CTV: Consistent Trust Value through Data Drop Monitoring Parameters Based Malicious Behaviour Detection in MANET

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: Growth of wireless technologies with its increased user demands of applications makes this area more vulnerable for attackers and intruders. The attacker continuously trying to affects the communication and getting the benefits from gamming the network with higher data drop rates. Among them, the most famous and dangerous attacks is blackhole by which a node starts dropping a data and behaving as a normal node. During the last few years various solutions are provided for overcoming the active and passive blackhole detection and termed as malicious node detections. Any node, affecting the actual performance or operation of network will be termed as malicious node and blackhole is its one category. The existing mechanism only detects the static blackhole attacks but is not capable to detect sudden change in the behavior of node from legitimate to malicious. Thus this paper proposes a CTV (Consistent Trust Value) mechanism based on some of the performance parameter analysis such as PDR, throughput, delays and TTL values by which timely triggered and normal blackhole node is detected with higher accuracy. By regular analysis those improper behaviour is detected in timely manner and reduces the probability of data drops. At the initial level of evaluation the approach is proving its strong presence among the existing methods.

Authors and Affiliations

Siddharth Shukla , Prof (Dr. ) Jayant Shekhar, , Amit Kumar

Keywords

Related Articles

 Performance Analysis of Routing Protocols in Mobile AD-HOC  Networks (MANETs)

 A mobile ad-hoc network (MANET) is a self starting dynamic network comprising of mobile nodes, where each and every participation node voluntarily transmit the packets destined to some remote node using  wir...

Weed Detection using Image Filtering in Vegetables Crops

This paper discuss about system implementation of image processing technique for weed detection and removal. The system presents a machine vision system for weed detection in vegetable crops using outdoor images. The pur...

 Propose Data Mining AR-GA Model to Advance Crime analysis

 Historically solving crimes has been the privilege of the criminal justice and law enforcement specialists. With the increasing use of the computerized systems to track crimes, computer data analysts have sta...

Virtual Mouse: Computer Vision Aided Pointing Device

Abstract: This paper puts forth the idea for an easy to use device to replace the conventional mouse. One such approach is a virtual pointing device. A web-camera based solution takes advantage of computer vision technol...

Cloud-Based Impact for Mobile and Pervasive Environments: A  Survey 

 Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry buzz words and a major discussion thread in the IT world since 2009. Despite   increasing...

Download PDF file
  • EP ID EP94334
  • DOI 10.9790/0661-162127379
  • Views 93
  • Downloads 0

How To Cite

Siddharth Shukla, Prof (Dr. ) Jayant Shekhar, , Amit Kumar (2014).  CTV: Consistent Trust Value through Data Drop Monitoring Parameters Based Malicious Behaviour Detection in MANET. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 73-79. https://europub.co.uk/articles/-A-94334