We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

TFT Technique with Adaptive Thresholding for Selfish Attack Prevention in MANET

by Ankita Verma, Ashish Khare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 16
Year of Publication: 2013
Authors: Ankita Verma, Ashish Khare
10.5120/10547-4431

Ankita Verma, Ashish Khare . TFT Technique with Adaptive Thresholding for Selfish Attack Prevention in MANET. International Journal of Computer Applications. 63, 16 ( February 2013), 1-4. DOI=10.5120/10547-4431

@article{ 10.5120/10547-4431,
author = { Ankita Verma, Ashish Khare },
title = { TFT Technique with Adaptive Thresholding for Selfish Attack Prevention in MANET },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 16 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number16/10547-4431/ },
doi = { 10.5120/10547-4431 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:14:27.972213+05:30
%A Ankita Verma
%A Ashish Khare
%T TFT Technique with Adaptive Thresholding for Selfish Attack Prevention in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 16
%P 1-4
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents an Adaptive Trusted Fault Tolerance (TFT) scheme with Data Recovery for the prevention of selfish attack in MANET it also prevents the packets drop caused by the buffer overflow of the node. In the proposed technique an adaptive variations in trust certification waiting time is proposed instead of simple TFT schemes, which helps reduces the false identification of nodes during heavy load conditions it also reduces the identification delay during the light load conditions. The proposed model is simulated using OPNET network simulator and the simulation results shows that the proposed algorithm performs better than simple Trusted Fault Tolerance (TFT) scheme.

References
  1. Chandrasekaran S & Shanmugam Udhayakumar "Trusted Fault Tolerant Model of MANET with Data Recovery", 2011 Fourth International Conference on Intelligent Networks and Intelligent Systems.
  2. Md. Amir Khusru Akhtar & G. Sahoo "Mathematical Model for the Detection of Selfish Nodes in MANETs", International Journal of Computer Science and Informatics (IJCSI) ISSN (PRINT): 2231 –5292, Volume-1, Issue-3.
  3. Debdutta Barman Roy and Rituparna Chaki "MADSN: Mobile Agent Based Detection of Selfish Node in MANET", International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 4, August 2011.
  4. Frank Kargl, Andreas Klenk, Stefan Schlott, and Michael Weber, "Advanced Detection of Sel?sh or Malicious Nodes in Ad hoc Networks".
  5. Martin Schütte "Detecting Sel?sh and Malicious Nodes in MANETs", SEMINAR: SICHERHEIT IN SELBSTORGANISIERENDEN NETZEN, HPI/UNIVERSITÄT POTSDAM, SOMMERSEMESTER 2006.
  6. Niyati Shah, Sharada Valiveti "Intrusion Detection Systems for the Availability Attacks in Ad-Hoc Networks" International Journal of Electronics and Computer Science Engineering.
  7. YOGESH CHABA, YUDHVIR SINGH, PRABHA RANI "Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks", RECENT ADVANCES in ELECTRONICS, HARDWARE, WIRELESS and OPTICAL COMMUNICATIONS.
  8. Prof. Rekha Patil, Shilpa Kallimath "Cross Layer Approach for Selfish Node Detection in MANET" International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 1, Issue 3, September 2012.
  9. Amit Saxena, J. L Rana "Analysis of Selfish and Malicious Nodes on DSR Based Ocean Protocol in MANET" TECHNIA International Journal of Computing Science and Communication Technologies, VOL. 3, NO. 1, July 2010. (ISSN 0974-3375).
  10. M. B. Mukesh Krishnan, P. Sheik Abdul Khader "Fuzzy Based Security Model to Detect Compromised and Selfish Nodes to Mobile AD HOC Network" European Journal of Scientific Research ISSN 1450-216X Vol. 86 No 4 September, 2012, pp. 520-524.
  11. Naveen Kumar Gupta, Ashish Kumar Sharma, Abhishek Gupta "Selfish Behaviour Prevention and Detection in Mobile Ad-Hoc Network Using Intrusion Prevention System (IPS)".
  12. T. V. P. Sundararajan, Dr. A. Shanmugam "Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET" International Journal of Network Security & Its Applications (IJNSA), Volume 2, Number 2, April 2010.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Trusted Fault Tolerance (TFT) Selfish Attack