hrcak mascot   Srce   HID

Izvorni znanstveni članak
https://doi.org/10.20532/cit.2016.1002835

Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks

Rutuja Shah ; Vellore Institute of Technology, Vellore, Tamil Nadu, India
Sumathy Subramaniam   ORCID icon orcid.org/0000-0003-0733-6351 ; Vellore Institute of Technology, Vellore, Tamil Nadu, India
Dhinesh Babu Lekala Dasarathan ; Vellore Institute of Technology, Vellore, Tamil Nadu, India

Puni tekst: engleski, pdf (1 MB) str. 237-252 preuzimanja: 489* citiraj
APA 6th Edition
Shah, R., Subramaniam, S. i Lekala Dasarathan, D.B. (2016). Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks. Journal of computing and information technology, 24 (3), 237-252. https://doi.org/10.20532/cit.2016.1002835
MLA 8th Edition
Shah, Rutuja, et al. "Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks." Journal of computing and information technology, vol. 24, br. 3, 2016, str. 237-252. https://doi.org/10.20532/cit.2016.1002835. Citirano 02.03.2021.
Chicago 17th Edition
Shah, Rutuja, Sumathy Subramaniam i Dhinesh Babu Lekala Dasarathan. "Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks." Journal of computing and information technology 24, br. 3 (2016): 237-252. https://doi.org/10.20532/cit.2016.1002835
Harvard
Shah, R., Subramaniam, S., i Lekala Dasarathan, D.B. (2016). 'Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks', Journal of computing and information technology, 24(3), str. 237-252. https://doi.org/10.20532/cit.2016.1002835
Vancouver
Shah R, Subramaniam S, Lekala Dasarathan DB. Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks. Journal of computing and information technology [Internet]. 2016 [pristupljeno 02.03.2021.];24(3):237-252. https://doi.org/10.20532/cit.2016.1002835
IEEE
R. Shah, S. Subramaniam i D.B. Lekala Dasarathan, "Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks", Journal of computing and information technology, vol.24, br. 3, str. 237-252, 2016. [Online]. https://doi.org/10.20532/cit.2016.1002835

Sažetak
Mobile ad hoc Networks (MANET), being infrastructureless and dynamic in nature, are predominantly susceptible to attacks such as black hole, worm hole, cunning gray hole attack at source or destination. Various
solutions have been put forth so far in literature in order to mitigate the effects of these attacks on the network performance and to improve the reliability of the network. However, these attacks are still prominently a serious threat in MANET. Hence, a trust based routing
strategy termed Secure-BEFORE routing (Best FOrwarding Route Estimation) is proposed to ensure optimal route estimation in computing the trust value and hop counts using the dummy packets inside the network at 1-hop level. It is observed that the overall performance of the network is improved in providing one-hop level security by maintaining the packet equivalence ratio. Malicious and suspicious nodes are isolated and eliminated from the network, based on their behavior.

Ključne riječi
black hole attack; gray hole attack; worm hole attack; secure-BEFORE routing; SRNT (MANET)

Hrčak ID: 170419

URI
https://hrcak.srce.hr/170419

Posjeta: 716 *