Journal articles on the topic 'Secure MANET routing with trust intrigue'

To see the other types of publications on this topic, follow the link: Secure MANET routing with trust intrigue.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Secure MANET routing with trust intrigue.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Syed, Salman Ali, and Shahzad Ali. "Enhanced dynamic source routing for verifying trust in mobile ad hoc network for secure routing." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (February 1, 2022): 425. http://dx.doi.org/10.11591/ijece.v12i1.pp425-430.

Full text
Abstract:
Secure data transfer in mobile ad hoc network (MANET) against malicious attacks is of immense importance. In this paper, we propose a new enhanced trust model for securing the MANET using trust-based scheme that uses both blind trust and referential trust. In order to do this, the trust relationship function has to be integrated with the dynamic source routing (DSR) protocol for making the protocol more secure. We thoroughly analyze the DSR protocol and generate the performance matrices for the data pertaining to packets sent, packets received, packets loss, and throughput. We also analyze the outcome attained from the improvised trust establishment scheme by using the three algorithm implementations in NS2 simulator for detecting and preventing various types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
2

Mahendrakar Shaymrao, Swetha, Pushpa Sothenahalli Krishnaraju, Thungamani Mahalingappa, and Manjunath Thimmasandra Narayanappa. "Design and development of anonymous location based routing for mobile ad-hoc network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (June 1, 2022): 2743. http://dx.doi.org/10.11591/ijece.v12i3.pp2743-2755.

Full text
Abstract:
Mobile ad-hoc network (MANET) consists of wireless nodes interacting with each other impulsively over the air. MANET network is dynamic in nature because of which there is high risk in security. In MANET keeping node and routing secure is main task. Many proposed methods have tried to clear this issue but unable to fully resolve. The proposed method has strong secure anonymous location based routing (S2ALBR) method for MANET using optimal partitioning and trust inference model. Here initially partitions of network is done into sectors by using optimal tug of war (OTW) algorithm and compute the trustiness of every node by parameters received signal strength, mobility, path loss and co-operation rate. The process of trust computation is optimized by the optimal decided trust inference (ODTI) model, which provides the trustiness of each node, highest trust owned node is done in each sector and intermediate nodes used for transmission. The proposed method is focusing towards optimization with respect to parameter such as energy, delay, network lifetime, and throughput also above parameter is compared with the existing methods like anonymous location-based efficient routing protocol (ALERT), anonymous location-aided routing in suspicious MANET (ALARM) and authenticated anonymous secure routing (AASR).
APA, Harvard, Vancouver, ISO, and other styles
3

Divya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.

Full text
Abstract:
MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. )e main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2.
APA, Harvard, Vancouver, ISO, and other styles
4

Bharti, Meena, Shaveta Rani, and Paramjeet Singh. "Efficient Cluster Head Selection and Trust Based Routing in MANET." Journal of Physics: Conference Series 2327, no. 1 (August 1, 2022): 012049. http://dx.doi.org/10.1088/1742-6596/2327/1/012049.

Full text
Abstract:
Abstract Mobile Adhoc Network (MANET) faces different security challenges due to its collaborative and open communication behavior and restricted availability of resources. Routing is hard and vulnerabilities issues are regularly exposed to highly dynamic nature and numerous communication breakdowns induced by mobile nodes. Thus, security measures that can minimize the effects of various attacks must be included in the MANET’s routing protocols. Secure communication with optimal energy is a big challenge in such networks. This paper presents a secure optimal routing scheme. The objective of the scheme is to find the most optimal secure path with low energy consumption using the proposed function. This scheme is divided into two algorithms; the first algorithm finds cluster head effectively and the second computes the trust value of each path for secure communication. The trust value is computed using the trust-based scheme using packet forwarding information. On the basis of the trust value, this algorithm detects the malicious nodes and removes them from the network and then the other proposed routing scheme computes the optimal path. Then path with less hop count and minimum energy usage is selected optimally.
APA, Harvard, Vancouver, ISO, and other styles
5

Bhattacherjee, Vandana, Charu Wahi, and Shampa Chakraverty. "A trust-based secure AODV routing scheme for MANET." International Journal of Ad Hoc and Ubiquitous Computing 38, no. 4 (2021): 231. http://dx.doi.org/10.1504/ijahuc.2021.10043587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wahi, Charu, Shampa Chakraverty, and Vandana Bhattacherjee. "A trust-based secure AODV routing scheme for MANET." International Journal of Ad Hoc and Ubiquitous Computing 38, no. 4 (2021): 231. http://dx.doi.org/10.1504/ijahuc.2021.119853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rajkumar, Banoth, and G. Narsimha. "Trust Based Certificate Revocation for Secure Routing in MANET." Procedia Computer Science 92 (2016): 431–41. http://dx.doi.org/10.1016/j.procs.2016.07.334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mohan, Ch Ram, and A. Venugopal Reddy. "T-Whale." International Journal of Artificial Life Research 8, no. 2 (July 2018): 67–79. http://dx.doi.org/10.4018/ijalr.2018070104.

Full text
Abstract:
One of the infrastructureless networks built by various independent mobile nodes is mobile ad hoc network (MANET), which is an emerging technology, requiring a secure routing protocol for data transmission. Accordingly, literature presents various secure routing protocols for MANETs by utilizing trust and data encryption. In this article, a whale optimization algorithm (WOA) is utilized for selecting the optimal secured routing path in the MANET. The WOA algorithm utilizes the trust factor and the distance between the nodes for computing the fitness for the routing path. Overall, the steps involved in the proposed routing algorithm are as follows: i) Measuring the trust and the distance-based metrics for every node; ii) Discovering k-disjoint path; and iii) Determining the optimal path based on the trust and the distance-based metrics. The performance of the trust-based WOA (T-Whale) is analyzed using the metrics, energy, throughput, and packet delivery rate. From the simulation results, it is evident that the T-Whale algorithm has the improved energy, throughput, and PDR values of 27.4520, 0.4, and 0.4, at the simulation time of 10 sec over the conventional trust random search algorithm when the node is under attack.
APA, Harvard, Vancouver, ISO, and other styles
9

Sinha, Ditipriya, Uma Bhattacharya, and Rituparna Chaki. "RSRP: A Robust Secure Routing Protocol in MANET." Foundations of Computing and Decision Sciences 39, no. 2 (May 1, 2014): 129–54. http://dx.doi.org/10.2478/fcds-2014-0008.

Full text
Abstract:
Abstract In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol in mobile ad-hoc networks (MANETs). This algorithm is based on some basic schemes such as RSA_CRT for encryption and decryption of messages; CRT for safety key generation, Shamir’s secret sharing principle for generation of secure routes. Those routes which are free from any malicious node and which belong to the set of disjoint routes between a source-destination pair are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, most trustworthy and stable route is selected among those secure routes. Selection of the final route depends on some criteria of the nodes present in a route e.g.: battery power, mobility and trust value. In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and most secure and robust one. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR), secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay and packet dropping in presence of malicious nodes in the MANET, keeping the overhead in terms of control packets same as other secure routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
10

graha, Anu, and Krishna veni. "An Efficient and Secure Routing in MANET using Trust Model." International Journal of Engineering Trends and Technology 70, no. 9 (October 31, 2022): 330–36. http://dx.doi.org/10.14445/22315381/ijett-v70i9p232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Zafar, Sherin, and Neha Sharma. "Inculcating Trust in Hybrid Routing Approach for Securing MANET." International Journal of End-User Computing and Development 8, no. 2 (July 2019): 18–28. http://dx.doi.org/10.4018/ijeucd.2019070102.

Full text
Abstract:
The rudimentary notion of using MANET is that the exchange of information in between the portable nodes count on the swift arrangement of a momentary network. Also, each node in a MANET can travel spontaneously in any direction and can change its links to the other nodes repeatedly. In hybrid protocols, initially, the routing is established with the help of some proactively prospected routes and later on serves the request with the help of reactive flooding. In MANET, the security and the routing are the two most crucial and challenging aspects that open up a vast area for improvement. Security includes a set of considerations that are adequately funded. Designing a competent routing protocol for wireless ad-hoc network along with the fulfilment of security aspects is a challenging task. MANET demands for a new set of networking strategies to be adopted in order to provide competent and secure overhead free end-to-end communication. In MANET, hybrid routing protocols are considered to be the most effective types of protocols as they take the advantage of both proactive and reactive routing protocols. After performing an intense literature survey, it could be concluded that there is a specific requirement of a protocol hybrid in nature that could include the two most specific factors for MANET (i.e., routing and security). The existing hybrid routing protocols suffers from the problems like optimisation control, images detection, and image quantization. To solve the above-mentioned issues of hybrid routing protocols, various optimization algorithms have been proposed that are natural genetics-inspired. The various techniques that can be used to enhance the security are cryptography, bio-metric, trust-based approach, Hash function algorithm, etc.
APA, Harvard, Vancouver, ISO, and other styles
12

Et.al, Mrs Swetha M. S. "Strong Secure Anonymous Location Based Routing (S2ALBR) method for MANET." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 4349–56. http://dx.doi.org/10.17762/turcomat.v12i3.1726.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) utilize confounding planning shows that spread community point characters similarly as courses from outside onlookers so as to give obscurity security. MANET contains different little gadgets conceding suddenly over the air. The topology of the system is changing an incredible piece of the time in light of the advantageous idea of its inside focuses. The security challenges ascend taking into account self-game-plan and self-reinforce limits. By the by, existing mysterious organizing shows depending upon either ricochet by-skip encryption or excess traffic either produce imperative expense or can't give full namelessness security to information sources, targets, and courses. The imperative expense raises the trademark asset limitation issue in MANETs particularly in natural media remote applications. To offer high absence of definition assurance expecting for all intents and purposes no effort, we strong secure anonymous location based routing (S2ALBR) protocol for MANET utilizing optimal partitioning and trust inference model. In S2ALBR appear, first segments a system into zones utilizing optimal tug of war partition (OTW) algorithm. By at that point, figure the trustiness of each reduced focus point utilizing the imprisonments got signal quality, versatility, way debacle and joint exertion rate. The arrangement of trust calculation is advanced by the optimal decided trust inference (ODTI) model, which gives the trustiness of each adaptable. By then picks the most basic trust ensured focus point in each zone as generally engaging trade habitats for information transmission, which structure a non-unquestionable bewildering course. The introduction of proposed S2ALBR show is examined by various testing conditions with Network Simulator (NS2) instrument.
APA, Harvard, Vancouver, ISO, and other styles
13

Sivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (April 30, 2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.

Full text
Abstract:
Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure. These networks have some unique features such as dynamic mobility, open nature, lack of infrastructure, limited physical security and they are vulnerable to several security threats. Malicious node can drop all or partial received packets instead of forwarding them to the next hop through the path. In order to find the malicious nodes, an initial transmission is made between the source and destination nodes. Using fuzzy rules, the trust value of each node is computed and it varies from 0 to 1. A common threshold value is set for each node and by using this threshold value, every node in the network can be identified as either a malicious node or a regular node. After identifying the malicious nodes, these nodes are eliminated by muting the power to off state. As the malicious nodes are eliminated between source and destination nodes, source node can select another trusted path to its destination node. For security and authentication of routing information, hybrid cryptography is employed, using advanced encryption standard (AES) and elliptic curve cryptography (ECC) algorithms. AES algorithm is used as symmetric algorithm to encrypt the routing information and ECC algorithm is used as asymmetric algorithm to encrypt the public key. During encryption, the original plain text is converted into cipher text with encrypted public key and similarly during decryption cipher text is converted into original plain text with decrypted private keys. So the proposed method involves both AES and ECC algorithms which provides security mechanism as efficient and sufficient one. The experimental simulations are carried for the proposed model using network simulator 2 (NS-2) for Throughput, Delay, Packet delivery ratio, Packet overhead and Packet drop.
APA, Harvard, Vancouver, ISO, and other styles
14

Sirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.

Full text
Abstract:
Mobile ad hoc network (MANET) is a miscellany of versatile nodes that communicate without any fixed physical framework. MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real-time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. To accomplish such challenging objectives, it is necessary to design a secure routing protocol that enhances the MANET’s QoS. In this paper, we proposed a trust-based multipath routing protocol called TBSMR to enhance the MANET’s overall performance. The main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2. Our simulation results justify that the proposed routing protocol exhibits superior performance than the existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
15

Anantapur, Mallikarjuna, and Patil Venkanagouda. "PUSR: Position Update Secure Routing protocol for MANET." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 93–102. http://dx.doi.org/10.22266/ijies2021.0228.10.

Full text
Abstract:
Mobile ad hoc network is a self-organizing wireless network, which is formed by the wireless mobile devices without any centralized infrastructure. The mobile nodes in the network are mainly affected by the inherent characteristics such as unpredictable network topology and open wireless medium. Especially, the presence of selfish nodes in the network creates the packet loss and affects an entire communication system. In this paper, the hash function with position updating algorithm is proposed in the Ad hoc On-Demand Distance Vector (AODV) routing protocol for improving the security against the selfish nodes. The AODV routing protocol is used to transmit the data packets from the source to the destination. Therefore, the Prevention of Selfish Node using Hash Function (PSNHF) with position update algorithm is proposed for minimizing the packet loss through the network. The performances of proposed AODV-PSNHF method are analysed in terms of energy consumption, throughput, Packet Delivery Ratio (PDR), packet loss and normalized routing load. In addition, the AODV-PSNHF method is compared with the existing trust-aware ad-hoc routing protocol (T2AR). The selfish node identification using hash function and positioning update using AODV-PSNHF method provides reliable and secure data transmission under selfish nodes and shows better performance in terms of throughput, packet delivery ratio and packet loss. For 2% of malicious nodes the PDR of the AODV-PSNHF method is 89%, it is 9% higher when compared to the T2AR protocol whose PDR% is only 80% for the same.
APA, Harvard, Vancouver, ISO, and other styles
16

Yang, Hwanseok. "A Study on Improving Secure Routing Performance Using Trust Model in MANET." Mobile Information Systems 2020 (September 16, 2020): 1–17. http://dx.doi.org/10.1155/2020/8819587.

Full text
Abstract:
MANET is utilized in many fields because of its advantage in quickly establishing networks. The network will perform well if mobile nodes trust each other and act cooperatively. However, dynamic topology characteristics and frequent connection failures by the movement of nodes make routing difficult and cause vulnerability to be easily exposed. Therefore, the routing provided in the MANET should have security features that can reduce the damage to various attacks. For this, in this paper, it is proposed for a trust evaluation method of nodes using cluster structure and a secure data transmission technique through key exchange without CA. The proposed technique adopted a hierarchical structure to enhance the efficiency of the reliability evaluation of nodes. The reliability measurement reflects the quality of packets as well as the number of packets and the measured reliability is maintained by the trust management node. The integrity of the data transmission is improved through key exchange without CA between the nodes. In order to increase the efficiency of routing, anomaly nodes are detected by DSN checking of nodes that generate excessive traffic on the path when data is transmitted. The proposed technique in this paper can maintain stably the network performance even in the presence of malicious nodes because it ensures reliability evaluation for nodes and the path setting between nodes and secure data transmission. The superior performance of the proposed trust-based model security routing technique was confirmed through comparative experiments for packet delivery ratio, end-to-end delay time, the number of control packets, network throughput, and average path length.
APA, Harvard, Vancouver, ISO, and other styles
17

Sarbhukan, Vaishali V., and Lata Ragha. "Establishing Secure Routing Path Using Trust to Enhance Security in MANET." Wireless Personal Communications 110, no. 1 (August 28, 2019): 245–55. http://dx.doi.org/10.1007/s11277-019-06724-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Yamparala, Rajesh, and Sankara Narayanan Selvaraj Pandian. "A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS." Ingénierie des systèmes d information 27, no. 5 (October 31, 2022): 757–65. http://dx.doi.org/10.18280/isi.270508.

Full text
Abstract:
A Mobile Ad-Hoc Network (MANET) is a self-configuring network that provides temporary connections to several wireless nodes. Trust mechanisms are employed in routing protocols to quickly locate a safe path. Because of its openness and complexity, MANET can be attacked in a number of ways. To begin mitigating potential security risks, a number of different cryptographic key generation strategies are explored. A key management system for MANET security is available with different encryption techniques. Identity with Trust Level based Cryptography Model (ITLCM) is used to generate multiple keys and distribute these to particular targets. At this stage, key management protocols are essential to any secure group architecture of communication. Because of its dynamic topology which extensively affects its application, the multi key management is an essential task. When compared to more conventional methods of protecting a network, MANET security is entirely novel. Security routing protocol implementation is difficult since it requires the production and distribution of multiple keys. To provide both connection and message protection without relying on third parties, the Neighbor Trust Weight based Routing Model (NTWRM) is designed. In the proposed model, a trusted node is selected to monitor all of the nodes in the routing process to create a stable multi-key distribution environment that enhances MANET performance. In comparison with traditional methods, the proposed model shows that its findings are better than the existing ones.
APA, Harvard, Vancouver, ISO, and other styles
19

Bhaskar .Ch, Vijaya, D. S. R. Murthy, and V. Kakulapati. "AODV (ST_AODV) on MANETs with Path Security and Trust-based Routing." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 11 (November 30, 2022): 01–06. http://dx.doi.org/10.17762/ijritcc.v10i11.5772.

Full text
Abstract:
The nodes of the MANET are connected by an autonomous that has no predetermined structure (Mobile ad hoc Network). When a node's proximity to other nodes is maintained dynamically via the use of relying nodes, the MANET network's node-to-node connection is un-trusted because of node mobility. If a node relies on self-resources at any point in time, it runs the risk of acting as a selfish or malicious node, the untrusted selfish or malicious node in the network. An end-to-end routing route that is secure has been presented to enhance the security of the path based on the AODV routing protocol using ST AODV (Secure and Trust ADV). To do this, we must first identify the selfish/malicious nodes in the network and analyse their past activity to determine their current trust levels. A node's stage of belief is indicated by the packet messages it sends. In order to resolve each route, trust must be identified and the path's metadata in RREP must be updated.
APA, Harvard, Vancouver, ISO, and other styles
20

Mukhedkar, Moresh Madhukar, and Uttam Kolekar. "Trust-Based Secure Routing in Mobile Ad Hoc Network Using Hybrid Optimization Algorithm." Computer Journal 62, no. 10 (August 15, 2019): 1528–45. http://dx.doi.org/10.1093/comjnl/bxz061.

Full text
Abstract:
Abstract Routing in mobile ad hoc networks (MANETs) is a hectic challenge due to the dynamic nature of the network. The provisional communication links are assured due to the infrastructure-independent capability of MANET, but with no proper centralized monitoring process, which makes routing in MANETs with respect to the security and trust a major issue. Thus, the paper introduces Advanced Encryption Standard-enabled Trust-based Secure Routing protocol based on the proposed Dolphin Cat Optimizer (AES-TDCO), which is an energy and trust-aware routing protocol. The proposed Dolphin Cat Optimizer is engaged in the optimal route selection based on the modeled objective function based on the trust factors, recent trust, historical trust, direct and indirect trust in addition to delay, distance and link lifetime. The Dolphin Cat Optimizer is the integration of Dolphin Echolocation and Cat Swarm Optimization algorithm that inherits the faster global convergence. The simulation using 75 nodes revealed that the proposed routing protocol acquired the maximal throughput, minimal delay, minimal packet drop and detection rate of 0.6531, 0.0107, 0.3267 and 0.9898 in the absence of network attacks and 0.7693, 0.0112, 0.3605 and 0.9961 in the presence of the network attacks.
APA, Harvard, Vancouver, ISO, and other styles
21

L, Raghavendar Raju, and C. R. K. Reddy. "Node activity based trust and reputation estimation approach for secure and QoS routing in MANET." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 5340. http://dx.doi.org/10.11591/ijece.v9i6.pp5340-5350.

Full text
Abstract:
Achieving safe and secure communication in MANETs is a key challenge due to its dynamic nature. A number of security studies disclose that reputation management systems are able to be effectual with less overhead. The reputation of a node is calculated by using automated assessment algorithms depend on predefined trust scheme. This paper proposes a Node Activity-based Trust and Reputation estimation (NA-TRE) approach for the security and QoS routing in MANET. NA-TRE aims to find trust estimation and reputation of a node. The NA-TRE approach monitors the activity changes, packet forwarding or dropping in a node to find the status of the node. The various activities of a node like Normal State (NS), Resource Limitation State (RS) and Malicious State (MS) are monitored. This status of a node is helpful in computing trust and reputation. In this paper NA-TRE approach compared with existing protocols AODV, FACE and TMS to evaluate the efficiency of MANET. The experiment results show that 20% increasing of throughput, 10% decrease of overhead and end to end delay.
APA, Harvard, Vancouver, ISO, and other styles
22

R.Gandhi, Jenish, and Rutvij H. Jhaveri. "Packet Forwarding Misbehaviour Isolation using Fuzzy Trust-based Secure Routing in MANET." International Journal of Computer Applications 122, no. 3 (July 18, 2015): 30–35. http://dx.doi.org/10.5120/21684-4786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Rajeswari, Alagan Ramasamy, Wen-Cheng Lai, C. Kavitha, Prabhu Kavin Balasubramanian, and S. R. Srividhya. "A Trust-Based Secure Neuro Fuzzy Clustering Technique for Mobile Ad Hoc Networks." Electronics 12, no. 2 (January 5, 2023): 274. http://dx.doi.org/10.3390/electronics12020274.

Full text
Abstract:
A MANET consists of a group of mobile nodes. In a MANET, scalability and mobility have a greater influence on routing performance. The clustering technique plays a vital role in enhancing the routing mechanism and improving the network lifetime of a large-scale network like a MANET. The clustering process will degrade network performance if the malicious node is chosen as the Cluster Leader (CL). Thus, the secure clustering process in a MANET is a very challenging task. To overcome this problem, the following key factors like Trust Value (TV), Residual Energy Level (REL), and Mobility (M) of the node are used as decision-making parameters to elect a Cluster Leader (CL). In this work, we have proposed a soft computing-based neuro-fuzzy model, ANFIS-based Energy-Efficient Secure Clustering Model (ANFIS-EESC), with a primary objective of forming energy-aware stable trust-based clustering in a MANET. Moreover, we have proposed two working novel algorithms: Weight-Based Trust Estimation (WBTE) algorithm and the Fuzzy-Based Clustering (FBC) algorithm. The primary objective of the WBTE algorithm is to measure the trustworthiness of the nodes and to mitigate the malicious nodes. Fuzzy-Based Clustering (FBC) algorithm is a fuzzy logic-based cluster formation algorithm. In our proposed work, each non-CL in the system applies the cluster density of CL and mobility for each CL node using the Mamdani Fuzzy Inference system, and makes the decision to join as a member with a CL that holds maximum value. Simulation results show that the proposed work enhances the network performance by electing a more stable trust-aware and energy-aware node as Cluster leader (CL). We compare the performance parameters of the proposed work, such as packet delivery rate, energy consumption, detection rate, and reaffiliation, with the existing work, Weighted Clustering Algorithm (WCA). The network lifetime is 39% greater in the proposed ANFIS-EESC model than in the other existing work, WCA. Moreover, ANFIS-EESC shows an enhancement of 22% to 32% in packet delivery ratio and 32% and 39% in throughput. From the above analysis, it has been proved that the proposed work gives a better performance in terms of reliability and stability when compared to the existing work, WCA.
APA, Harvard, Vancouver, ISO, and other styles
24

Jayaprakash, R., and B. Radha. "An Implementation of Trusted Key Management Protocol (TKMP) in Wireless Network." Journal of Computational and Theoretical Nanoscience 17, no. 12 (December 1, 2020): 5243–49. http://dx.doi.org/10.1166/jctn.2020.9415.

Full text
Abstract:
The Trusted Key Management Protocol (TKMP) provides one of the most secure communication technologies in MANET cluster-based data protection. For security reasons, TKMP is a trusted key that can be sent to all nodes in the communication cluster. This document introduces the Trusted Key Management Protocol (TKMP) feature to improve the quality of secure communications over a cluster-based wireless network. The proposed TKMP execution process includes CBPPRS (Cluster Based Privacy Preserving Routing Selection), LBCPR (Load Balancing Cluster Based Privacy Routing) and DLBPS (Dynamic Load Balancing Privacy Path Selection) procedure. To lock the data from the malicious node, the Paillier Cryptosystem (PC) encrypts packets with homomorphic encryption. The trust score makes it easier to update routing information and improves network throughput. The experimental results show that the proposed TKMP method works better than the other Trust-ECC method.
APA, Harvard, Vancouver, ISO, and other styles
25

Yang, Hwanseok. "A Study on Secure Routing Technique using Trust Value and Key in MANET." Journal of the Korea Society of Digital Industry and Information Management 11, no. 3 (September 30, 2015): 69–77. http://dx.doi.org/10.17662/ksdim.2015.11.3.069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ram Mohan, Ch, and Venugopal Reddy Ananthula. "Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization." International Journal of Modeling, Simulation, and Scientific Computing 10, no. 03 (June 2019): 1950014. http://dx.doi.org/10.1142/s1793962319500144.

Full text
Abstract:
The advancements in Mobile Ad-hoc Network (MANET) are suitable to wide applications, which involve military applications, civilian domains, and disaster recovery systems. It is assumed that the nodes present in the routing protocols of MANETs are cooperative and trustworthy. This assumption makes MANET more prone to manipulation and interception, which generates several possibilities of different suspicious attacks, such as Denial of Service (DoS) attacks. Hence, security is considered as an important parameter as the network is fond of suspicious attacks. This paper addresses the security issues by proposing an optimization algorithm, named Jaya Cuckoo Search (JCS) algorithm, which is the combination of Jaya algorithm and Cuckoo Search (CS) algorithm for initiating secure route among the MANET nodes so that the path attained is feasible and secure. The proposed JCS algorithm uses a fitness function, which considers a multiobjective function using parameters, such as distance, link lifetime, delay, energy, trust, along with the reputation factor to select a secured path. The JCS algorithm shows maximum performance with energy, throughput, and PDR values as 27.826[Formula: see text]J, 0.554, and 0.628, respectively.
APA, Harvard, Vancouver, ISO, and other styles
27

Suma, Putra, and Mohammed Ali Hussain. "FractWhale-DSR: Fractional Whale Optimization Based Secure Dynamic Source Routing Algorithm for Mobile Ad-hoc Network." Recent Advances in Computer Science and Communications 13, no. 5 (November 5, 2020): 942–56. http://dx.doi.org/10.2174/2213275912666190715165444.

Full text
Abstract:
Background: Nodes in the mobile Ad-hoc network (MANET) have the dynamic nature due to their vast separation distance. The dynamic nature of the MANET nodes changes the routing path established for the communication. The dynamic secured routing (DSR) has gained popularity since they provide the routing path based on the demand provided by the source and destination nodes. Various literature works have discussed the DSR strategy for routing path establishment, but faces challenges since it consumes high energy during the route discovery phase. Objective: To overcome the challenges in the existing works, a DSR strategy based on the Fractional Whale optimization algorithm (FWOA) is introduced in this work. Methods: The proposed algorithm uses the C 2 TE based selection criteria which depend on the connectivity, congestion, trust, and energy for selecting the suitable nodes for the communication. The proposed FractWhale-DSR algorithm finds the secured routing path in three phases. Results: The parameters, such as throughput, delay, Packet Delivery Ratio (PDR), and the energy define the performance of the proposed model. From the simulation results, the proposed FractWhale- DSR algorithm has an overall better performance with the values of 0.57265, 0.005118, 0.786325, and 75.88636% for throughput, delay, PDR, and energy respectively at the round of 25 for the MANET with 100 nodes. Conclusion: The proposed DSR strategy has the advantage of adaptability and scalability. Also, the router selects the alternate paths, when there is a link failure in the current network.
APA, Harvard, Vancouver, ISO, and other styles
28

Baba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.

Full text
Abstract:
Mobile Ad-Hoc Networks are infrastructure-less wireless communication technology that interconnects mobile devices such as phones, laptops, and smart devices including providing flexibility, seamless communication and mobility to all devices forming the network. MANET suffers security lapses due to the absence of central control infrastructure to monitor and control the devices that joins the network. These security lapses in MANET discourage it and makes it vulnerable to attacks such as denial of service attacks. Amongst various attacks prevalent on MANET environment, packet flooding is a common attack and causes a devastating effect on MANET nodes which if left undetected may lead to consequent crashing of the entire network. There is need to secure data and be kept confidential. In this paper, the separation of trusted nodes from malicious nodes and to protect the data packet from attackers is to be taken as research goal. Therefore, a highly secured Hybrid Trust-based Anonymous Authenticated Routing Protocol (HTBAARP) to mitigate flooding attacks is to be developed to avoid unauthorized access and to detect malicious nodes. This will be achieved by integrating a Modified Authenticated Anonymous Routing Protocol (MAASR) to a Trusted Management Scheme (TMS). Simulation will be done using NS-2 in conjunction with MATLAB R2020a to evaluate performance. The proposed solution is expected to improve throughput, packet delivery ratio and, reduces routing delay and routing overhead in the network. Keywords: Anonymous, Flooding, Hybrid protocol, MANET, Malicious nodes, Routing
APA, Harvard, Vancouver, ISO, and other styles
29

Bhavsar, Krunal Sudhirbhai. "Secure And Energy Efficient Stochastic Optimized Routing Protocol for Mobile Ad Hoc Network." Asian Journal of Electrical Sciences 9, no. 2 (May 30, 2021): 1–8. http://dx.doi.org/10.51983/ajes-2020.9.2.2549.

Full text
Abstract:
Mobile Ad-hoc Network is a wireless mobile nodes network, which forms a network without any pre existing fixed network infrastructure support. MANET permits versatile communication between hosts that are moving around. MANETs have numerous advantages compared to traditional wireless networks. In MANET, each mobile node needs the cooperation of other nodes in the network for forwarding data packets from source to destination node. Mobile Ad-hoc Network includes different routing protocols for communication and in MANET each mobile node can act as host as well as sender or receiver at the same time. MANET is design to smartly react to network changes and operates without human interference to support nodes mobility. Mobile Ad-hoc Networks are designed to sustain its survivability in unfriendly and hostile conditions such as natural disasters and other emergency conditions. However unique characteristics of MANETs topology such as open peer-to-peer architecture, dynamic network topology, shared wireless medium and limited resource (battery, memory and computation power) pose a number of non-trivial challenges to security design. These challenges and characteristics require MANETs to provide broad protection and desirable network performance. Due to dynamic nature of MANET it is very challenging work to employ a secure route. The routing protocols play important role in transferring data. Mobile Ad Hoc Networks (MANETs) pose challenges in terms of energy control, due to their fixed transmission power, the mobility of nodes and a constantly changing topology. High levels of energy are needed in wireless networks, particularly for routing. In order to address this problem, energy enhancement is analyzed with the proposed dynamic AODV cluster base trust protocol, with the aim of maximizing the lifetime of the network. We have performed simulation of our approach to justify our research work on network simulator-2 (NS-2). Simulation result presents that our proposed approach result is improved the performance of network than the existing Mobile Ad hoc Network protocol.
APA, Harvard, Vancouver, ISO, and other styles
30

Alappatt, Valanto, and Joe Prathap P. M. "Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E." International Journal of Computer Networks and Applications 8, no. 4 (August 31, 2021): 400. http://dx.doi.org/10.22247/ijcna/2021/209706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hemalatha, S., Pravin R. Kshirsagar, Hariprasath Manoharan, N. Vasantha Gowri, A. Vani, Sana Qaiyum, P. Vijayakumar, et al. "Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET." Wireless Communications and Mobile Computing 2022 (May 6, 2022): 1–9. http://dx.doi.org/10.1155/2022/6776378.

Full text
Abstract:
Mobile network nodes are trustworthy nodes; the data access in transmitting and receiving the data packet is not efficient in different network procedures. The malicious nodes are available in routing path making the packet loss, in packet transmission for time instance. Since the regular mobile network must not verify every mobile node approved else illegal, subsequently the reserved level of nodes also was not considered, to injure the packet transmission procedure by link failure called connection loss. It minimizes the transmission rate and network lifetime and improves packet latency and energy usage. The proposed novel link establishment communication (NLEC) technique is used to find the dependable routing path against intruder node available in the network. This scheme selects genuine node for routing path production, by using the node reward with dependence level estimating algorithm to compute every node trust level and resource range, to disconnect higher trust level node and lower trust level node; higher trust level node is a genuine node which performs secure communication. Lower trust level node is selfish node and they are detected and ignored from path. It increases the lifespan of network and throughput and minimizes the end to end delay and energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
32

Samreen, Shirina. "Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework." International Journal of Mobile Computing and Multimedia Communications 9, no. 3 (July 2018): 60–75. http://dx.doi.org/10.4018/ijmcmc.2018070104.

Full text
Abstract:
The applications of a mobile ad hoc network (MANET) range from military and disaster response to commercial and civilian environments. The intrinsic characteristics like lack of infrastructure, self-organizing nature and deployment flexibility contributes to its usefulness but few other features like open media for communication and topological changes on-the-fly makes it vulnerable to security attacks. The focus of the current work is security mechanisms for a MANET against the various insider attacks targeting the data forwarding operations. It is accomplished through a trust management framework and a secure routing protocol relying upon the TMF to form the routes with most trusted nodes. The protocol computes a novel reliability metric termed as Path Allegiance metric (PAM) which acts as a selection criteria for route selection. The performance evaluation involves simulation results which prove the robustness of the proposed TMF and the effectiveness of the PAM routing protocol in reliable data delivery in the presence of packet droppers which disrupt the data transmission.
APA, Harvard, Vancouver, ISO, and other styles
33

N, SUMA, and GOPINATH S. "Design and Development of Network Reliability based Secure Multicast Routing Protocol for MANET." JOURNAL OF ADVANCES IN CHEMISTRY 13, no. 10 (February 25, 2017): 6563–69. http://dx.doi.org/10.24297/jac.v13i10.5769.

Full text
Abstract:
In Mobile Ad hoc network (MANET), link quality and stability of links as well as nodes play a major role. In ad hoc network, links are often changing which could affect the node mobility and integrity of data packets. In this research work, Network Reliability based Secure Multicast Routing Protocol (NRSMRP) is proposed to achieve network reliability by means of creation of reliable multicast tree. This multicast tree is constructed based on link quality and reliability trust metric. In first phase, node categorization and reliability metric calculation are implemented with the help of link quality. In second phase, reliable multicast tree is formed based on parent node and child node. Parent node must have god capacity and signal strength to communicate with child node. In last phase, authentication based multicast routes are established based on the calculation of direct reputation of mobile nodes. From the results, proposed protocol achieves better performance than existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
34

M., Anugraha, and Dr Krishnaveni S.H. "SRTE: Security Resource Allocation for Trust Model in Evaluate the Strong Node." Webology 19, no. 1 (January 20, 2022): 1387–97. http://dx.doi.org/10.14704/web/v19i1/web19092.

Full text
Abstract:
Mobile ad hoc network (MANET) is a framework-free as well as self-designing network in which Mobile Nodes (MN) travel freely across the contact spectrum using cellular network interfaces. Through the advancement of wireless technologies, a complex network can better handle data communication protection while improving quality of service (QoS) metrics. MANET is defenceless to security breaches due to the absence of a trusted unified authority. In MANET, the SRTE approach, also known as protection allocation of resources for trust model, is introduced for evaluating strong nodes. Main contribution of the work have four parts: First, to improve secure data transmission in MANET’s environment, the H-ACO-DSR method is introduced. Second part, the HTDMA method is developed for better resource allocation. Third part, the HTCMR is introduced and produce the efficient cluster and trust worthiness in the MANET’s environment. Fourth part, the ABT is used to identify the malicious node and trusted Node in the system. To boost the Qos metric efficiency, the trusted nodes in MANET as well as data transmission are carried out with the trusted MN. Finally, as compared to current approaches, simulation results produce improved PDR and low cost Energy, Average Delay, Routing overhead, and Throughput.
APA, Harvard, Vancouver, ISO, and other styles
35

Divya, K., and B. Srinivasan. "A Trust-Based Predictive Model for Mobile Ad Hoc Networks." International Journal on AdHoc Networking Systems 11, no. 03 (July 31, 2021): 13–23. http://dx.doi.org/10.5121/ijans.2021.11302.

Full text
Abstract:
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
APA, Harvard, Vancouver, ISO, and other styles
36

Lwin, May Thura, Jinhyuk Yim, and Young-Bae Ko. "Blockchain-Based Lightweight Trust Management in Mobile Ad-Hoc Networks." Sensors 20, no. 3 (January 27, 2020): 698. http://dx.doi.org/10.3390/s20030698.

Full text
Abstract:
As a trending and interesting research topic, in recent years, researchers have been adopting the blockchain in the wireless ad-hoc environment. Owing to its strong characteristics, such as consensus, immutability, finality, and provenance, the blockchain is utilized not only as a secure data storage for critical data but also as a platform that facilitates the trustless exchange of data between independent parties. However, the main challenge of blockchain application in an ad-hoc network is which kind of nodes should be involved in the validation process and how to adopt the heavy computational complexity of block validation appropriately while maintaining the genuine characteristics of a blockchain. In this paper, we propose the blockchain-based trust management system with a lightweight consensus algorithm in a mobile ad-hoc network (MANET). The proposed scheme provides the distributed trust framework for routing nodes in MANETs that is tamper-proof via blockchain. The optimized link state routing protocol (OLSR) is exploited as a representative protocol to embed the blockchain concept in MANETs. As a securely distributed and trusted platform, blockchain solves most of the security issues in the OLSR, in which every node is performing the security operation individually and in a repetitive manner. Additionally, using predefined principles, the routing nodes in the proposed scheme can collaborate to defend themselves from the attackers in the network. The experimental results show that the proposed consensus algorithm is suitable to be used in the resource-hungry MANET with reduced validation time and less overhead. Meanwhile, the attack detection overhead and time also decrease because the repetitivity of the process is reduced while providing a scalable and distributed trust among the routing nodes.
APA, Harvard, Vancouver, ISO, and other styles
37

Papaj, Jan, and Lubomir Dobos. "Cooperation between Trust and Routing Mechanisms for Relay Node Selection in Hybrid MANET-DTN." Mobile Information Systems 2016 (2016): 1–18. http://dx.doi.org/10.1155/2016/7353691.

Full text
Abstract:
Today’s mobile networks require integration of the different networks in order to transport data between mobile devices. The main problems of all networks occur if the communication paths are disconnected for a short time. The hybrid MANET-DTN is an evolution of the Mobile Ad Hoc Networks (MANET) and Delay/Disruption Tolerant Network (DTN) and it gives the possibilities of data transport between the disconnected islands of the nodes. The key problem is how to select reliable and secure nodes to transport messages between isolated islands with limited connectivity. The selection of the relay nodes is a critical factor because the data are transported via these devices in hostile environments. Two algorithms for a relay node selection based on trust are introduced. These algorithms are activated if the connections are disrupted. The selected relay nodes transport data across the disconnected environment via store-carry-forward mode. The proposed algorithms enable selecting reliable relay nodes based on collecting routing information and contact history. We introduce the network performance analyses of these algorithms. The main idea of the analyses is studying how the algorithms can affect the behaviour of the routing and forwarding mechanisms in the simulator OPNET modeler.
APA, Harvard, Vancouver, ISO, and other styles
38

Bondada, Praveen, Debabrata Samanta, Manjit Kaur, and Heung-No Lee. "Data Security-Based Routing in MANETs Using Key Management Mechanism." Applied Sciences 12, no. 3 (January 20, 2022): 1041. http://dx.doi.org/10.3390/app12031041.

Full text
Abstract:
A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resist using the existing security approaches. Therefore, various secure routing protocols have been developed to strengthen the security of MANETs. In this paper, a secure and energy-efficient routing protocol is proposed by using group key management. Asymmetric key cryptography is used, which involves two specialized nodes, labeled the Calculator Key (CK) and the Distribution Key (DK). These two nodes are responsible for the generation, verification, and distribution of secret keys. As a result, other nodes need not perform any kind of additional computation for building the secret keys. These nodes are selected using the energy consumption and trust values of nodes. In most of the existing routing protocols, each node is responsible for the generation and distribution of its own secret keys, which results in more energy dissemination. Moreover, if any node is compromised, security breaches should occur. When nodes other than the CK and DK are compromised, the entire network’s security is not jeopardized. Extensive experiments are performed by considering the existing and the proposed protocols. Performance analyses reveal that the proposed protocol outperforms the competitive protocols.
APA, Harvard, Vancouver, ISO, and other styles
39

Subathra, P., S. Sivagurunathan, and N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks." International Journal of Business Data Communications and Networking 6, no. 1 (January 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) is a collection of wireless computers (nodes) communicating over multi-hop paths, without infrastructures such as base stations and access points. Nodes must cooperate to provide necessary network functionalities. The Dynamic Source Routing (DSR) protocol is a principal routing protocol in MANET, where security can be compromised by a “Black Hole” attack. In this attack, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops all packets sent for forwarding, leading to performance degradation in the network. The situation becomes even more severe when two or more nodes cooperate and perform an attack called the “Cooperative Black Hole” attack. This article proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating both single and cooperative black holes, making the MANET resistant against such attacks. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio and false negative probability in comparison with trust and probe based schemes.
APA, Harvard, Vancouver, ISO, and other styles
40

Annepu, Arudra, and Priti Mishra. "Secure Aware Cluster-Based Routing For Manet Using A Multi-Objective-Trust Centric Flower Pollination Algorithm." International Journal of Engineering Trends and Technology 70, no. 1 (January 25, 2022): 252–58. http://dx.doi.org/10.14445/22315381/ijett-v70i1p230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Alnumay, Waleed, Uttam Ghosh, and Pushpita Chatterjee. "A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things." Sensors 19, no. 6 (March 26, 2019): 1467. http://dx.doi.org/10.3390/s19061467.

Full text
Abstract:
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. A Beta probabilistic distribution is used to combine different trust evidences and direct trust has been calculated. The theory of ARMA/GARCH has been used to combine the recommendation trust evidences and predict the resultant trust value of each node in multi-step ahead. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
APA, Harvard, Vancouver, ISO, and other styles
42

Saha, Himadri Nath, Rohit Singh, Debika Bhattacharyya, and P. K. Banerjee. "Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network." Foundations of Computing and Decision Sciences 40, no. 4 (December 1, 2015): 267–98. http://dx.doi.org/10.1515/fcds-2015-0016.

Full text
Abstract:
Abstract With advent of technology MANET is becoming more and more ubiquitous, and so is the vulnerability of such networks to attacks. In this paper, we propose a secure, lightweight, on-demand routing protocol for MANETs. It uses the concept of fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that neighbor or not. To combat attacks efficiently new packets like report and recommendation are used. After receiving a few of these packets a node can conclude about the behavior of a node, thereby identifying and blacklisting the malicious nodes. We try to impose bounds for the fidelity with reference to the battery of the node, which restricts a node to increase its fidelity to infinity and become dominant in the network. This protocol not only finds a secure route to transmit data, but also identifies the malicious nodes in the network. Our protocol exhibits high packet delivery fraction, with low normalized routing load and low end to end delay; which has been observed while simulating in GloMoSim platform. We have observed that our protocol performs not only better than other existing secure routing protocol in a malicious environment, but also combats, many attacks which have not been dealt with these protocols.
APA, Harvard, Vancouver, ISO, and other styles
43

Hikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (August 11, 2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.

Full text
Abstract:
Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in MANETs. Basically, by adding adapted LEACH routing protocol to MANET, enhancement of the preserved nodes vitality will be achieved, moreover, the load balancing with data loss reduction provides MANET ability to tracks along with shortest and limited paths. This paper proposes a newly developed detection scheme for both active and passive black-hole attacks in MANETs. Moreover, the scheme deals with assessing a group of selected features for each node-based AdaBoost-SVM algorithm. These features are collected from cluster members nodes based on Ad hoc On-demand Multipath Distance Vector (OMDV) with LEACH routing protocol clustering approaches. Although SVM is considered a more stable classifier, there are great influences of the AdaBoost weight adaption algorithm to enhance the classification process in terms of strengthening the weights of extracted features. This hybrid algorithm is essential for active black-hole attacks as well as for identifying passive black-hole attacks in MANET. The proposed scheme is tested against the effect of mobility variation to determine the accuracy of the detection process including the routing overhead protocol. The experimental results investigated that the accuracy of detecting both active and passive black-holes attacks in MANET reached 97% with a promising time complexity for different mobility conditions. Moreover, the proposed scheme provides an accurate decision about malicious vs benign node dropping behavior using an adjustable threshold value.
APA, Harvard, Vancouver, ISO, and other styles
44

Ponguwala, Maitreyi, and DR Sreenivasa Rao. "Secure Group based Routing and Flawless Trust Formulation in MANET using Unsupervised Machine Learning Approach for IoT Applications." EAI Endorsed Transactions on Energy Web 6, no. 24 (October 16, 2019): 160834. http://dx.doi.org/10.4108/eai.13-7-2018.160834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Maheshwari, Uma, Suresh .., Mahendra .., Kadiyam .., and Manideepika Manchikalapati. "Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques." International Journal of Wireless and Ad Hoc Communication, no. 1 (2019): 31–44. http://dx.doi.org/10.54216/ijwac.000103.

Full text
Abstract:
In an ad hoc network, the routing protocol takes into account a variety of activities, including maintaining network connection, transmission scheduling, channel evaluation, and preserving network connectivity. Additionally, it determines network architecture. In addition, a number of different elements determines the performance of a routing protocol. These include node mobility, which is responsible for multiple link failures, support for quality of service (QoS), network size, the amount of traffic, and the level of security. The performance may occasionally also be affected by the manner in which the network is behaving in addition to the kinds of apps that are running in that environment. Selecting an appropriate protocol that is based on security is highly crucial in order to set up an effective network. A significant amount of effort has been put into improving the safety mechanisms that are built into routing protocols, most prominently in WSNs, MANETs, VANETs, and WMNs. Only MANET will be the topic of discussion here. Mobile Ad-Hoc Network is a wireless network that does not need infrastructure and is composed of mobile nodes. Mobile ad-hoc network, also known as MANET, is one of the most promising forms of next-generation wireless networking technology. It has garnered a significant amount of interest because it is self-organized and can be deployed at a cheap cost. In comparison to a traditional network, a MANET presents a number of challenges that are especially difficult to overcome when it comes to the duty of routing. The many difficulties that are inherent with MANET have made it an excellent subject for academic investigation. This provides a concise overview of security in MANETs as well as the issues that relate to maintaining them. Understanding the different routing mechanisms and the potential attacks that might be mounted against them is the first step in designing a reliable security mechanism. Within the scope of this study effort, we have provided specifics on the detection and prevention of various routing attacks, with the primary emphasis being placed on the network layer assaults that are unique to MANET. When compared to other study fields, MANET presents the greatest challenge in terms of maintaining network security. In recent years, a significant amount of research has been carried out to investigate several forms of assault; nevertheless, most of the surveys have been carried out without any kind of performance analysis. There is a paucity of research that seeks to find an all-encompassing study of the impact of the many different attacks that bring the overall performance of the Adhoc network down. On the other hand, secure routing in the face of a black hole attack can be difficult because preferences are often incomplete. The in-degree centrality and importance degree measurement applied to the collected consensus-based trust from decision-makers solves the issue of incomplete preferences and improves the accuracy of trust at the same time. Utilizing Network Simulator, we examine how well the suggested approach works. Based on the findings of the simulations, it has been demonstrated that the detection accuracy and throughput of the proposed CREDIT are both significantly higher than those of existing work, making the proposed CREDIT scheme superior.
APA, Harvard, Vancouver, ISO, and other styles
46

Kondaiah, Ramireddy, and Bachala Sathyanarayana. "Trust Factor and Fuzzy Firefly Integrated Particle Swarm Optimization Based Intrusion Detection and Prevention System for Secure Routing of MANET." International journal of Computer Networks & Communications 10, no. 1 (January 30, 2018): 13–33. http://dx.doi.org/10.5121/ijcnc.2018.10102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

"Fuzzy based Combined Trust Scheme for Secure Routing in MANET (FCTRS)." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (February 10, 2020): 1469–74. http://dx.doi.org/10.35940/ijitee.d1527.029420.

Full text
Abstract:
Mobile Ad Hoc network (MANET) is a self-configuring network consisting of mobile nodes without any fixed infrastructure. However due to the nodes has not any fixed infrastructure in MANET, it is susceptible to various security attacks like data modification, information sniff, due to low energy, computing ability and bandwidth. In MANET Black hole is also an attack and it is difficult to detect and prevent. The lack of quality in security aspects of ad-hoc routing protocols won’t provide reliability in the data packets movement between source and destination nodes. Implementing the routing decision with trust is an important one in the MANNET security. Hence, this research work propose an enhanced Fuzzy based combined trust scheme (FCTRS) based on public trust and Quality of Service (QoS) trust to detect black hole attack. It provides secure routing based on certificate authority (CA) to improve the performance of Ad-hoc On-demand Distance Vector (AODV). The results will show the performance improvement of proposed protocol over Enhanced Trusted Routing Scheme with Pattern Discovery (ETRS-PD) and the protocol AODV. The metrics in the performance of network examined with different conditions of mobility and the presence of black hole node positions.
APA, Harvard, Vancouver, ISO, and other styles
48

"Hybrid PSGWO Algorithm for Trust-Based Secure Routing in MANET." Journal of Networking and Communication Systems (JNACS) 2, no. 3 (July 25, 2019). http://dx.doi.org/10.46253/jnacs.v2i3.a1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

"Mobility Aware Energy Efficient Cluster Based Secure Routing Protocol for Mobile Adhoc Networks." International Journal of Innovative Technology and Exploring Engineering 9, no. 1 (November 10, 2019): 3609–13. http://dx.doi.org/10.35940/ijitee.a4621.119119.

Full text
Abstract:
Mobile ad-hoc network (MANET) is an evolving technology which derives under the class of wireless networks. Due to the inherent characteristics of nodes in MANET, energy efficiency and security still remains a major design issue. This paper intends to develop a multi-objective optimization (MOO) model for effective load distribution and security in the network. The presented MOO technique operates on two main stages namely clustering and secure routing. In the first stage, fuzzy logic technique with multiple input parameters namely energy, distance, link duration, latency, and trust are used for effective cluster construction. In the next stage, Lion Whale optimization (LWO) algorithm is introduced for secure routing. Using the determined MOO variables, a fitness function is derived to select the optimal routes for secure routing in MANET. The effective performance of the presented FLWO model is tested using a set of validation parameters and the proposed model attains maximum performance over other methods in a considerable way.
APA, Harvard, Vancouver, ISO, and other styles
50

Arumugam, Uma Maheswari, and Suganthi Perumal. "Trust based Secure and Reliable Routing Protocol of Military Communication on MANETs." Journal of Machine and Computing, January 5, 2023, 47–57. http://dx.doi.org/10.53759/7669/jmc202303006.

Full text
Abstract:
An entirely new and trendy peer-to-peer modern communications graph is called a Mobile Ad-hoc Network (MANET). The MANETs form their network without any infrastructure facilities, whenever needed. Military activities frequently need the quick and secure transfer of large quantities of data. The radio spectrum has been used by the military up until now for good communication but might have a chance to impact security problems. The security of data transfer is a major issue given the natural component of wireless networks in real-time situations. The main challenge is confirming trust across MANET nodes, as well as dealing with bandwidth, energy, and changing topology. By degrading the trust level between nodes, the malicious attitude increases poor data transmission, increases energy use, and reduces the duration of the network. To address this issue, we proposed a new protocol, Trust-based Secure and Reliable Routing Protocol (TSRRP), to increase the trust between nodes in MANETs and predict anomalous activity. This is done with the help of certain Quality of Service (QoS) metrics, such as the result analysis phase. NS2 is used to simulate the result. The simulation outcomes demonstrate how the suggested protocol performs better than the existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography