Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 47, Pages: 1-7
C. Atheeq and M. Munir Ahamed Rabbani
B. S. Abdur Rahman University, Seethakathi Estate, Vandalur, Chennai – 600048, Tamil Nadu, India; [email protected], [email protected]
The communication between mobile node and fixed node is achieved through the Integrated Internet MANET (IIM) with the help of the gateway by increasing the application domain of mobile ad hoc network. The wireless channel and dynamic nature of Mobile Ad hoc Networks (MANETs) experiences integrated MANETs to suffer from security susceptibility. Methods/Analysis: An untrustworthy mobile node can harm the data and adversely affect the communication between a mobile node and a fixed node in IIM. In this manner, examining the trust level impacts the certainty with which an element may decide for information transmission. In order to provide a secure data transmission we are proposing an Effective Trusted Knowledge Algorithm (ETKA) that calculates the nodes trust. Findings: The proposed algorithm has two phases for finding the trusted node. In the first phase, observing the nodes in promiscuous mode, in the second phase, the effective trust value is calculated by hybrid method. Improvement: Through extensive simulation analysis, we can come to an end that the developed mechanism leads to a successful methodology towards security and protection of data from untrusted nodes in integrated internet and MANET.
Keywords: Integrated Internet MANET, Promiscuous Mode, Trusted Table, Trust Value
Subscribe now for latest articles and news.