al, (2006). "SCAN: Self-OrganizedNetwork- Layer Security in Mobile Ad Hoc Networks". IEEE Network, Vol. 24, pp. 1-13.
[6]. M.T. Schlosser, (2003). "The Eigen Trust Algorithm for Reputation Management in P2P Networks". ReCALL.
[7]. S. Ramaswamy et. al,(2003). "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks". ICWN'03, USA.
[8]. J. Ruiz, et. al, (2008). "Black Hole Attack Injection in Ad hoc Networks". International Conference on Dependable Networks and Networks, Anchorage, Alaska, pp. G34- G35.
[9]. A. Dadhich, (2008). "A Distributed Cooperative Approach to Improve Detection and Removal of Misbehaving MANET Nodes". COMSWARE, pp. 728-735.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.