CTV: Consistent Trust Value through Data Drop Monitoring Parameters Based Malicious Behaviour Detection in MANET

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: Growth of wireless technologies with its increased user demands of applications makes this area more vulnerable for attackers and intruders. The attacker continuously trying to affects the communication and getting the benefits from gamming the network with higher data drop rates. Among them, the most famous and dangerous attacks is blackhole by which a node starts dropping a data and behaving as a normal node. During the last few years various solutions are provided for overcoming the active and passive blackhole detection and termed as malicious node detections. Any node, affecting the actual performance or operation of network will be termed as malicious node and blackhole is its one category. The existing mechanism only detects the static blackhole attacks but is not capable to detect sudden change in the behavior of node from legitimate to malicious. Thus this paper proposes a CTV (Consistent Trust Value) mechanism based on some of the performance parameter analysis such as PDR, throughput, delays and TTL values by which timely triggered and normal blackhole node is detected with higher accuracy. By regular analysis those improper behaviour is detected in timely manner and reduces the probability of data drops. At the initial level of evaluation the approach is proving its strong presence among the existing methods.

Authors and Affiliations

Siddharth Shukla , Prof (Dr. ) Jayant Shekhar, , Amit Kumar

Keywords

Related Articles

 Effective Modular Order Preserving Encryption on Cloud UsingMHGD

Abstract: Cloud computing strengthens its presence in the public sector, Organizations and individuals arelooking for cloud services to improve productivity, security and reduce costs. Apart from communication, filestora...

 Implementation of Various Cryptosystem Using Chaos

 Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic a...

 A software tool that provides relevant information for diabetic patients to help prevent diabetic foot[i][u][/u][/i]

 Abstract: This project proposes a tool which can be very useful for diabetic patients for preventing diabetic foot. 347 million people worldwide have diabetes and 15% of them have the chance of developing diabetic...

Pose Estimation in AVI from Unknown Correspondences Using Genetic Algorithm

Abstract: In this paper we propose a model based approach to determine correspondences and pose of objects in automated visual inspection applications. The method does not consider correspondence and pose estimation prob...

A Critical Analysis of Knowledge Management in E-Learning

The integration of knowledge management (Klick) and e-encyclopaedism (Altitude) become inevitable day by day. KM coating focuses in providing institutions with prick to enrich knowledge, while the EL focuses on managing...

Download PDF file
  • EP ID EP94334
  • DOI 10.9790/0661-162127379
  • Views 84
  • Downloads 0

How To Cite

Siddharth Shukla, Prof (Dr. ) Jayant Shekhar, , Amit Kumar (2014).  CTV: Consistent Trust Value through Data Drop Monitoring Parameters Based Malicious Behaviour Detection in MANET. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 73-79. https://europub.co.uk/articles/-A-94334