Trust‐oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks
نویسندگان
چکیده
Flying Ad Hoc Networks (FANETs) are gaining popularity due to its extra-ordinary features in avionics and electronics domain. FANETs also considered as most powerful weapon military assets well civil security applications. Due infrastructureless design wireless nature network, some challenges overhead that should be overcome before the whole network performance degradation. Malicious nodes capable of degrading throughput credibility by including false malicious data. Securing dynamic from is a critical issue environment. In this paper we have purely focused on identification isolation node order make enhancement packet delivery rate maintain reliability. To accomplish all these tasks, introduced Trust-Oriented Peered Customized Mechanism (TOPCM) estimate trust value among flying ad hoc nodes. research, eliminated presence causes misbehavior interruption network. demonstrate effectiveness our proposed approach used Network Simulator NS2 entire process into simulated Simulated results showed TOPCM works more effectively meets desired expectation. The main contribution research establish will helpful isolate rate.
منابع مشابه
The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks
Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...
متن کاملDetection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
VANETs enable wireless communication among vehicles and vehicle to infrastructure. Its main objective is to render safety, comfort and convenience on the road. VANET is different from ad-hoc networks due to its unique characteristics. However, because of lack of infrastructure and centralized administration, it becomes vulnerable to misbehaviors. This greatly threatens ing such a useful network...
متن کاملA Fuzzy Realistic Mobility Model for Ad hoc Networks
Realistic mobility models can demonstrate more precise evaluation results because their parameters are closer to the reality. In this paper a realistic Fuzzy Mobility Model has been proposed. This model has rules which are changeable depending on nodes and environmental conditions. It seems that this model is more complete than other mobility models.After simulation, it was found out that not o...
متن کاملIntrusion Detection System for Detecting Malicious Nodes in Mobile Ad hoc Networks
A mobile ad hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless links. In this network, a mobile node behaves as a host and a router at the same time. MANETs are highly vulnerable to attacks than wired networks due to their characteristics. Ad hoc network maximize the total network throughput by using all available nodes for routing and ...
متن کاملAn Efficient and Secure System for Detecting Malicious Nodes in Mobile Ad hoc Networks
Recent advances in portable computing and wireless technologies are opening up exciting possibilities for the future of wireless mobile networking. A Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications among all the contemporary wireless networks. It consists of mobile platforms which are free to move arbitrarily. They do not need a fixed infrastructure and the ne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Transactions on Emerging Telecommunications Technologies
سال: 2022
ISSN: ['2161-5748', '2161-3915']
DOI: https://doi.org/10.1002/ett.4489