Loading

An Attack Proof Trust Model for Secure Path Selection with Data Transmission in MANET
Ravi Lodhi1, Shiv Kumar2, Babita Pathik3

1Ravi Lodhi, M.Tech. Scholar, Department of Computer Science and Engineering, Lakshmi Narain College of Technology Excellence, Bhopal (M.P), India.
2Dr. Shiv Kumar, Professor & Head, Department of Computer Science and Engineering, Lakshmi Narain College of Technology Excellence, Bhopal (M.P), India.
3Babita Pathik, Assistant Professor, Department of Computer Science and Engineering, Lakshmi Narain College of Technology Excellence, Bhopal (M.P), India.
Manuscript received on January 08, 2017. | Revised Manuscript received on January 16, 2017. | Manuscript published on January 31, 2017. | PP: 1-4 | Volume-3 Issue-7, January 2017. | Retrieval Number: G0389013717
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A mobile ad-hoc network (MANET) is a network of mobile nodes which also act as routers and are connected by wireless links. These routers are free to move and organize themselves at random; thus, the network’s wireless topology may change rapidly and unpredictably. The dynamic nature of MANETs makes network open to attacks and unreliability. MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANETs is a legitimate challenge. Dynamic source routing set of rules is a functional protocol in wireless mobile ad-hoc network (MANET). Data Safekeeping and detection of malicious node in a MANET is an imperative job in any network. To achieve reliability and availability, routing protocols should be powerful against malicious attacks. This paper provides a trust model that detects attacks while data transmission and finding secure route in MANET. Experimentally outcome indicated that system is fine appropriate for confident and enhanced data communication. The structure also accomplishes protected routing to safeguard MANET against malevolent node. The outcomes exposed that the scheme security and throughput of the system is enhanced.
Keywords: MANET, secure routing, malicious attack, Ad hoc Network, Wireless Routing Protocol, trust value.