738 research outputs found

    Recommendation based trust model with an effective defence scheme for MANETs

    Get PDF
    YesThe reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that relies on the recommendations from other nodes in the network is vulnerable to the possible dishonest behaviour, such as bad-mouthing, ballot-stuffing, and collusion, of the recommending nodes. . This paper investigates the problems of attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation based trust model with a defence scheme that utilises clustering technique to dynamically filter attacks related to dishonest recommendations within certain time based on number of interactions, compatibility of information and node closeness. The model is empirically tested in several mobile and disconnected topologies in which nodes experience changes in their neighbourhoods and consequently face frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment

    Investigating Open Issues in Swarm Intelligence for Mitigating Security Threats in MANET

    Get PDF
    The area of Mobile Adhoc Network (MANET) has being a demanded topic of research for more than a decade because of its attractive communication features associated with various issues. This paper primarily discusses on the security issues, which has been still unsolved after abundant research work. The paper basically stresses on the potential features of Swarm Intelligence (SI) and its associated techniques to mitigate the security issues. Majority of the previous researches based on SI has used Ant Colony Optimization (ACO) or Particle Swarm Optimization (PSO) extensively. Elaborated discussion on SI with respect to trust management, authentication, and attack models are made with support of some of the recent studies done in same area. The paper finally concludes by discussing the open issues and problem identification of the review

    Predictive preemptive certificate transfer in Cluster-Based Certificate Chain

    Get PDF
    Mobile ad hoc networks are a set of nodes that cooperate and communicate wirelessly. This kind of networks in easy to deploy because there is no need of any pre-existing infrastructure. Security in Manets is a very important issue and it is hard to use conventional security techniques. Many approaches have been proposed to secure communication in Manets; most of them are based of public-key certifications which create a multitude of trust communication model.In this paper, we propose an amelioration of a distributed certificate chain that relies on the cluster based routing protocol. In our scheme, after forming clusters, the cluster-head node issue certificates for other nodes within its cluster. When a member node want migrates to an adjacent cluster, the cluster-head sends the nodeā€™s certificate to surrounding cluster-heads via gateway nodes. The protocol was doted by a preemptive predictive module to predict migration intention of member nodes. This approach has been evaluated by detailed simulation study. Simulation results show that this approach is scalable and generate lower certification overhead

    Fuzzy Logic Based DSR Trust Estimation Routing Protocol for MANET Using Evolutionary Algorithms

    Get PDF
    In MANET attaining consistent routing is a main problem due to several reasons such as lack of static infrastructure, exposed transmission medium, energetic network topology and restricted battery power. These features also create the scheme of direction-finding protocols in MANETs become even more interesting. In this work, a Trust centered routing protocol is suggested, since trust plays a vital role in computing path in mobile ad hoc networks (MANETs). Estimating and computing trust encourages cooperation in mobile ad hoc networks (MANETs). Various present grade systems suddenly estimate the trust by considering any one of the parameters such as energy of node, number of hops and mobility. Estimating trust is an Energetic multi objective optimization problem (EMOPs) typically including many contradictory goals such as lifetime of node, lifetime of link and buffer occupancy proportion which change over time. To solve this multi objective problem, a hybrid Harmony Search Combined with Genetic algorithm and Cuckoo search is used along with reactive method Dynamic Source routing protocol to provide the mobile hosts to find out and sustain routes between the origin node (SN) to the target node (TN). In this work, the performance of the direction-finding practice is assessed using throughput, end to end delay, and load on the network and route detection period

    Improved QoS and avoidance of black hole attacks in MANET using trust detection framework

    Get PDF
    In recent times, secured routing is a major research in MANETs. The behaviour of malicious nodes in this network increases the risk of threats and induces abnormal operations in MANETs. This affects the security of data transmitted between the nodes in the network. Hence, an effective technique is needed to prevent the abnormal nodes after the process of detection. In this paper, we propose an improved Trust Detection Algorithm to increase the probability of detection and prevention of Black Hole nodes in MANETs. The proposed framework observes the behaviour of each node using various trust metrics that includes the relationship between the sensor nodes, social and service attribute trust and QoS metric trusts. The behaviour of sensor nodes is found through the communication and mobility behaviour of each node. This method avoids the black hole nodes in MANETs, when the routing is carried out with Zone Routing Protocol (ZRP). Hence, the privacy of data is retained using the proposed method. The proposed method is tested in terms of different combinations of with and without trusts. The result shows that the proposed method is effective through various QoS metrics like overall throughput, packet loss, energy consumption, trust level, false acceptance rate and missed detection rate
    • ā€¦
    corecore