Professional Documents
Culture Documents
Paper4 Ijaerv
Paper4 Ijaerv
K. P. Manikandan
Dr. R. Satyaprasad
Dr. K. Rajasekhararao
Sri Prakash College of Engineering, Rajupeta, Konuru Panchayat, Tuni-533 401, Andhra Pradesh. krr_it@yahoo. co. in
41225
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 20 (2015) pp 41225-41232
© Research India Publications. http://www.ripublication.com
schemes, Reputation-based schemes, Cross-layer cooperation throughput. The proposed work focuses on detecting the black
based schemes. From this the author detects that Black hole hole attack and provides the action to prevent this attack. SCF
attacks mainly present in the routing layer due to the MAC tree construction is the initial step in this work which makes
protocol rules. the good data accessibility [12]. Then process of encryption
X. Li et al (2010) proposed a simple trust model for MANETs and decryption of packets is performed by MD5. Trust based
to reduce the threads from malicious node. Four kind of malicious node detection is the next process of this work once
protocols are proposed they are ad hoc on demanddistance the malicious node is identified; an alert message is issued to
vector (AODV) routing protocol, ad hoc on-demand trusted- the cluster head. From the cluster head information is shared
path distance vector (AOTDV), a trust-based reactive to its entire node. Finally the particular malicious node is
multipath routing protocol, ad hoc on-demand multipath removed from the SCF tree and it is reconstructed. The
distance vector (AOMDV) routing protocol to discover the following diagram shows the overall procedure of the
multiple loop path and the author used hop count and trust proposed work.
value aspects to evaluate that paths. These evaluations use to
choose protocols has the improved packet delivery ratio and
reduce the black hole attack effectively.
Lung-Chung Li and Ru-Sheng Liu proposed an ID based
multiple secrets key management scheme (IMKM) for
ensuring secure communication in ad hoc network. This
method provides an efficient way for key update and key
revocation and eliminates the need for certificate-based
authenticated public key distribution. Misbehavior
notification, Revocation generation and Revocation
verification are the three phases performed to achieve key
revocation similarly key updation is done by key joining, Key
Eviction and Group Key Agreement Protocol. By this a
master key is generated and it is distributed by all the cluster
head.
Jae-Ho Choi et al (2012) proposed a Self-Centered Friendship
(SCF) tree for replica allocation. The author considers the
mobile node as selfish nodes which are all uses the limited
resource only for its benefits. The SCF is constructed based on
the degree of selfishness of the node based on the value of
credit score. The credit score is measured from the credit risk
value which is derived from economics. Breadth first search is
applied for priority setting of the allocated replica. This
method provides good data accessibility; low communication
cost, and reduced the query delay.
Sohail Abbas et al (2013) introduced a novel method to detect
the identities of Sybil attackers. Author proposed a light
weight system for this purpose without any centralized
infrastructure such as a geographical positioning system or FIGURE 1. FLOW DIAGRAM OF PROPOSED WORK
directional antennae. A Received Signal Strength is applied to
find the difference between legitimate and Sybil identities.
Using simulation the entry and exit behavior of these two A. SCF Tree:
identities is measured and by using the real world testbed of The self-centered friendship (SCF) tree is inspired by the
Sun Spot sensor, the detection is performed with the RSS data human friendship nature. Normally the SCF tree is
fluctuation. This work is performed on MAC layer using 802. constructed based on the selfish node [10]. In this paper this
11 protocol without any extra hardware. tree is build based on the distance and angle of the node. The
The remaining section describes the proposed concepts of this initial step in SCF-Tree is cluster head (CH) selection. The
paper. Section 3 explains the SCF tree construction and cluster is selected based on mobility, distance, cost,
MD5algorithm. Section 4. Trust based malicious node connectivity, identifier and power. The proposed work selects
detection method. Section 5 describes the experimental result cluster based on High connectivity Clustering algorithm. A
and section 6 concludes this paper. node which contains the maximum neighbor is considered as
cluster head, Gerla [13]. The node in the cluster becomes the
member of that cluster, and it could not able to participate in
III. Proposed work cluster head position election. The neighbor node is finding by
The proposed work is to detect the malicious node in a mobile measuring the distance of each node. so the distance and angle
ad hoc network that prevents the Black Hole attack. This is calculated to find node transmission range. The location i. e.
attack makes the source node to trust that it has the shortest distance is calculated by the following formula
path then it drops all the packets send across it and reduces the
41226
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 20 (2015) pp 41225-41232
© Research India Publications. http://www.ripublication.com
41227
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 20 (2015) pp 41225-41232
© Research India Publications. http://www.ripublication.com
is added to the end of the message then it is followed by until TABLE 2. MEASURED TRUST VALUE AND ITS
the message length is equal to 64 bits fewer than a multiple of MEANING
512. The original message is represented by filling the
remaining bits with 64 bits. Trust Value Meaning
Initially the algorithm start to execute on a 128 bit state which Malicious node
is divided into four 32 bits namely P, Q, R and S. at the Suspected node
beginning these four bits (32) is initialized with some Less trustworthy node
constant. Then the 512-bit message is used to modify the Trustworthy node
state. The message block consists of four rounds. Based on the
non-linear function each round is composed with 16
operations, modulo addition and the final round is left Table 1 describes the obtained trust value and its relevant
rotation. meaning. From this it is easy to detect the malicious node. The
value of the Trust Table of node updated incrementally after a
successful data transmission. Whenever the trust value of
nodes lies between 0 to then it is consider as a malicious
⊕, ⋁, ⋀, ⌜ denote the XOR, OR, AND and NOT operations node.
respectively.
B. Reconstruction of SCF tree:
If any node detects that a node might be malicious then it has
IV. Trust based malicious node detection to immediately checked and removed from the SCF tree. The
Malicious node detection is major issue in MANET. In this elimination of the malicious node is performed with the help
work a trust based black hole attack detection mechanism is of the cluster head. Every member in the cluster is linked with
proposed. The aim of this paper is to remove the malicious the cluster head, if any node is detected as malicious
node from the network which is the major reason for the black node , the member sends this information to the cluster
hole attack. The trust value is measured from the data head. Then it transforms the message to all other entire
transmission history of nodes. The malicious node is the reason member in the cluster. So the member won’t send any packet
for black hole attack and this malicious node isolation is done to that affected node. this process increase the network
based on a data structure called as Trust Table. Accordingly lifetime and reduce the packet loss and increase packet
each node maintains a Trust Table that will keep a trust value delivery ratio between sender and destination packet
of its neighbors and this table will be used for isolating the transmission
malicious node
Where
Where and is the ratio gained by node p, at
time t for forwarding packets to node q. and 1, 2 refers to
weights assigned to CR and DR. Each and every time node p
checks whether the node q transmitting the packets properly,
then the trust value count be higher if not trust value will
decrease. In this paper the value of a trust node is fixed at
range of 0-1. Threshold is a black list that is when the trust
value less than . Then the node is malicious node. Whenever
there is null transmission is performed between nodes then FIGURE 3. SIMULATION NETWORK
initial value of trust is set to 0. 75. At the starting stage all the
nodes in manet have the same trust value. After that It is
updated whenever a node successfully forwards a packet to its 50 mobile nodes is used in the proposed work and the
neighbor the following table describes trust value and their simulation model of this work is shown in figure 3. The
meaning. experimental result explains this work i. e.
41228
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 20 (2015) pp 41225-41232
© Research India Publications. http://www.ripublication.com
Parameters Values
Channel type Wireless Channel
radio-Propagation TwoRay Ground
model
network interface WirelessPhy
type
MAC type 802_11
interface queue type DropTail/PriQueue
time of simulation 200
end
link layer type LL
antenna model OmniAntenna
max packet 50 (Minimum:512bytes, Maximum:
10, 000bytes)
number of mobile 50
nodes
FIGURE 4. PACKET DELIVERY RADIO REPORT
Simulation time 200 s(Minimum:200s,
Maximum:10000s)
routing protocol AODV
X dimension of 1000 B. Throughput
Radio of packets delivered successfully over a communication
topography
channel is known as throughput. It is measured in bit per
Y dimension of 1000
second (bts) and its formula is
topography
traffic tclfiles/cbr
mobility /tclfiles/speed5
number of attackers 5 (Minimum:5, Maximum: 25) In this approach the average throughput is 28. 5Kbps and it is
shown in Figure 5.
Energy Energy Model
Initial Energy 100
FIGURE 2. THROUGHPUT
41229
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 20 (2015) pp 41225-41232
© Research India Publications. http://www.ripublication.com
C. Average delay
Average delay specifies how long a bit takes to reach another
node or endpoint and it is measured by fraction of seconds.
Formula for calculating Average delay is
This approach obtains less delay that is 18. 4sec. The average
delay report is shown in Figure 6.
D. Node energy
Node energy is a level of energy that each node has at the
beginning stage which is known as initial energy in
simulation. The node then loss an amount of energy after
transmitted. Node energy is also a important aspect to obtain
an efficient result. In the proposed approach the nodes energy
is reduced a little bit which is shown in Figure 6.
41230
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 20 (2015) pp 41225-41232
© Research India Publications. http://www.ripublication.com
References
41231
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 20 (2015) pp 41225-41232
© Research India Publications. http://www.ripublication.com
41232