Analysis of Existing Trust Based Routing Schemes Used in Wireless Network

2016 ◽  
Vol 10 (2) ◽  
pp. 26-40 ◽  
Author(s):  
Kajal S. Patel ◽  
Jagdish S. Shah

Wireless networks are vulnerable to many security attacks as they use wireless media and a node has to depend on unknown intermediate nodes for data transmission. Cryptographic algorithms used for wired network cannot work efficiently in wireless network, as in wireless network nodes are mobile and battery operated. Nodes may also have limited resources available. So, to detect malicious activities on node and improve stability of route while routing in mobile ad hoc network, trust-based routing is used. Communication parameters used in calculating trust value in most of existing trust based protocol (wireless network) are number of successful session or packet forwarded between two nodes, number of packet dropped or delayed, response time, battery life, mobility of node etc. This paper provides analysis of existing trust based routing by surveying current “sate of the art” work in this area. This paper also proposed a new parameter (number of route error message sent by a node) of a wireless node which can affect the network performance and can be used to calculate trust value.

Nodes are important aspect of Mobile network. Mobile ad-hoc network means any network that is made at the time of need. Ad-hoc network has its own place in networking. Mobility in network makes it more demandable. Nodes are the device that takes part in network or makes network. Nodes behavior describes network configuration. Genuine node insures you proper working of network with best results as throughput or packet ratio. Presence of malicious nodes differs in comparison to genuine node. Malicious node degrades output of network. Performance metrics noted degradation in their quality when malicious node encounters in network. Malicious nodes in different sets of node density affect the network in different way


2020 ◽  
Vol 8 (5) ◽  
pp. 2945-2947

Mobile Ad hoc Network (MANET) is a particularly disputed network because of its particular features, for example, active topography, decentralization, as well as neighbor depend routing. In MANET, any mobile nodes can connect or disappear arbitrarily; thus, mobile nodes cannot awake which node is it joined with, and this creates resources been dealt between unknown nodes that can be trusted or not. As a result, without any trustworthiness makes the main susceptibility in security concerned aspects of the MANET. In this situation, trust value employs a vital function in all network performance. This paper introduces DempsterShafer theory and Encounter based Trust Routing (DETR) in a MANET. In this scheme, the direct trust and indirect trust is used to compute the mobile node trust. The node cooperation and encounter rate parameters measure the node direct trust in the network. The node indirect trust is computed based on the neighbour node opinion using DempsterShafer theory. Simulation results demonstrate that DETR detecting untrustable nodes in the network.


Author(s):  
Aarti Sahu ◽  
Laxmi Shrivastava

A wireless ad hoc network is a decentralized kind of wireless network. It is a kind of temporary Computer-to-Computer connection. It is a spontaneous network which includes mobile ad-hoc network (MANET), vehicular ad-hoc network (VANET) and Flying ad-hoc network (FANET). Mobile Ad Hoc Network (MANET) is a temporary network that can be dynamically formed to exchange information by wireless nodes or routers which may be mobile. A VANET is a sub form of MANET. It is an technology that uses vehicles as nodes in a network to make a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. In this research paper Fuzzy based control approaches in wireless network detects & avoids congestion by developing the ad-hoc fuzzy rules as well as membership functions.In this concept, two parameters have been used as: a) Channel load b) The size of queue within intermediate nodes. These parameters constitute the input to Fuzzy logic controller. The output of Fuzzy logic control (sending rate) derives from the conjunction with Fuzzy Rules Base. The parameter used input channel load, queue length which are produce the sending rate output in fuzzy logic. This fuzzy value has been used to compare the MANET, FANET and VANET in terms of the parameters Throughput, packet loss ratio, end to end delay. The simulation results reveal that usage of Qual Net 6.1 simulator has reduced packet-loss in MANET with comparing of VANET and FANET.


2017 ◽  
Vol 2 (7) ◽  
pp. 5-8
Author(s):  
Neeraj Verma ◽  
Kuber Mohan

Energy is a critical issue in Mobile Ad-hoc Network. Nodes in Network are working in presence of limited or less energy due to dynamic nature of nodes or infrastructure less network. MANET has no infrastructure so nodes in MANET work on dynamic routing. In this way, energy proficient routing is required for reducing energy utilization. Energy proficient routing plans can extraordinarily reduce energy utilization and augments the lifetime of the networks. Scalability of Ad Hoc Networks can be enhanced by using land data, for example, in LAR, GPSR etc. They utilize physical area data; regularly from GPS (Global Positioning System).GPS empowers a gadget to decide their position as in longitude, Latitude and Altitude by getting this data from the satellites. There has been significant effort in proposing energy efficient routing protocols with the help of GAGAN (GPS Aided GEO Augmented Navigation) which have accuracy to approx One meter in India or its neighbor countries. GAGAN is a route framework which is helped by both GPS and nearby telemetry information to possibly give quicker and more exact situating and navigational information.


2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.


2021 ◽  
pp. 143-149
Author(s):  
Le Quang Minh ◽  

Network security is an important problem, which attracts more attention because recent network attacks caused huge consequences such as data lose, reduce network performance and increase routing load. In this article, we show network attack forms in MANET and propose Multiple Signature Authenticate (MSA) mechanism using digital signature based on asymmetric encryption RSA. Moreover, we describe a new security routing protocol named AODV-MSA by integrating MSA into AODV. Using NS2 simulator system, we implement and examine the efficiency of the AODV-MSA protocol with the 32-bit keys.


Author(s):  
Sukant Kishoro Bisoy ◽  
Prasant Kumar Pattnaik

The Transmission Control Protocol (TCP) is a reliable protocol of transport layer which delivers data over unreliable networks. It was designed in the context of wired networks. Due to popularity of wireless communication it is made to extend TCP protocol to wireless environments where wired and wireless network can work smoothly. Although TCP work in wireless and wired-cum-wireless network, the performance is not up to the mark. In literature lot of protocols has been proposed to adopt TCP in wireless mobile ad hoc network. In this, we present an overall view on this issue and detailed discussion of the major factors involved. In addition, we survey the main proposals which aim at adapting TCP to mobile and static Ad hoc environments. Specifically, we show how TCP can be affected by mobility and its interaction with routing protocol in static and dynamic wireless ad hoc network.


2021 ◽  
Vol 17 (1) ◽  
pp. 60-70
Author(s):  
Vinoth Kumar V. ◽  
Ramamoorthy S. ◽  
Dhilip Kumar V. ◽  
Prabu M. ◽  
Balajee J. M.

In recent years, WiFi offloading provides a potential solution for improving ad hoc network performance along with cellular network. This paper reviews the different offloading techniques that are implemented in various applications. In disaster management applications, the cellular network is not optimal for existing case studies because the lack of infrastructure. MANET Wi-Fi offloading (MWO) is one of the potential solutions for offloading cellular traffic. This word combines the cellular network with mobile ad hoc network by implementing the technique of Wi-Fi offloading. Based on the applications requirements the offloading techniques implemented into mobile-to-mobile (M-M), mobile-to-cellular (M-C), mobile-to-AP (M-AP). It serves more reliability, congestion eliminated, increasing data rate, and high network performance. The authors also identified the issue while implementing the offloading techniques in network. Finally, this paper achieved the better performance results compared to existing approaches implemented in disaster management.


Sign in / Sign up

Export Citation Format

Share Document