CTV: Consistent Trust Value through Data Drop Monitoring Parameters Based Malicious Behaviour Detection in MANET

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: Growth of wireless technologies with its increased user demands of applications makes this area more vulnerable for attackers and intruders. The attacker continuously trying to affects the communication and getting the benefits from gamming the network with higher data drop rates. Among them, the most famous and dangerous attacks is blackhole by which a node starts dropping a data and behaving as a normal node. During the last few years various solutions are provided for overcoming the active and passive blackhole detection and termed as malicious node detections. Any node, affecting the actual performance or operation of network will be termed as malicious node and blackhole is its one category. The existing mechanism only detects the static blackhole attacks but is not capable to detect sudden change in the behavior of node from legitimate to malicious. Thus this paper proposes a CTV (Consistent Trust Value) mechanism based on some of the performance parameter analysis such as PDR, throughput, delays and TTL values by which timely triggered and normal blackhole node is detected with higher accuracy. By regular analysis those improper behaviour is detected in timely manner and reduces the probability of data drops. At the initial level of evaluation the approach is proving its strong presence among the existing methods.

Authors and Affiliations

Siddharth Shukla , Prof (Dr. ) Jayant Shekhar, , Amit Kumar

Keywords

Related Articles

 E-Learning Certificate Using Digital Watermarking Technology

 Abstract: There has been an increasing demand for e-learning technologies and especially for digital watermarking. Using the digital watermarking technology in e-learning is increasingly becoming an important part...

 Exploring Different Forms of Trust towards Trusting Intention in Social Media for E-Commerce Purpose

  social media has been described as a platform for sharing information, buying and selling of goods and services through the internet. Thus, it has been described as a place where electronic commerce is been t...

 Knowledge Management in Software Enterprise

 Knowledge management is expected to be integral part any software development and services companies. Knowledge has become an important capital for many organizations in the international competition. So knowle...

 Internal & External Attacks in cloud computing Environmentfrom confidentiality, integrity and availability points of view

 Abstract: Cloud computing is set of resources and services offered through the Internet. Cloud services aredelivered from data centers located throughout the world. Cloud computing facilitates its consumers byprovi...

 New Dynamical Key Dependent S-Box based on chaotic maps

Abstract: The strength and security of cryptographic algorithms is determined by substitution non-linear Sboxes, so the construction of cryptographically strong S-boxes is important in the design of secure cryptosystems....

Download PDF file
  • EP ID EP94334
  • DOI 10.9790/0661-162127379
  • Views 105
  • Downloads 0

How To Cite

Siddharth Shukla, Prof (Dr. ) Jayant Shekhar, , Amit Kumar (2014).  CTV: Consistent Trust Value through Data Drop Monitoring Parameters Based Malicious Behaviour Detection in MANET. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 73-79. https://europub.co.uk/articles/-A-94334