CTV: Consistent Trust Value through Data Drop Monitoring Parameters Based Malicious Behaviour Detection in MANET
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: Growth of wireless technologies with its increased user demands of applications makes this area more vulnerable for attackers and intruders. The attacker continuously trying to affects the communication and getting the benefits from gamming the network with higher data drop rates. Among them, the most famous and dangerous attacks is blackhole by which a node starts dropping a data and behaving as a normal node. During the last few years various solutions are provided for overcoming the active and passive blackhole detection and termed as malicious node detections. Any node, affecting the actual performance or operation of network will be termed as malicious node and blackhole is its one category. The existing mechanism only detects the static blackhole attacks but is not capable to detect sudden change in the behavior of node from legitimate to malicious. Thus this paper proposes a CTV (Consistent Trust Value) mechanism based on some of the performance parameter analysis such as PDR, throughput, delays and TTL values by which timely triggered and normal blackhole node is detected with higher accuracy. By regular analysis those improper behaviour is detected in timely manner and reduces the probability of data drops. At the initial level of evaluation the approach is proving its strong presence among the existing methods.
Authors and Affiliations
Siddharth Shukla , Prof (Dr. ) Jayant Shekhar, , Amit Kumar
Performance Analysis of Routing Protocols in Mobile AD-HOC Networks (MANETs)
A mobile ad-hoc network (MANET) is a self starting dynamic network comprising of mobile nodes, where each and every participation node voluntarily transmit the packets destined to some remote node using wir...
Weed Detection using Image Filtering in Vegetables Crops
This paper discuss about system implementation of image processing technique for weed detection and removal. The system presents a machine vision system for weed detection in vegetable crops using outdoor images. The pur...
Propose Data Mining AR-GA Model to Advance Crime analysis
Historically solving crimes has been the privilege of the criminal justice and law enforcement specialists. With the increasing use of the computerized systems to track crimes, computer data analysts have sta...
Virtual Mouse: Computer Vision Aided Pointing Device
Abstract: This paper puts forth the idea for an easy to use device to replace the conventional mouse. One such approach is a virtual pointing device. A web-camera based solution takes advantage of computer vision technol...
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry buzz words and a major discussion thread in the IT world since 2009. Despite increasing...