Open Access Open Access  Restricted Access Subscription or Fee Access

Trust based AODV Protocol for Detection and Prevention of JellyFish Attack in MANET

I. Kavitha, S. Amutha

Abstract


Mobile Adhoc Networks (MANETs)are more vulnerable to differing kinds of attacks due to its insecure communication. JellyFish could be a new form of DOS attack that contains the 3 variants like jellyfish delay variance attack, jellyfish periodic dropping attack and jellyfish reorder attack.  A main goal of this attack is to decrease the output and increase the tip to finish delay.  It ends up in decrease the general performance of network. during this paper, analyse the behavior and impact of jellyfish attack and evaluated all the 3 variants of jellyfish attack through the simulation method. The Trust based mostly AODV routing protocol in MANET ought to offer energy economical multi hop route between supply and destination try. so the routing protocol ought to think about the residual energy of the nodes for route institution. The planned Trust based mostly rule that find and take away a Jellyfish offender node from an energetic communication route. The results prove that Trust based mostly AODV is extremely economical in JellyFish attack detection and  performs well as compared to different algorithms.

 

Keywords: JellyFish attack, energy consumption, AODV, packet forwarding, End to End delay.


Full Text:

PDF

References


AR Dhakne, PN Chatur. 2016. Detailed Survey on Attacks in Wireless Sensor Network. Proceedings of the International Conference on Data Engineering and Communication Technology, Vol. 469 of the series Advances in Intelligent Systems and Computing, pp 319–331, Springer, Singapore.

https://dx.doi.org/10.1007/978–981–10–1678–3_31.

Momani, M. (2008). Bayesian Methods for Modelling and Management of Trust in Wireless Sensor Networks. Ph.D. Thesis, University of Technology, OPUS, Open Publication of UTS Scholars, Sydney, https://opus.lib.uts.edu.au/handle/2100/838

Lopez J, Roman R, Agudo I, Fernandez-Gago C. (2010) Trust Management Systems for Wireless Sensor Networks: Best Practices. Computer Communications, 33(9), 1086–1093. http://dx.doi.org/10.1016/j.comcom.2010.02.006

J Konorski, R Orlikowski, 2009. Data-centric Dempster–Shafer theory-based selfishness thwarting via trust evaluation in MANETs and WSNs. In Proceedings of the 3rd International Conference on New Technologies, Mobility and Security, pp. 74–78.

10.1109/CCIntelS.2015.7437886 A. R Dhakne, PN Chatur, 2015. Distributed Trust based Intrusion Detection approach in wireless sensor network. 2015 Communication, Control and Intelligent Systems (CCIS), IEEE, Mathura, pp. 96–101. DOI:10.1109/CCIntelS.2015.7437886

K Liu, N Abu-Ghazaleh, KD Kang. 2007. Location verification and trust management for resilient geographic routing, Journal of Parallel and Distributed Computing 67 (2). pp 215–228.

I Maarouf, U Baroudi, AR Naseer, 2009. Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Communications. 3 (5). pp. 846–858.

N Lewis, N Foukia. 2008. An efficient reputation-based routing mechanism for wireless sensor networks: Testing the impact of mobility and hostile nodes, in: Sixth Annual Conference on Privacy, Security and Trust, pp. 151–155, Canada.

H Deng, Y Yang, G Jin, R Xu, W Shi. 2010. Building a trust-aware dynamic routing solution for wireless sensor networks. In IEEE Globecom 2010 Workshop on Heterogeneous, Multi-Hop Wireless and Mobile Networks. pp. 153–157, USA.

HA Rahhal, IA Ali, S Shaheen. 2011. A novel trust-based cross-layer model for wireless sensor networks. 28th National Radio Science Conference, NRSC, DOI: 10.1109/NRSC.2011.5873629, pp. 1–10, Cairo, Egypt.

N Poolsappasit, S Madria. 2011. A secure data aggregation-based trust management approach for dealing with untrustworthy motes in sensor network. International Conference on Parallel Processing, DOI: 10.1109/ICPP.2011.16, pp. 138–147.

A Srinivasan, J Teitelbaum, J Wu. 2006. DRBTS: Distributed reputation-based beacon trust system, 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DOI: 10.1109/DASC.2006.28, pp. 277–283, Indianapolis, IN, USA.

T Zhang, J He, Y Zhang, 2011. Trust based secure localization in wireless

sensor networks. 2nd International Symposium on Intelligence Information Processing and Trusted Computing, IPTC, DOI: 10.1109/IPTC.2011.21, Hubei, China, pp. 55–58.

G Han, D Choi, TV Nguyen. 2007. A reliable sensor selection algorithm for wireless sensor networks. 3rd IEEE/IFIP International Conference in Central Asia on Internet. DOI: 10.1109/CANET.2007.4401711, pp. 1–4, Tashkent, Uzbekistan

G Han, D Choi, W Lim. 2007. A novel sensor node selection method based on trust for wireless sensor networks. International Conference on Wireless Communications, Networking and Mobile Computing, DOI: 10.1109/WICOM.2007.597, pp. 2397–2400, Shanghai, China

Zahariadis T, Leigou HC, Trakadas P, Voliotis S. (2010). Mobile Networks: Trust Management in Wireless Sensor Networks. European Transactions on Telecommunications, https://doi.org/ 10.1002/ett.1413, V 21(4), 386–395.

Trakadas P, Maniatis S, Zahariadis T, Leigou, HC, Voliotis S. (2009) A Novel Flexible Trust Management System for Heterogeneous Sensor Networks. International Symposium on Autonomous Decentralized Systems, ISADS 2009. DOI: 10.1109/ISADS.2009.5207367, 23–25 March 2009, 369–374, Athens, Greece


Refbacks

  • There are currently no refbacks.