Countermeasures for Conflicting Behavior Attack in a Trust Management Framework for a Mobile Ad hoc Network

Author(s):  
Shirina Samreen ◽  
M.A. Jabbar
Author(s):  
Shirina Samreen

The applications of a mobile ad hoc network (MANET) range from military and disaster response to commercial and civilian environments. The intrinsic characteristics like lack of infrastructure, self-organizing nature and deployment flexibility contributes to its usefulness but few other features like open media for communication and topological changes on-the-fly makes it vulnerable to security attacks. The focus of the current work is security mechanisms for a MANET against the various insider attacks targeting the data forwarding operations. It is accomplished through a trust management framework and a secure routing protocol relying upon the TMF to form the routes with most trusted nodes. The protocol computes a novel reliability metric termed as Path Allegiance metric (PAM) which acts as a selection criteria for route selection. The performance evaluation involves simulation results which prove the robustness of the proposed TMF and the effectiveness of the PAM routing protocol in reliable data delivery in the presence of packet droppers which disrupt the data transmission.


Mobile Ad hoc Network is an assortment of free hubs that can convey one another. These hubs are self-composed hub, which doesn't have any fixed framework like base station, radio wires, and so forth. The hubs with in its range can have an immediate correspondence if not it utilizes a moderate hub for transmitting the information. Each node will act as both host and router. The nodes can join or leave the network anytime and makes the network topology. Network topology is dynamic in nature. Because of the dynamic behavior the detection of trust value is difficult for intermediary node. Trust should be managed in the network ie., the network has different behaviors like malicious, selfishness, unhealthiness, etc., due to these behaviors the trust of an intermediary node is difficult to calculate. Right now safe routing is performed by the improvement of convention which yields the minimization of trust inclination and boosts the application execution. This study compares different trust management framework and compare the trust level based on the metrics and outlines the issues and future ideas.


Sign in / Sign up

Export Citation Format

Share Document