Visible to the public A Trust Based Scheme for Spotting Malicious Node of Wormhole in Dynamic Source Routing Protocol

TitleA Trust Based Scheme for Spotting Malicious Node of Wormhole in Dynamic Source Routing Protocol
Publication TypeConference Paper
Year of Publication2020
AuthorsSharma, Nisha, Sharma, Manish, Sharma, Durga Prasad
Conference Name2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
Date Publishedoct
Keywordscomposability, cryptography, delays, Dsr, Hardware, MANET, mobile ad hoc networks, NS3 simulation, pubcrawl, resilience, Resiliency, Routing, Routing protocols, Scalability, Task Analysis, Trust Routing, wormhole attack
AbstractThe exceptional attributes of impromptu network of being framework less, self-composed and unconstrained make the task more challenging to secure it. In mobile Ad-hoc network nodes reliant on one another for transmitting information, that make MANET helpless against different sorts of security attacks. These security attacks can be arranged as Passive and Active attacks. Wormhole is an Active attack and considered generally risky as it can make significant harm routing. Various secure routing mechanism has been created are based on cryptography mechanism, need pre-organized structure, centralized authority, or need external hardware, etc. These components are unreasonable due to restricted accessible assets in MANET. In this paper, we are proposing an effective trust-based mechanism based on the concept of Node to Node packet delay for the detection of the malevolent node of wormhole. The trust value of each node is calculated by observing the packet transaction among adjacent nodes and later this trust value is used for identification of malevolent node. Based on the trust values, further routing decisions and selecting a secured route can be perform.
Citation Keysharma_trust_2020