Professional Documents
Culture Documents
ABSTRACT
The Mobile Ad hoc Network is temporary, self
configured, structure less wireless network. The security
of the mobile node in Ad hoc is very complicated due to
the malicious activity. We survey some of the issues of
MANET and their mitigation technique then the
properties of MANET and Trust based routing protocol
along with anonymous routing protocol with its
malicious activity.
Ms.A.Kanimozhi2 M.E.,
2
Assistant Professor,
Department of Computer Science and Engineering,
Kongunadu College of Engineering and Technology,
Trichy, Tamilnadu, India.
I.
INTRODUCTION
II.
Mobility
The hop movement causes the link failure in
changing network topology. This implies the packet loss,
energy wastage. The designed protocol must have high
time to live(TTL) to avoid the path breaks.
Bandwidth Constrain
The bandwidth of node and offered data rate is much
lesser than the wired network. The routing protocol uses
the bandwidth in better by keeping the overhead as low
www.ijete.org
B
Not necessary to trust
Context-dependency:
If Node A have less energy, then it can not be able to
forward the packet to its neighbors. So, the trust of
energy will be rejected, but the trust of the Node A is not
changed.
Reputation:
Reputation is other node opinion about the observed
node.
Quantitative value:
The trust value be discrete or continuous.
IV.
III.
PROPERTIES OF TRUSTINESS IN
MANET
PARAMETERS OF NETWORK
FRAMEWORK
www.ijete.org
V.
Sybil Attack:
The Sybil attack is, if a spiteful node duplicates the
missing node then it will become visible as various
spiteful nodes combine together .The main aim of Sybil
attack is attacking the whole network services and the
auto arrangement while the support is needed for the
network.
The Sybil attack is overcome through the shared
symmetric key over the network. The trustworthiness
based QOS Routing Protocol for Wireless Ad hoc
Networks says[8], while searching the route on network
every node needs to authenticate with its neighbors by
using RSA encryption algorithm. So, the spiteful node is
prevented by the node authentication.
The Anonymous Location Aided Routing in
Suspicious MANET (ALARM)[15] says, that Sybil
attack is overcome with its group signature and self
distinction.
The Sybil attack also overcome through the
Unobservable secure on demand routing protocol
l(USOR)[7] .
Passive Attack[14]:
The passive attack is monitoring the communication
path, packet size, contents of the packet, source and
destination, and then makes delay on the packet
transformation. It does not affect any content on packet,
path. Its affecting the confidentiality of the packet.
Eavesdropper:
This Attack will take the important
information such as location, details about the node,
private key, and public key during the communication
over the network.
Silentdropping:
The silent dropping is, the enemies
will remove the nodes present on the network without
knowing by other nodes.
www.ijete.org
I.
ISSUES
2. Mobility
238
www.ijete.org
II.
PROPERTIE
ROUTING
PROTOCOL
Scalability
Demand
Operation,
Sleep"
Operation
Security
VI.
CONCLUSION
[3]
[4]
[5]
REFERENCES
[1]
239
www.ijete.org