Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET

نویسندگان

چکیده

Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by day. Evaluating a node’s trust value has significant advantages since such network applications only run efficiently involving trustable nodes. The values are estimated based on reputation of each node in using different mechanisms. However, these mechanisms have various challenging issues which degrade performance. Hence, novel Quality Service (QoS) Trust Estimation with Black/Gray hole Attack Detection approach proposed this research work. Initially, QoS-based estimation Fuzzy logic scheme. determined fuzzy membership function and utilizing QoS parameters as residual energy, bandwidth, mobility, reliability. This mechanism prevents black attack during transmission. But, gray attacks not identified turn increases packet drop rate significantly. also detected Kullback-Leibler (KL) divergence method used for estimating statistical measures. Additional metrics considered to prevent attack, loss, delivery ratio, delay node. Thus, both simultaneously. Finally, simulation results show that effectiveness compared other trust-aware routing protocols MANET.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust Based Security Mechanism for Service Discovery in Manet

Mobile AdHoc Network (MANET) endures wide number of security issues in discovering services. Furthermore, different services require different level of security. For instance commercial applications necessitate less security compare to military applications. Thus, evolving an efficient service discovery mechanism in view of above criteria is a complicated work. In this paper, a trust based secu...

متن کامل

A Fuzzy Reputation-based Trust Management Scheme for Cloud Computing

Cloud computing requires that customers trust that a service provider’s platforms are secured and provide a sufficient level of integrity for the client’s data. However, a lack of trust between cloud customers and providers has hindered the universal acceptance of clouds as an increasingly popular approach for the processing of large data sets and computationally expensive programs. Existing te...

متن کامل

Mitigating Colluding Injected and Duplication Key Attacks in Manet

In this chapter, two new attacks are introduced in MANETs. The CIA in Mobile Ad hoc networks (MANETs) has been successfully eliminated in Wireless Sensor networks, but in MANETs the legitimate node is also reported as a malicious node (Farah Kandah et al 2011). In CIA, an adversary utilizes a colluding attack in MANETs by injecting malicious nodes in the network and hiding their identities from...

متن کامل

Trust Based Security in Manet

Mobile ad-hoc network (MANET) is one of the most propitious area in research and development of wireless network. Popularity of mobile device and wireless networks significantly increased over the past years. MANET has no centralized control to handle the network, so this may cause to fails the functioning. This characteristic force a component node to be careful when communicating with other n...

متن کامل

Mitigating Routing Attacks with Local Trust in DHTs

Distributed Hash Tables (DHTs) have been used as a common building block in many distributed applications, including Peer-to-Peer (P2P), Cloud and Grid Computing. However, there are still important security vulnerabilities that hinder their adoption in today’s large-scale computing platforms. For instance, routing vulnerabilities have been a subject of intensive research but existing solutions ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Intelligent Automation and Soft Computing

سال: 2023

ISSN: ['2326-005X', '1079-8587']

DOI: https://doi.org/10.32604/iasc.2023.031422