Abstract
Mobile Ad Hoc Network (MANET) has set of mobile nodes that are allowed to communicate with each other through wireless links. The nodes are deployed spontaneously without any infrastructure in a geographical area. Due to the lack of centralized administration and prior organization, MANETs are vulnerable to different attacks of malicious nodes. To overcome the problem of black hole attack in MANETs, a trust model using Differential Evolution (DE) algorithm has been proposed. It identifies the malicious node and inhibits them to become the member of data transmission path. The proposed work consists of two phases; one is to obtain the optimized path and the other deals with the penalty factor for malicious nodes. Moreover, the Differential Evolution is one of the most promising optimization to enhance security with increased network density. The proposed algorithm is compared with AOMDV, DSR, Genetic algorithm and ACO.
Highlights
The mobile Ad HoC Network facilitate wireless network without any centralized unit and it involves participation of all the nodes in the network in an honest manner
As the Mobile Ad Hoc Network (MANET) lack central co-ordination, they require full cooperation among the nodes to identify the attacks in the network
The data are successfully delivered through a secured communication path which inhibits the malicious node
Summary
The mobile Ad HoC Network facilitate wireless network without any centralized unit and it involves participation of all the nodes in the network in an honest manner. The malicious node creates false routing information, asserting that it has an optimal route which causes other normal nodes to route data packets through the one which is malicious. Every packet that it receives is dropped instead of forwarding those packets normally. To detect the presence of malicious nodes, the trust level of other nodes in the network plays a major role. The trust update mechanism identifies the packet dropping (malicious activity) and deals with the penalty factor by taking into account the previous and the current trust value of the node.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.