Affiliation:
1. Computer Science and Engineering, Vedica Institute of Technology, Bhopal, Madhya Pradesh, India
Abstract
Mobile Ad-hoc Network is a collection of wireless mobile node, consists of each wireless transmitters and receivers, which dynamically forming a temporary network and communication between transmitter and receiver is by using bi-directional link. Either directly, if nodes in MANET are within communication range or indirectly means transmitter node rely on intermediate node, for forwarding data to destination node. IDS can be well-defined as the protector system which self-detects malicious activities within a network, and thus generates an alarm to alert the security device at a locality if intrusions are considered to be illegal on that network or host. There me many approach to classify IDS. In the existing work, they used fuzzy logic which decides the rules for the trust evaluation of the nodes. Rules should be defined previously which is difficult to manage for the unknown variables. This method is not suitable for the dynamic nature of the network. So we applied better technique which generates the more trustful network. In our proposed work, trust is calculated by sending the Route Request (RREQ) packets to the network then the destination node send Route Reply (RREP) packet. Calculate RTT for distance between the sender and destination nodes. We select the path by taking the shortest RTT and then form clusters. Calculate the energy of each node in cluster and select cluster head of maximum energy. Cluster head forward the data from source to destination. This method removes the chance of malicious node from the network.
Reference41 articles.
1. Aarti, Dr. S. S. Tyagi "Study of MANET: Characteristics, Challenges, Application and Security Attacks" Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering.
2. Md. MahbubulAlam, And TanmoonTazShetu, "A Report submitted to sadiahamidkazi of computer science and engineering department of brac university in fulfillment of the requirements for thesis work" April – 2011.
3. AikateriniMitrokotsa, Christos Dimitrakakis, ―Intrusion detection in MANET using classification algorithms: The effects of cost and model selection‖, Ad Hoc Networks, Volume 11, Issue 1, January 2013, Pages 226-237.
4. Gruenwald, L., Javed, M., and Gu, M. Energy- Efficient Data Broadcasting in Mobile Ad-Hoc Networks. In Proc. International Database Engineering and Applications Symposium (IDEAS '02), July, 2002.
5. Lee, S., Su, W., and Gerla, M., "Wireless Ad Hoc Multicast Routing with Mobility Prediction," Mobile Networks and Applications, 6(4): pp. 351-360, 2001.