Abstract

Mobile Ad Hoc Network (MANET) has set of mobile nodes that are allowed to communicate with each other through wireless links. The nodes are deployed spontaneously without any infrastructure in a geographical area. Due to the lack of centralized administration and prior organization, MANETs are vulnerable to different attacks of malicious nodes. To overcome the problem of black hole attack in MANETs, a trust model using Differential Evolution (DE) algorithm has been proposed. It identifies the malicious node and inhibits them to become the member of data transmission path. The proposed work consists of two phases; one is to obtain the optimized path and the other deals with the penalty factor for malicious nodes. Moreover, the Differential Evolution is one of the most promising optimization to enhance security with increased network density. The proposed algorithm is compared with AOMDV, DSR, Genetic algorithm and ACO.

Highlights

  • The mobile Ad HoC Network facilitate wireless network without any centralized unit and it involves participation of all the nodes in the network in an honest manner

  • As the Mobile Ad Hoc Network (MANET) lack central co-ordination, they require full cooperation among the nodes to identify the attacks in the network

  • The data are successfully delivered through a secured communication path which inhibits the malicious node

Read more

Summary

Introduction

The mobile Ad HoC Network facilitate wireless network without any centralized unit and it involves participation of all the nodes in the network in an honest manner. The malicious node creates false routing information, asserting that it has an optimal route which causes other normal nodes to route data packets through the one which is malicious. Every packet that it receives is dropped instead of forwarding those packets normally. To detect the presence of malicious nodes, the trust level of other nodes in the network plays a major role. The trust update mechanism identifies the packet dropping (malicious activity) and deals with the penalty factor by taking into account the previous and the current trust value of the node.

Related Work
Method
Trust Sensing Model Using DE Algorithm
Optimized Path Model
Trust Formulation
Update of Trust Value
2: Current
Differential Evolution Algorithm
Parameter Analysis and Result Discussion
Gund Fault for A Milit
Scalability
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.