Wireless ad hoc networks are accumulation of wireless nodes which communicate precisely above prevailing wireless channel. The nodes are rigged with the wireless transceiver. In ad hoc network a node can disseminate only with nodes in its area, such node can communicate with other nodes, but a routing algorithm is imperative. Link error and malicious packet dropping are two means by which packet loss can occur. It is paramount for detect and encounters whether the losses are by cause of link errors only, or is by virtue of both link error and malicious packet drop. Absolute interest is in the insider incursion case where such malicious nodes abandon and decline packets selectively to deteriorate the network performance. Bitmap for transmission of packets of each node is obtained. By using the bitmap, correlation can be obtained between the lost packets and from this correlation, malicious node can be identified. For correlation of lost packets HLA based mechanism is used to verify the malicious node which is responsible for packet dropping. PSO technique is used for securing data transmission. This is symmetric encryption algorithm. In this encryption key is public whereas the decryption key which is kept secret. MD5 algorithm is used to maintain and assure the accuracy and consistency of data, integrity of data. Random numbers are sending during iteration as an encrypted value so as to enhance security. In case of unauthorized access the data is not misplaced or corrupted due to this property of sending random numbers. After finding the malicious node and error that is whether it is due to link error or the combination of malicious node and link error substitute of malicious node can also be attained via PSO algorithm.
Tao Shu and Marwan Krunz “Privacy-Preserving and Truthful Detection of Packet Dropping Attacks” in Wireless AdHoc Networks”, June 2014.
Amutha.S, Balasubramanian.K, “Secure Implementation of Routing Protocols for Wireless Ad hoc Networks” pp. 960-965, Feb 2013.
Shu.T, Krunz.M, and Liu.S, “Secure data collection in wireless sensor networks using randomized dispersive routes”. Vol. 9, no. 7, pp. 941–954, Mar 2010.
Proano.A and Lazos.L “Packet-hiding methods for preventing selective jamming attacks” Dependable and Secure Computing., vol. 9, no. 1, pp. 101–114, Aug 2012.
Noble George and Sujitha M “Truthful detection of packet dropping attack in MANET” International Journal of Advanced Research in Computer and Communication Engineering, vol. 4 issue 7, 2015.
Bobby Sharma Kakoty, S. M. Hazarika and N. Sarma “NAODV- Distributed Packet Dropping Attack Detection in MANETs”International Journal of Computer Applications (0975-8887), vol. 83- no. 11, 2013.
Dr. C. Kumar Charliepaul and K. Megala Devi “Secure routing and Attack detection in wireless AD HOC Network” International Journal on Engineering Technologies and Sciences, vol. 1 issue 6, 2014.
Wang.C, Wang.Q, Ren.K, and Lou.W. “Privacy- preserving public auditing for data storage security in cloud computing”, IEEE INFOCOM, Mar. 2010.
B. Sun, Y. Guan, J. Chen and U. W. Pooch, Detecting black- hole attack in mobile ad hoc networks, In Proc. 5th European Personal Mobile Communications Conference, Glasgow, UK, April 2003.
Munir S.A., Biao Ren, Weiwei Jiao, Bin Wang Dongliang Xie and Jian Ma, \"Mobile Wireless Sensor Network: Architecture and Enabling Technologies for Ubiquitous Computing\", Advanced Information Networking and Applications Workshops, vol.2, pp.113-120, 21-23 May 2007.
Homomorphic Linear Authenticator, Particle Swarm Optimization, Message Digest Algorithm.