An International Journal House

Einstein International Journal Organization(EIJO)

Connecting People With Genius Thought

Einstein International Journal Organization(EIJO) is an international Genius Thought journals platform .
JOURNALS || EIJO Journal of Engineering, Technology and Innovative Research (EIJO – JETIR) [ ISSN : 2455 - 9172 ]
Packet Loss Avoidance and Trust-based Fine Grained Analysis Optimization and Generalization in MANET

Author Names : 1Arvind Kunwar,2Aneesh Kumar Mishra  Volume 8 Issue 3
Article Overview

Abstract  

In MANETs, trust can be defined as to what extent a node can fulfil the expectations of another node. Packet loss detection and prevention is significant module of MANET security systems. In trust based method routing decisions are managed by an independent trust table. Traditional trust-based methods unsuccessful to detect the main underlying reasons of a malicious events. If MANET do not using fine-grained analysis method of packet drop in trust based method, the network may treat normal packet drop as malicious activity. It will misleads the MANET. Without fine-grained analysis the network may treat normal nodes as malicious and can disconnect from communication. It can degrade the network performance and malicious nodes remain undetected. We proposed a method which will improve the security in network by identifying the malicious nodes using improved fine grained packet analysis method. The method also improved the routing security using proposed algorithm. The system will improve the network performance and packet delivery ratio.

Keywords: MANET, Packet Loss Analysis, Malicious node, FGA, PDR

Reference
  1. T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for AdHoc network research,” Wireless Commun. Mobile Comput. Special Issue Mobile Ad Hoc Netw.: Res., Trends, Appl., vol. 2, no. 5, pp. 483–502, Aug. 2002.
  2. R. Korsnes, K. Ovsthus, F. Y. Li, L. Landmark, and O. Kure, “Link lifetime prediction for optimal routing in mobile ad hoc networks,” in Proc. MILCOM, Oct. 17–20, 2005, vol. 2, pp. 1245–1251.
  3. M. Karthik and P. Senthilbabu, “PESR protocol for predicting route lifetime in mobile ad hoc networks,” in Proc. ICON3C, 2012, pp. 22–27.
  4. A. Kumar, S. Jophin, M. S. Sheethal, and P. Philip, “Optimal route life time prediction of dynamic mobile nodes in manets,” in Proc. Adv. Intell. Syst. Comput., 2012, vol. 167, pp. 507–517.
  5. Elisa Bertino, Daniele Midi, Muhammad Saleen Khan, Majid Iqbal Khan, “ Fine Grained Analysis of Packet Loss in MANET”, IEEE, 2017, pp. 7798-7807.
  6. Yuxin Liu, Mianxiong Dong, Kaoru Ota, and Anfeng Liu, ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 9, pp-2013-2018, SEPTEMBER 2016,
  7. N. Leone et al., “The DLV system for knowledge representation and reasoning,” ACM Trans. Comput. Logic, vol. 7, no. 3, pp. 499–562, Jul. 2006.
  8. N. Ramanathan et al., “Sympathy for the sensor network debugger,” in Proc. ACM SenSys, San Diego, CA, USA, 2005, pp. 255–267.
  9. A. Cerpa, J. L. Wong, L. Kuang, M. Potkonjak, and D. Estrin, “Statistical model of lossy links in wireless sensor networks,” in Proc. IEEE IPSN, 2005, pp. 81– 88.
  10. D. Son, B. Krishnamachari, and J. Heidemann, “Experimental analysis of concurrent packet transmissions in low-power wireless networks,” in Proc. ACM SenSys, San Diego, CA, USA, 2005, pp. 237–250.