Title :
Cross layer approach to detect malicious node in MANET
Author :
Patil, Vidya N. ; Thorat, Sandeep A.
Author_Institution :
Dept. of Comput. Sci. & Enginnering, Rajarambapu Inst. of Technol., Rajaramnagar, India
Abstract :
Mobile Ad hoc NETworks (MANET) are the wireless networks of mobile computing devices without any support of a fixed infrastructure. Routing in MANET is based on mutual support of nodes in the network. But some nodes from the network acts maliciously, so the routing in network collapses. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of the participating nodes and the underlying networking systems without presenting any definite scheme for trust establishment. For defining trustworthiness of the nodes different trust parameters are used by different authors in the literature. In order to calculate more accurate trust value we analyze these different parameters from network as well as MAC layer of protocol stack. Furthermore we also assign some weights to these parameters. On implementing this approach using NS2 simulator we compared performance of the system with and without detection of malicious node.
Keywords :
access protocols; mobile ad hoc networks; routing protocols; telecommunication security; MAC layer; MANET; NS2 simulator; cross layer approach; malicious node detection; mobile ad hoc networks; mobile computing devices; networking systems; protocol stack; routing; security schemes; trust establishment; trust parameters; trustworthiness; wireless networks; Data models; Mobile ad hoc networks; Routing; Routing protocols; Security; Uncertainty; Trust; Trust metrics; Trust parameters;
Conference_Titel :
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location :
Tiruchengode
Print_ISBN :
978-1-4799-3925-1
DOI :
10.1109/ICCCNT.2013.6726582