Advertisement

Cluster Computing

, Volume 22, Supplement 6, pp 13453–13461 | Cite as

Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol

  • K. VanithaEmail author
  • A. M. J. Zubair Rahaman
Article
  • 72 Downloads

Abstract

MANETs have grown into a usually used network for countless applications. Mostly, a transmission medium perspective undergoes with thoughtful security worries, which may be focused to packet dropping. In the network, when packet forward the drooping of valuable packets may occur due to the presence of malicious nodes. The major sources in MANET for packet losses are malicious packet dropping and link error. A node can perform unkindly and could harm the process of sending the packet. In order to overcome the issues and to have an efficient detection process of malicious drop with better secure performances, the improved failure aware third party Auditor (IFTPA) based homomorphism linear authenticator (HLA) mechanism (IFHM) is proposed with the secured ad hoc on demand distance vector (SAODV). The proposed approach permitsthe trustworthiness verification of packet loss information and malicious node detection by dropping identifying of routing and data packet. Packet dropping is because of the both link error and occurrence of malicious nodes, which can identify by SAODV. To make certain efficiency, the authentication service is implemented in the protocol. However, to succeed storage scalability, the protocol implements the pseudo random function (PRF) in the system to fix the secret key of a client to its uniqueness using the secret key of its server.

Keywords

Packet dropping Secure protocol Detection efficiency HLA Malicious nodes PRF 

References

  1. 1.
    Vinodhini, A., Prabaharan, G.: Detecting packet dropping attacks and preserving privacy path using optimal link state routing in wanets. In: Proceedings of 41st IRF International Conference, 24 April, 2016, pp. 36–40Google Scholar
  2. 2.
    Sindhuja, M., Sahaya Princy, A.: Privacy and detecting malicious packet dropping in wireless ad hoc network. Int. J. Eng. Comput. Sci. 4(11), 15041–15044 (2015)Google Scholar
  3. 3.
    Shetty, S.S.: Detecting truthfulness of packet dropping attacks in WANETs. Asian J. Eng. Technol. Innov. 4(7), 80–83 (2016)Google Scholar
  4. 4.
    Sneha, C.S., Jose, B.: Detecting packet dropping attack in wireless ad hoc network. Int. J. Cybern. Inf. (IJCI) 5(2), 117–124 (2016)Google Scholar
  5. 5.
    George, N., Sujitha, M.: Truthful detection of packet dropping attack in MANET. Int. J. Adv. Res. Comput. Commun. Eng. 4(7), 317–320 (2015)Google Scholar
  6. 6.
    Patel, N.J., Jhaveri, R.H.: Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: a survey. In: 2015 International Conference on Signal Processing and Communication Engineering Systems (SPACES), 2015 International Conference on SPACES-2015, pp. 468–472Google Scholar
  7. 7.
    Patel, K.N., Jhaveri, R.H.: Addressing packet dropping misbehavior using metaheuristic approach: A survey. In: 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), Visakhapatnam, 2015, pp. 1–6Google Scholar
  8. 8.
    Soliyal, N., Bhadauria, H.S.: Preventing packet dropping attack on AODV based routing in mobile ad-hoc MANET. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, 2016, pp. 1371–1375Google Scholar
  9. 9.
    Bhagyashree, S., Uppar, A.S.: Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing. Int. J. Innov. Res. Electr. Electron. Instrum. Control Eng. 3(1), 218–221 (2015)Google Scholar
  10. 10.
    Shu, T., Krunz, M.: Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks. IEEE Trans. Mob. Comput. 14(4), 813–828 (2015)CrossRefGoogle Scholar
  11. 11.
    Chandinee Saraswathy, K., Keerthi, D., Padma, G.: HLA based third party auditing for secure cloud storage. Int. J. Comput. Sci. Inf. Technol. 5(2), 1526–1532 (2014)Google Scholar
  12. 12.
    Deepa, V., Jyotheeswari, P., Neerugatti, V.: A privacy-preserving unpadded RSA based-third party auditing protocol for cloud storage secure. SIJ Trans. Comput. Sci. Eng. Appl. (CSEA) 2(5), 171–176 (2014)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of CSEAl-ameen Engineering CollegeErodeIndia
  2. 2.Al-ameen Engineering CollegeErodeIndia

Personalised recommendations