Skip to main content
Log in

Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

MANETs have grown into a usually used network for countless applications. Mostly, a transmission medium perspective undergoes with thoughtful security worries, which may be focused to packet dropping. In the network, when packet forward the drooping of valuable packets may occur due to the presence of malicious nodes. The major sources in MANET for packet losses are malicious packet dropping and link error. A node can perform unkindly and could harm the process of sending the packet. In order to overcome the issues and to have an efficient detection process of malicious drop with better secure performances, the improved failure aware third party Auditor (IFTPA) based homomorphism linear authenticator (HLA) mechanism (IFHM) is proposed with the secured ad hoc on demand distance vector (SAODV). The proposed approach permitsthe trustworthiness verification of packet loss information and malicious node detection by dropping identifying of routing and data packet. Packet dropping is because of the both link error and occurrence of malicious nodes, which can identify by SAODV. To make certain efficiency, the authentication service is implemented in the protocol. However, to succeed storage scalability, the protocol implements the pseudo random function (PRF) in the system to fix the secret key of a client to its uniqueness using the secret key of its server.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Vinodhini, A., Prabaharan, G.: Detecting packet dropping attacks and preserving privacy path using optimal link state routing in wanets. In: Proceedings of 41st IRF International Conference, 24 April, 2016, pp. 36–40

  2. Sindhuja, M., Sahaya Princy, A.: Privacy and detecting malicious packet dropping in wireless ad hoc network. Int. J. Eng. Comput. Sci. 4(11), 15041–15044 (2015)

    Google Scholar 

  3. Shetty, S.S.: Detecting truthfulness of packet dropping attacks in WANETs. Asian J. Eng. Technol. Innov. 4(7), 80–83 (2016)

    Google Scholar 

  4. Sneha, C.S., Jose, B.: Detecting packet dropping attack in wireless ad hoc network. Int. J. Cybern. Inf. (IJCI) 5(2), 117–124 (2016)

    Google Scholar 

  5. George, N., Sujitha, M.: Truthful detection of packet dropping attack in MANET. Int. J. Adv. Res. Comput. Commun. Eng. 4(7), 317–320 (2015)

    Google Scholar 

  6. Patel, N.J., Jhaveri, R.H.: Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: a survey. In: 2015 International Conference on Signal Processing and Communication Engineering Systems (SPACES), 2015 International Conference on SPACES-2015, pp. 468–472

  7. Patel, K.N., Jhaveri, R.H.: Addressing packet dropping misbehavior using metaheuristic approach: A survey. In: 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), Visakhapatnam, 2015, pp. 1–6

  8. Soliyal, N., Bhadauria, H.S.: Preventing packet dropping attack on AODV based routing in mobile ad-hoc MANET. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, 2016, pp. 1371–1375

  9. Bhagyashree, S., Uppar, A.S.: Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing. Int. J. Innov. Res. Electr. Electron. Instrum. Control Eng. 3(1), 218–221 (2015)

    Google Scholar 

  10. Shu, T., Krunz, M.: Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks. IEEE Trans. Mob. Comput. 14(4), 813–828 (2015)

    Article  Google Scholar 

  11. Chandinee Saraswathy, K., Keerthi, D., Padma, G.: HLA based third party auditing for secure cloud storage. Int. J. Comput. Sci. Inf. Technol. 5(2), 1526–1532 (2014)

    Google Scholar 

  12. Deepa, V., Jyotheeswari, P., Neerugatti, V.: A privacy-preserving unpadded RSA based-third party auditing protocol for cloud storage secure. SIJ Trans. Comput. Sci. Eng. Appl. (CSEA) 2(5), 171–176 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Vanitha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vanitha, K., Zubair Rahaman, A.M.J. Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol. Cluster Comput 22 (Suppl 6), 13453–13461 (2019). https://doi.org/10.1007/s10586-018-1958-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-1958-9

Keywords

Navigation