Revamped Malicious Node Detection and Removal Scheme in MANET using Auxiliary Cluster Head
Niveditha P S1, Sreeleja N2, Unnithan3, Prasad R Menon4
1Niveditha P S, Department of Electronics and Communication Engineering, National Service Schem College of Engineering, Palakkad, Kerala, India.
2Sreeleja N Unnithan, Department of Electronics and Communication Engineering, National Service Schem College of Engineering, Palakkad, Kerala, India.
3Unnithan, Department of Electronics and Communication Engineering, National Service Schem College of Engineering, Palakkad, Kerala, India.
4Prasad R Menon, Department of Electronics and Communication Engineering, National Service Schem College of Engineering, Palakkad, Kerala, India.
Manuscript received on 17 May 2019 | Revised Manuscript received on 24 May 2019 | Manuscript Published on 02 June 2019 | PP: 691-695 | Volume-8 Issue-7S2 May 2019 | Retrieval Number: G11180587S219/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The Mobile ad hoc networks are widely accepted due to its wide range of applications in various fields of life. Amidst these advantages MANETs faces a lot of security issues due to its mobile nature and lack of efficient security mechanisms. Proposed EMDR (Esteem based Malicious node Detection and Removal) scheme provides a secure routing method for the efficient transfer of data in the network. This protocol helps to overcome the malicious node attacks effectively. It utilizes the validity value table, esteem level table and neighbor table maintained by every mobile node in the communication network to find and use a secure route between the initiating node and the final node. Depending upon the values obtained in the validity value table and esteem level table, the cluster head node identify the malicious nodes present in the path and find the most reliable route to the destination node. In addition to this security mechanism, here every mobile node has more than one cluster head. This standby cluster head is termed as auxiliary cluster head (ACH). When the main cluster head fails during data transmission, then the source node seeks the help of the auxiliary cluster head immediately. Thus it eliminates the condition of network failure.
Keywords: Auxiliary Cluster Head, Malicious Node, Network Failure Reduction.
Scope of the Article: Communication