Abstract

In multi-hop ad hoc network, the network organization exhaustively relies on the trust relationship that exists between the participating mobile nodes of the network. Secure and trustworthy mechanisms are necessary for enforcing collaboration between the mobile nodes. Further, the malicious adversaries that intentionally injure or compromise network functionality during the process of multi-hop communication need to be detected and isolated from the network. Specifically, malicious adversaries like selfish nodes and root node attacks that exploits the network resources without rendering cooperation in routing or packet forwarding is a major challenge that need to be handled. The core aim of this proposed Link Stability Inspired Hopping Technique concentrates on the classification of mobile nodes into malicious and benevolent nodes based on the computation of link stability factor. This discrimination between the mobile nodes is achieved by the computation of Contention count, Signal strength, Hop determination, Link energy availability and normalized multi-objective optimization function for facilitating the elimination of malicious adversaries so as to improve the rate of data dissemination in the network. The interactions between the mobile nodes are periodically monitored for testing its link stability based on which the mobile nodes may be identified as co-operative and malicious.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call