Ad hoc network is an autonomous collection of mobile nodes communicating over wireless links where the node scan communicate with each other in temporary manner with no centralized administration and in a dynamic topology that changes frequently. A malicious node can constantly report incorrect information to other nodes in the network, which can lead to whole network down. The proposed work identifying malicious node using trust value in cluster based MANET is used to detect the malicious node in cluster. The cluster formation process is realized by grouping nearby nodes to form a cluster. To every cluster, cluster head is assigned based on the energy of the nodes. The trust value calculation is used to find the behavior of the node. It is calculated by Cluster Member (CM), direct and indirect trust value. The trust value of the cluster member is maintained in the counter table. During the data transmission time, the Cluster Head (CH) monitors its cluster member behavior. When any misbehavior is monitored by cluster head means, it sends the request about that misbehaving node to its nearby node (NN) to get the direct trust value (DTV). And also CH sends the request to other cluster members about that misbehaving node. If that cluster members are having value about that misbehaving node means, it sends the indirect trust value to the CH. Otherwise cluster members ignores the request send by CH. The goal of the proposed work is identify the malicious nodes in the cluster using the trust values in effective manner. Simulation result in NS-2 accurately predicts the performance of proposed scheme in terms of cluster energy level analysis, routing performance, system performance under varying network conditions.
[1]
Gregory A. Hansen,et al.
The Optimized Link State Routing Protocol
,
2003
.
[2]
Mary Baker,et al.
Mitigating routing misbehavior in mobile ad hoc networks
,
2000,
MobiCom '00.
[3]
Paul Mühlethaler,et al.
An advanced signature system for OLSR
,
2004,
SASN '04.
[4]
Yih-Chun Hu,et al.
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
,
2002,
MobiCom '02.
[5]
Chung-wei Lee,et al.
Trust based adaptive on demand ad hoc routing protocol
,
2004,
ACM-SE 42.
[6]
Ming Gu,et al.
Trust Based Malicious Nodes Detection in MANET
,
2009,
2009 International Conference on E-Business and Information System Security.
[7]
Xu Qiao-ping,et al.
Secure On-demand Routing Protocol for Ad Hoc Network
,
2010
.
[8]
Yue Wu,et al.
Malicious node detection in ad hoc networks using timed automata
,
2007
.
[9]
Chris McDonald,et al.
Establishing Trust In Pure Ad-hoc Networks
,
2004,
ACSC.
[10]
Sanjay Kumar Jena,et al.
Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks
,
2011
.