CTV: Consistent Trust Value through Data Drop Monitoring Parameters Based Malicious Behaviour Detection in MANET

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: Growth of wireless technologies with its increased user demands of applications makes this area more vulnerable for attackers and intruders. The attacker continuously trying to affects the communication and getting the benefits from gamming the network with higher data drop rates. Among them, the most famous and dangerous attacks is blackhole by which a node starts dropping a data and behaving as a normal node. During the last few years various solutions are provided for overcoming the active and passive blackhole detection and termed as malicious node detections. Any node, affecting the actual performance or operation of network will be termed as malicious node and blackhole is its one category. The existing mechanism only detects the static blackhole attacks but is not capable to detect sudden change in the behavior of node from legitimate to malicious. Thus this paper proposes a CTV (Consistent Trust Value) mechanism based on some of the performance parameter analysis such as PDR, throughput, delays and TTL values by which timely triggered and normal blackhole node is detected with higher accuracy. By regular analysis those improper behaviour is detected in timely manner and reduces the probability of data drops. At the initial level of evaluation the approach is proving its strong presence among the existing methods.

Authors and Affiliations

Siddharth Shukla , Prof (Dr. ) Jayant Shekhar, , Amit Kumar

Keywords

Related Articles

 Methods Migration from On-premise to Cloud

 Abstract: Cloud computing is evolving as a key computing platform for sharing resources that includeinfrastructures, software, applications, and business. An increasing number of companies are expected tomigrate th...

 Share Desktop Screen to Raspberry Pi

 Abstract: Our aim is to connect laptops to projectors/TV/LED’s wirelessly (without any physical media) and transfer video signals from them. For this, SSH connection is used in Raspberry Pi device and we have trans...

Towards Automated Generation of ER-Diagram using a Web Based Approach

Abstract : Diagrams plays an important role in the software development process. Drawing the diagrams manually is the time consuming task, so there are many tools to draw and modify the diagram. From all the diagrams ER...

Object Detection & Tracking in Moving Background Under Different Environmental Conditions

Abstract: Object detection and tracking has been a widely studied research problem in recent years. Currently system architectures are service oriented i.e. they offer number of services. All such common services are gro...

Challenges to Data Base Security – A Futuristic View

Abstract: In present scenario, database security is on prime consideration, for any organization because of its implementation and complex nature of system. It is generally associated with the dealing of retrieval of dat...

Download PDF file
  • EP ID EP94334
  • DOI 10.9790/0661-162127379
  • Views 114
  • Downloads 0

How To Cite

Siddharth Shukla, Prof (Dr. ) Jayant Shekhar, , Amit Kumar (2014).  CTV: Consistent Trust Value through Data Drop Monitoring Parameters Based Malicious Behaviour Detection in MANET. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 73-79. https://europub.co.uk/articles/-A-94334