DocumentCode :
1780332
Title :
Opportunistic routing to mitigate attacks in MANET
Author :
Elakkiya, M. ; Kaushik, Satvika ; Edna, Elizabeth N.
Author_Institution :
Dept. of ECE, SSN Coll. of Eng., Chennai, India
fYear :
2014
fDate :
10-12 April 2014
Firstpage :
1
Lastpage :
6
Abstract :
Adhoc Networks (MANETs) are an emerging area of mobile computing. There are various challenges that are faced in adhoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. Adhoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient Ad-hoc operations. The wireless nature of communication and lack of any security infrastructure raise several security problems. Commonly defined as the infrastructure less independent networks are prone to much vulnerability. These decentralized networks when employ conventional routing algorithms to forward data do not effectively transfer the packet to the right destination, as all these algorithms require a contemporary routing path between a source and destination node. Such prolonged link is not possible in a highly mobile network. The link between the nodes is only temporary and these links break down as the nodes move away from the direct communication range. Focusing on the secure routing against various attacks and the high probability of data delivery in an optimum manner, a Trust based opportunistic routing algorithm which is able to reliably route data despite highly unstable links is proposed in this paper. The trust model framed is incorporated in the basic routing algorithm, AODV. An attempt to explain various attack mitigation by the proposed trust model is also made.
Keywords :
data communication; mobile ad hoc networks; mobile computing; probability; radio links; security of data; telecommunication network reliability; telecommunication network routing; telecommunication security; trusted computing; AODV; MANET attack mitigation; contemporary routing path; data delivery probability; data routing reliability; direct communication; mobile ad hoc network packet transfer; mobile computing; resource poorness; secure opportunistic routing algorithm; security infrastructure lacking; trust model; unstable link; Aging; Delays; Information technology; Market research; Reliability; Routing; MANETs; Malicious Nodes; Opportunistic Routing; Selfish Nodes; Trust Management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Recent Trends in Information Technology (ICRTIT), 2014 International Conference on
Conference_Location :
Chennai
Type :
conf
DOI :
10.1109/ICRTIT.2014.6996116
Filename :
6996116
Link To Document :
بازگشت