International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249–8958, Volume-8, Issue-6, August 2019
4833
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number F9117088619/2019©BEIESP
DOI: 10.35940/ijeat.F9117.088619
Abstract: In Wireless communication, Mobile Ad hoc Networks
is a self organized structure-less network. MANET can be
established easily in any kind of environment. At the same time
vulnerable nodes are affected by various kinds of attacks due to
changes in topology of the network. Dynamic routing protocols
provide a multipath route between movable farthest nodes. In
spite of that, malicious nodes in the network perform against the
routing protocols. In the previous work of NNT to reduce packet
dropping attacks in the node and improve node performance by
Neighbor Node Trusted (NNT) concept, malicious and selfish
nodes are identified by the time interval between the nodes. The
Cluster supported trusting routing protocol(CSTRP) divides the
networks into a number of clusters and in turn one of the nodes
acts as Cluster-Head(CH) and CH controls the routing activity in
the cluster. The CH deliberately monitors node trustworthiness
and protects from malicious node and improves reliable security.
This paper, proposing swarm intelligent method to select a trust
path from different routes between source to destination, is called
Trust path Ant Colony optimization (TpACo) algorithm, which
serves as the best route and controls the Packet dropping attack
and collusion in the network. The results of NS-2 simulator
scrutinize the performance of TpACo in various situations. As
such the Packet delivery Ratio increased 9.3% than NNT and
CSTRP Algorithm. Besides End-to-End delay performance
increases to 16%for NNT and 23% for CSTRP and Throughput
increased 14.2 % then NNT and CSTRP.
Keywords : Mobile Ad-hoc Network, AODV, Packet drop &
Collusion Attack, Ant Colony Optimization(ACO), NNT and
CSTRP.
I. INTRODUCTION
The Networks are of two types: wire network and wireless
Network. At present, most of us prefer wireless networks
because they are user-friendly when compared with wire
networks such as secure and fast to upload or download the
data. The wireless device in the network can move randomly
around and within the area such as laptop, handheld devices,
etc., are major advantage of wireless network. In modern
technology, wireless network is also classified as
infrastructure network and infrastructure-less networks.
Infrastructure network has a control unit, which controls
every node within the network. Whereas infrastructure-less
self-configuring network does not have any control units.
Revised Manuscript Received on August 30, 2019
S. Sugumaran, is Research Scholar in the department of Electronics and
Communication Engineering, SCSVMV (Deemed to be University),
Kanchipuram, Tamil Nadu, India.
Dr. P. Venkatesan, is Associate Professor in the department of
Electronics and Communication Engineering, SCSVMV (Deemed to be
University), Kanchipuram, Tamil Nadu, India.
Each and every node linking dynamically in the network is
termed as Mobile Ad-hoc network (MANET). As MANET
has autonomous topology, each and every node is free to
move in any direction within the network area and links are
dynamically changing between the nodes. Hence, it is
considered to have end-to-end connection, self-forming and
self healing technology.
The routing protocol creates a route path from sender to
receiver through a number of adjacent nodes within the
network. Hence Routing protocol form route and effectively
deliver the packet to the destination.In MANET, routing
protocols are classified into two types: they are Reactive and
Proactive (table driven) protocols. In Proactive protocols,
every node maintains neighboring node detail in table form
and repeatedly updates the changes of neighboring node
movement. The Reactive Routing protocol is an on demand
routing protocol, and whenever it is required it can be used. It
moves to any context to connect with the destination. The
Route is created by flooding the route REQ and REP
controlling message within the network.
Compared with proactive routing protocol, reactive routing
protocol overhead is less on the network. Various types of
Reactive protocols are AODV (Ad hoc On-demand Distance
Vector), DSR(Dynamic Source Routing),
TORA(Transmission-aware Opportunistic Ad hoc Routing
Protocol, etc. All the nodes in the networks are providing the
best path between source and destination with trust. Whereas
in real case, one of the nodes act as malicious. A Malicious
node affecting routing performances of the network is known
as an [4] attack. Attacks take place due to lack of
centralization and dynamic topology of the nodes. They are
classified as passive and active attacks, Passive attack does
not disrupt the network operation and simply monitors
network performance and identification of passive attacks in
the network is complicated. Active attacks affect operation of
the network such as packet drop by adjacent malicious node,
by modifying the packet details and injecting malicious node
to confuse the destination position and so on. Collusion attack
is more than one number of malicious nodes in the network
combined to distract the performances of the network.
The Neighbor Node Trusted (NNT) Notion [5] algorithm is
similar to AODV route finding process by providing
additional security to the network. NNT identified two
various attacks of selfish and malicious node in the networks.
Optimized Trust Path for Control the Packet
Dropping and Collusion Attack using Ant
Colony in MANET
S. Sugumaran, P. Venkatesan