International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 22498958, Volume-8, Issue-6, August 2019 4833 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number F9117088619/2019©BEIESP DOI: 10.35940/ijeat.F9117.088619 Abstract: In Wireless communication, Mobile Ad hoc Networks is a self organized structure-less network. MANET can be established easily in any kind of environment. At the same time vulnerable nodes are affected by various kinds of attacks due to changes in topology of the network. Dynamic routing protocols provide a multipath route between movable farthest nodes. In spite of that, malicious nodes in the network perform against the routing protocols. In the previous work of NNT to reduce packet dropping attacks in the node and improve node performance by Neighbor Node Trusted (NNT) concept, malicious and selfish nodes are identified by the time interval between the nodes. The Cluster supported trusting routing protocol(CSTRP) divides the networks into a number of clusters and in turn one of the nodes acts as Cluster-Head(CH) and CH controls the routing activity in the cluster. The CH deliberately monitors node trustworthiness and protects from malicious node and improves reliable security. This paper, proposing swarm intelligent method to select a trust path from different routes between source to destination, is called Trust path Ant Colony optimization (TpACo) algorithm, which serves as the best route and controls the Packet dropping attack and collusion in the network. The results of NS-2 simulator scrutinize the performance of TpACo in various situations. As such the Packet delivery Ratio increased 9.3% than NNT and CSTRP Algorithm. Besides End-to-End delay performance increases to 16%for NNT and 23% for CSTRP and Throughput increased 14.2 % then NNT and CSTRP. Keywords : Mobile Ad-hoc Network, AODV, Packet drop & Collusion Attack, Ant Colony Optimization(ACO), NNT and CSTRP. I. INTRODUCTION The Networks are of two types: wire network and wireless Network. At present, most of us prefer wireless networks because they are user-friendly when compared with wire networks such as secure and fast to upload or download the data. The wireless device in the network can move randomly around and within the area such as laptop, handheld devices, etc., are major advantage of wireless network. In modern technology, wireless network is also classified as infrastructure network and infrastructure-less networks. Infrastructure network has a control unit, which controls every node within the network. Whereas infrastructure-less self-configuring network does not have any control units. Revised Manuscript Received on August 30, 2019 S. Sugumaran, is Research Scholar in the department of Electronics and Communication Engineering, SCSVMV (Deemed to be University), Kanchipuram, Tamil Nadu, India. Dr. P. Venkatesan, is Associate Professor in the department of Electronics and Communication Engineering, SCSVMV (Deemed to be University), Kanchipuram, Tamil Nadu, India. Each and every node linking dynamically in the network is termed as Mobile Ad-hoc network (MANET). As MANET has autonomous topology, each and every node is free to move in any direction within the network area and links are dynamically changing between the nodes. Hence, it is considered to have end-to-end connection, self-forming and self healing technology. The routing protocol creates a route path from sender to receiver through a number of adjacent nodes within the network. Hence Routing protocol form route and effectively deliver the packet to the destination.In MANET, routing protocols are classified into two types: they are Reactive and Proactive (table driven) protocols. In Proactive protocols, every node maintains neighboring node detail in table form and repeatedly updates the changes of neighboring node movement. The Reactive Routing protocol is an on demand routing protocol, and whenever it is required it can be used. It moves to any context to connect with the destination. The Route is created by flooding the route REQ and REP controlling message within the network. Compared with proactive routing protocol, reactive routing protocol overhead is less on the network. Various types of Reactive protocols are AODV (Ad hoc On-demand Distance Vector), DSR(Dynamic Source Routing), TORA(Transmission-aware Opportunistic Ad hoc Routing Protocol, etc. All the nodes in the networks are providing the best path between source and destination with trust. Whereas in real case, one of the nodes act as malicious. A Malicious node affecting routing performances of the network is known as an [4] attack. Attacks take place due to lack of centralization and dynamic topology of the nodes. They are classified as passive and active attacks, Passive attack does not disrupt the network operation and simply monitors network performance and identification of passive attacks in the network is complicated. Active attacks affect operation of the network such as packet drop by adjacent malicious node, by modifying the packet details and injecting malicious node to confuse the destination position and so on. Collusion attack is more than one number of malicious nodes in the network combined to distract the performances of the network. The Neighbor Node Trusted (NNT) Notion [5] algorithm is similar to AODV route finding process by providing additional security to the network. NNT identified two various attacks of selfish and malicious node in the networks. Optimized Trust Path for Control the Packet Dropping and Collusion Attack using Ant Colony in MANET S. Sugumaran, P. Venkatesan