Accusation Based on Non-Voting Mechanism in MANET using Clusters
Jayanthi. E1, Mohammed Ali Hussain2
1Jayanthi. E, Department of Computer Science and Engineering, KL University, Guntur Dist., A.P., India.
2Dr. Mohammed Ali Hussain, Department of Computer Science and Engineering, KL University, Guntur Dist., A.P., India.
Manuscript received on 21 March 2019 | Revised Manuscript received on 27 March 2019 | Manuscript published on 30 July 2019 | PP: 2821-2828 | Volume-8 Issue-2, July 2019 | Retrieval Number: B1925078219/19©BEIESP | DOI: 10.35940/ijrte.B1925.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: One of the challenges in MANET is authentication. To aid authentication, digital certificate are used by all the nodes in MANET. The network performs well if the nodes are trustworthy and cooperate properly. The certificate of the misbehaving nodes is revoked by certificate authority, there by debarring them from the network. The objective of this paper is to identify the malicious nodes which drop the packet deliberately to disrupt the network. Any node accusing the malicious node is inserted in the white list and the accused node is inserted in the blacklist based on Non-voting mechanism. The nodes placed in the black list are barred from the network. . Packet dropping due to link failure, mobility and traffic load intensity is excluded for accurate detection of the malicious node. Cluster based Non-voting mechanism with watchdog shows better performance in terms of better packet delay rate, packet delivery rate and packet loss rate while transmitting data. Clustering mechanism helps to reduce the communication overhead and certificate revocation provides secure network. Also, the false accusation is reduced as not all nodes accuse without proper analysis, with fear of being put on the whitelist, and being denied of further accusation. The algorithm is studied theoretically and evaluated practically using NS-2 to show better performance.
Index Terms: Blackhole Attacks, Network Security, Non-Voting Mechanism, and Watchdog.
Scope of the Article: Bio – Science and Bio – Technology