Vigorous and Efficient Trust Model for Security Enhancement in MANET
Vigorous and Efficient Trust Model for Security Enhancement in MANET |
||
|
||
© 2023 by IJETT Journal | ||
Volume-71 Issue-10 |
||
Year of Publication : 2023 | ||
Author : Vaishali Sarbhukan, Sharlene Rebeiro, Lata Ragha, Renuka Pawar |
||
DOI : 10.14445/22315381/IJETT-V71I10P208 |
How to Cite?
Vaishali Sarbhukan, Sharlene Rebeiro, Lata Ragha, Renuka Pawar, "Vigorous and Efficient Trust Model for Security Enhancement in MANET," International Journal of Engineering Trends and Technology, vol. 71, no. 10, pp. 82-93, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I10P208
Abstract
In the recent two decades, there has been a widespread trend of moving away from wired systems and towards remote systems. The remote system is practical in many applications due to its mobility and versatility. Mobile Ad hoc Network (MANET) is one of the most important and notable applications among all current remote systems. The trust model has recently been proposed as an effective security technique for mobile ad hoc networks (MANETs). In existing put stock-in models, some spotlights on notoriety-based conduct disregarding suggestion trust and aberrant trust to ascertain confide in degree, to assess put stock-in factor, and display without making a big deal about suggestion trust. These mentioned strategies are sufficiently bad for putting stock in assessment. Consequently, a brand-new Vigorous and Efficient Trust Model (VETM) is introduced to strengthen security in MANETs. To begin with, as indicated by the number of parcels got by hubs, immediate trust is figured considering Correspondence trust, Vitality trust and Information trust (CVI) as partitioned substances. Contingent upon single jump or multi bounce MANETs circuitous trust degree is computed, and the trust motor is refreshed to get more precise and sensible put stock in degree. VETM is assessed under the situation of MANET directing utilizing the AODV convention. Outcomes demonstrate that the proposed plot VETM outflanks other confide-in models. The proposed VETM is contrasted with typical AODV, RTM, RECTM and BDSHTM.
Keywords
Aberrant trust, Immediate trust, Mobile Ad hoc Networks, Security enhancement, Suggestion trust.
References
[1] Yunseop Kim, Robert G. Evans, and William M. Iversen, “Remote Sensing and Control of an Irrigation System using a Distributed Wireless Sensor Network,” IEEE Transactions on Instrumentation and Measurement, vol. 57, no. 7, pp. 1379–1387, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[2] N. Nasser, and Y. Chen, “Enhanced Intrusion Detection Systems for Discovering Malicious Nodes in Mobile Ad Hoc Network,” IEEE International Conference on Communications, pp. 1154–1159, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Manel Guerrero Zapata, and N. Asokan, “Securing Ad Hoc Routing Protocols,” Proceedings of the 1st ACM Workshop on Wireless Security, pp. 1–10, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Geetha Jayakumar, and G. Gopinath, “Ad Hoc Mobile Wireless Networks Routing Protocol—A Review,” Journal of Computer Science, vol. 3, no. 8, pp. 574–582, 2007.
[Google Scholar] [Publisher Link]
[5] Bo Sun, “Intrusion Detection in Mobile Ad Hoc Networks,” Ph.D. Dissertation, Texas A & M University, College Station, TX. 2004.
[Publisher Link]
[6] Ahmadreza Tabesh, and Luc G. Frechette, “A Low-Power Stand-Alone Adaptive Circuit for Harvesting Energy from a Piezoelectric Micro Power Generator,” IEEE Transactions on Industrial Electronics, vol. 57, no. 3, pp. 840–849, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Quansheng Guan et al., “Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks with Cooperative Communications,” IEEE Transactions on Vehicular Technology, vol. 61, no. 6, pp. 2674–2685, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Yanwei Wang et al., “A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad Hoc Networks,” IEEE Transactions on Wireless Communications, vol. 13, no. 3, pp. 1616–1627, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[9] John M. Chapin, and Vincent W.S. Chan, “The Next 10 Years of DoD Wireless Networking Research,” Military Communications Conference, pp. 2138–2245, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[10] S. Buchegger, and L. Boudec, “A Robust Reputation System for P2P and Mobile Ad-hoc Networks,” P2PEcon, 2004.
[Google Scholar] [Publisher Link]
[11] Zhiying Yao, Daeyoung Kim, and Yoonmee Doh, “PLUS: Parameterized and Localized Trust Management Scheme for Sensor Networks Security,” IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 437–446, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Zhexiong Wei et al.,“Security Enhancements for Mobile Ad Hoc Networks with Trust Management using Uncertain Reasoning,” IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4647-4658, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Jin-Hee Cho, Ananthram Swami, and Ing-Ray Chen, “A Survey on Trust Management for Mobile Ad Hoc Networks,” IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 562–583, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Shengrong Bu et al., “Distributed Combined Authentication and Intrusion Detection with Data Fusion in High-Security Mobile Ad Hoc Networks,” IEEE Transactions on Vehicular Technology, vol. 60, no. 3, pp. 1025–1036, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[15] C. Zouridaki et al., “A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETS,” Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 1-10, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Arshad Ahmad Khan Mohammad et al., “Improving the Performance of Routing Protocols in MANETs: A Mathematical Model for Evaluating Intermediate Bottleneck Nodes,” SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 4, pp. 63-70, 2023.
[CrossRef] [Publisher Link]
[17] Yan Lindsay Sun et al., “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 305–317, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Bin Yu, and Munindar P. Singh, “An Evidential Model of Distributed Reputation Management,” Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 294–301, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Huadong Wu et al., “Sensor Fusion using Dempster Shafer Theory,” IEEE Instrumentation and Measurement Technology Conference, pp. 7-12, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[20] T.M. Chen, and V. Venkataramanan, “Dempster–Shafer Theory for Intrusion Detection in Ad Hoc Networks,” IEEE Internet Computing, vol. 9, no. 6, pp. 35-41, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Reyhaneh Changiz et al., “Trust Establishment in the Cooperative Wireless Relaying Networks,” Wireless Communication Mobile Computing, vol. 14, no. 15, pp. 1450-1470, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Anupam Das, and Mohammad Mahfuzul Islam, “SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 2, pp. 261–274, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Mudhakar Srivatsa, and Ling Liu, “Securing Decentralized Reputation Management using Trust Guard,” Journal of Parallel and Distributed Computing, vol. 66, no. 9, pp. 1217-1232, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[24] K. Paul, and D. Westhoff, “Context-Aware Detection of Selfish Nodes in DSR based Ad Hoc Networks,” Proceedings IEEE 56th Vehicular Technology Conference, vol. 4, pp. 2424-2429, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Rajiv K. Nekkanti, and Chung-Wei Lee, “Trust-based Adaptive on Demand Ad Hoc Routing Protocol,” Proceedings of the 42nd Annual Southeast Regional Conference, pp. 88-93, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Xiaoqi Li, M.R. Lyu, and Jiangchuan Liu, “A Trust Model Based Routing Protocol for Secure Ad Hoc Networks,” IEEE Aerospace Conference Proceedings, vol. 2, pp. 1286-1295, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[27] B. Wang et al., “Local Detection of Selfish Routing Behavior in Ad Hoc Networks,” 8th International Symposium on Parallel Architectures, Algorithms and Networks, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Jaydip Sen, Piyali Roy Chowdhury, and Indranil Sengupta, “A Distributed Trust Mechanism for Mobile Ad Hoc Networks,” International Symposium on Ad Hoc and Ubiquitous Computing, pp. 62-67, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[29] S.Ranjithkumar, and N. Thillaiarasu, “A Survey of Secure Routing Protocols of Mobile Ad hoc Network,” SSRG International Journal of Computer Science and Engineering, vol. 2, no. 2, pp. 34-39, 2015.
[CrossRef] [Publisher Link]
[30] Venkat Balakrishnan et al., “Trust and Recommendations in Mobile Ad Hoc Networks,” International Conference on Networking and Services, pp. 64-69, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Hongmei Deng et al., “Building a Trust-Aware Dynamic Routing Solution for Wireless Sensor Network,” IEEE Globecom Workshops, pp. 153–157, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Saurabh Ganeriwal, Laura K. Balzano, and Mani B. Srivastava, “Reputation-Based Framework for High Integrity Sensor Networks,” ACM Transactions on Sensor Networks, vol. 4, no. 3, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Jinfang Jiang et al., “An Efficient Distributed Trust Model for Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 5, pp. 1228-1237, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[34] M. Raya et al., “On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks,” IEEE INFOCOM 2008 27th Conference on Computer Communications, pp. 1238-1246, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Reyhaneh Changiz et al., “Trust Establishment in Cooperative Wireless Networks,” MILCOM 2010 Military Communications Conference, pp. 1074–1079, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Hongmei Deng, Wei Li, and D.P. Agrawal, “Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, vol. 40, no. 10, pp. 70–75, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Karen Cook, Trust in Society, Russell Sage Foundation Series on Trust, New York, 2003.
[Google Scholar] [Publisher Link]
[38] M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized Trust Management,” Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 164-173, 1996.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Laurent Eschenauer, Virgil D. Gligor, and John Baras, “On Trust Establishment in Mobile Ad Hoc Networks,” International Workshop on Security Protocols, pp. 47-66, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[40] W. J. Adams, G. C. Hadjichristofi, and N. J. Davis, “Calculating a Node’s Reputation in a Mobile Ad Hoc Network,” IEEE International Performance, Computing, and Communications Conference, pp. 303-307, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Alfarez Abdul-Rahman, and Stephen Hailes, “Using Recommendations for Managing Trust in Distributed Systems,” Proceedings of IEEE Malaysia International Conference on Communication, 1997.
[Google Scholar] [Publisher Link]
[42] S. Staab et al., “The Pudding of Trust,” IEEE Intelligent Systems, vol. 19, no. 5, pp. 74-88, 2004.
[Google Scholar] [Publisher Link]
[43] Wei Gao et al., “A Trust Model based on Subjective Logic,” Fourth International Conference on Internet Computing for Science and Engineering, pp. 272–276, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Hoang Nam Ho et al., “Application of Trace-Based Subjective Logic to User Preferences Modeling,” 20th International Conference on Logic for Programming, Artificial Intelligence and Reasoning, pp. 94-105, 2015.
[Google Scholar] [Publisher Link]
[45] M. Chen, Y. Zhou, and L. Tang, “Ray Projection Method and Its Applications based on Grey Prediction,” Chinese Journal of Statistics Decision, pp. 1-13, 2007.
[Google Scholar]
[46] Hyo-Sang Lim, Yang-Sae Moon, and Elisa Bertino, “Provenance based Trustworthiness Assessment in Sensor Networks,” Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, pp. 5-7, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[47] Michael Rabbat, and Robert Nowak, “Distributed Optimization in Sensor Network,” Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 20–27, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Shao Kun et al., “Normal Distribution based Dynamical Recommendation Trust Mode,” Journal of Software, vol. 23, no. 12, pp. 3130-3148, 2012.
[CrossRef] [Google Scholar] [Publisher Link]