Title :
Enhancing the pervasive trust management model in MANETs by analyzing the factors affecting performance of various attacks
Author :
Durairajan, Pandiyan ; Sasikala, T.
Author_Institution :
Sathyabama Univ., Chennai, India
Abstract :
Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. In Mobile Ad Hoc Network (MANET), network traffics are redirected to a specific node or from the malicious node causing serious damage. And also it causes false identification of a good node as a bad one. This increases false alarms and as a result any further communication with that node or via that node is halted. It occurs due to lack of authentication and it grants provision for any node to corrupt other node´s legitimate information. In this paper we compare and analysis the performance of various attacks with proposed attacks on different routing protocol in mobile ad hoc networks. Various types of scenarios are generated and each of the attacks is simulated on each of these, then their parameters like throughput, packet delivery ratio and delay will be compared The performance differentials are analyzed using varying pause time, constant nodes and dynamic topology. Based on the observations, we make valuable conclusions about which attacks induce more false alarm and impact on Mobile Ad Hoc Network.
Keywords :
mobile ad hoc networks; routing protocols; telecommunication network management; telecommunication network topology; telecommunication traffic; MANET; base station; centralized access point; constant nodes; constrained capability; distributed cooperation; dynamic topology; malicious node; mobile ad hoc network; network traffics; node legitimate information; open medium; packet delivery ratio; pervasive trust management model enhancement; routing protocol; throughput; varying pause time; wireless mobile hosts; Ad hoc networks; Mobile computing; Routing; Routing protocols; Security; Watches; Wireless networks; Attacks; MANET; Wireless Networks;
Conference_Titel :
Emerging Trends in Robotics and Communication Technologies (INTERACT), 2010 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4244-9004-2
DOI :
10.1109/INTERACT.2010.5706198