Trust Based Network Layer Attacks Prevention in MANET

  • Mousumi Sardar
  • Subhashis Banerjee
  • Kishore Majhi
  • Koushik Majumder
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 298)


MANET is a collection of wireless nodes that cooperate with each other for relaying packets during the communication. Due to the absence of centralized authority and frequent nodes mobility ad-hoc networks become more attractive towards attackers. For this reason security becomes an important issue in MANET. So protocols are made secure by using trust as a parameter. Trust parameter can efficiently handle the secure route finding procedure. Several trust based protocols already exist in MANET. In this paper we also use trust as a tool for mitigating the severe network layer attacks in MANET. Our proposed scheme uses both the direct and indirect trust. Trust percentage is calculated dynamically during route establishment process. We have also considered delay parameter to avoid end-to-end delay which degrades the performance of MANET. Our scheme efficiently finds secure and reliable route based on trust by mitigating several network layer attacks.


Worm-hole attack Black-hole attack Grey-hole attack Jellyfish attack Byzantine attack Trust Reputation 


  1. 1.
    Nguyen HL, Nguyen UT (2008) A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Netw 6(1):32–46CrossRefGoogle Scholar
  2. 2.
    Karmore P, Bodkhe S (2011) A survey on intrusion in ad hoc networks and its detection measures. Int J Comput Sci Eng IJCSE 3:1896–1903Google Scholar
  3. 3.
    Banerjee S, Majumder K (2012) A comparative study on wormhole attack prevention schemes in mobile ad-hoc network. In: Proceedings of recent trends in computer networks and distributed systems security, vol 335. pp 372–384Google Scholar
  4. 4.
    Banerjee S, Majumder K (2012) A survey of blackhole attacks and countermeasures in wireless mobile ad-hoc networks. In: Proceedings of recent trends in computer networks and distributed systems security, vol 335. pp 396–407Google Scholar
  5. 5.
    Rai AK, Tewari RR, Upadhyay SK (2010) Different types of attacks on integrated MANET-internet communication. Int J Comput Sci Secur IJCSS 4(3):265–274Google Scholar
  6. 6.
    Pushpa AM (2009) Trust based secure routing in AODV routing protocol. In: Proceedings of international conference on internet multimedia services architecture and applications (IMSAA). IEEE Press, USA, pp 1–6Google Scholar
  7. 7.
    Li X, Jia Z, Wang L, Wang H (2010) Trust-based on demand multipath routing in mobile ad hoc networks. In: Proceedings of IET information security, vol 4. pp 212–232Google Scholar
  8. 8.
    Edua EN, Radha S, Priyadarshini S, Jayasree S, Naga SK (2012) SRT-secure routing using trust levels in MANETs. Eur J Sci Res 75(3):409–422 ISSN 1450-216XGoogle Scholar
  9. 9.
    Essia T, Razak A, Khokhar RS, Samian N (2011) Trust-based routing mechanism in MANET: design and implementation. Springer, BerlinGoogle Scholar
  10. 10.
    Sen J (2010) A distributed trust management framework for detecting malicious packet dropping nodes in a mobile ad hoc network. Int J Netw Secur Appl (IJNSA) 2(4):92–104Google Scholar
  11. 11.
    Bhalaji N, Mukherjee D, Banerjee N, Shanmugam A (2008) Direct trust estimated on demand protocol for secured routing in mobile ad-hoc networks. Int J Comput Sci Secur 1–5Google Scholar
  12. 12.
    Johnson D, Hu Y, Maltz D (2007) The dynamic source routing protocol (DSR). RFC 4728, The internet engineering task force, Network working group

Copyright information

© Springer India 2014

Authors and Affiliations

  • Mousumi Sardar
    • 1
  • Subhashis Banerjee
    • 1
  • Kishore Majhi
    • 1
  • Koushik Majumder
    • 1
  1. 1.Department of Computer Science and EngineeringWest Bengal University of TechnologyKolkataIndia

Personalised recommendations