Open Access Open Access  Restricted Access Subscription Access

Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks


Affiliations
1 Institute of Engineering and Technology, Devi Ahilya University, Khandwa Road, Indore (M.P.), India
 

Mobile ad hoc network (MANET) possess self-configuration, self-control and self-maintenance capabilities. Nodes of MANET are autonomous routers. Hence, they are vulnerable to security attacks. Collaborative attacks such as black hole and wormhole in MANET are difficult to be detected and prevented.  Trust based routing decision is an effective approach for security enhancement in MANET. In this study, trust computing using fuzzy based max-product composition scheme is applied to compute aggregated trust values to determine malicious nodes and thereby safe route in MANETs. The results show performance improvement of proposed protocol over AODV protocol. Network metrics are analysed under different mobility conditions and different positions of black hole nodes.

Keywords

Blackhole Attacks, Trust Based Computing, Fuzzy, Manets, Trust Formulation, Max Product Composition.
User
Notifications
Font Size


  • Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks

Abstract Views: 343  |  PDF Views: 2

Authors

Ashish Kumar Jain
Institute of Engineering and Technology, Devi Ahilya University, Khandwa Road, Indore (M.P.), India
Vrinda Tokekar
Institute of Engineering and Technology, Devi Ahilya University, Khandwa Road, Indore (M.P.), India

Abstract


Mobile ad hoc network (MANET) possess self-configuration, self-control and self-maintenance capabilities. Nodes of MANET are autonomous routers. Hence, they are vulnerable to security attacks. Collaborative attacks such as black hole and wormhole in MANET are difficult to be detected and prevented.  Trust based routing decision is an effective approach for security enhancement in MANET. In this study, trust computing using fuzzy based max-product composition scheme is applied to compute aggregated trust values to determine malicious nodes and thereby safe route in MANETs. The results show performance improvement of proposed protocol over AODV protocol. Network metrics are analysed under different mobility conditions and different positions of black hole nodes.

Keywords


Blackhole Attacks, Trust Based Computing, Fuzzy, Manets, Trust Formulation, Max Product Composition.

References





DOI: https://doi.org/10.13005/ojcst%2F10.01.13