scispace - formally typeset
Book ChapterDOI

Trust Management Approaches in Mobile Adhoc Networks

R Vijayan, +1 more
- pp 69-99
Reads0
Chats0
TLDR
Three trust management approaches has been proposed to avoid the misbehaving nodes from routing in MANET, evaluating nodes parameters intimacy, Energy, packet delivery and co-ordination as context values over time and healthier packet delivery ratio, reduced end-to-end delay.
Abstract
Mobile Adhoc Networks are a collection of mobile nodes interconnected by wireless media links. Here nodes misconduct owing to topology variations, exposed medium, short signal range, the absence of centralized approach and limited Energy. Node misbehaviors are critical concerns for routing in MANET. Under the given scenario, the nodes in MANET might decline to collaborate by not forwarding data with others for egoistic causes. However, it mandated that the nodes must collaborate or cooperate to route the packets towards the appropriate destination. The trust relationship among the nodes in a disseminated way helps in detecting the misbehaviors/selfish nodes. To avoid the misbehaving nodes from routing three trust management approaches has been proposed. In the first approach, Trust approach for Discovering and Quarantine the Misbehaviors (TDQM), the number of dropped packets as a parameter in the neighbor observation trust evaluation. Energy utilized for forwarding all types of packets, packet integrity, and neighbor observation, trust is recommended for trust evaluation. A node with high trust elected as a certification agency to release certificates for routing packets between the desired nodes. Moreover, untrustworthy nodes trust, computed is redeemed and isolated from routing. A Second approach proposed is Context residual Energy Based Trust Management in MANET (CEBTM), Retrieved context data like residual Energy and packets dropping of the nodes considered with weights for neighbor observation trust evaluation and reputation-based trust based on fuzzy for analysis. Revocation of trust of a generated negative alarm is verified based on the probability of reliability. In the Enhancing Trust in a MANET using trust and dynamic with Energy Efficient Multipath Routing Protocol approach (ETMRP), evaluating nodes parameters intimacy, Energy, packet delivery and co-ordination as context values over time. Here trust based path chosen by Energy efficient multipath routing. The simulation results of the proposed approaches provide healthier packet delivery ratio, reduced end-to-end delay as compared with other methods.

read more

Citations
More filters
Journal ArticleDOI

Blockchain and Federated Learning for Collaborative Intrusion Detection in Vehicular Edge Computing

TL;DR: This work proposes a cooperative intrusion detection mechanism that offloads the training model to distributed edge devices (e.g., connected vehicles and roadside units) and shows that the proposed scheme achieves cooperative privacy-preservation for vehicles while reducing communication overhead and computation cost.
Journal ArticleDOI

An Optimal Cluster & Trusted Path for Routing Formation and Classification of Intrusion Using Machine Learning Classification Approach in WSN

TL;DR: In this article , an attempt is made to focus on the detection of attack with the utilization of machine learning and optimization strategies by using particle swarm optimization for WSNs, where the nodes are deployed randomly based on the size of the network.

A Node Quality Based Cluster Header Selection Algorithm for Improving Security in MANET

TL;DR: In this article, the authors proposed an efficient algorithm for selecting a cluster head (CH) nodes by using K means algorithm and Weighted clustering Algorithm (WCA), which aims to elect a node having high sustainable cell (SC) rate as a CH.
References
More filters
Proceedings ArticleDOI

Performance analysis of the CONFIDANT protocol

TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.
Journal ArticleDOI

A trust model based on fuzzy recommendation for mobile ad-hoc networks

TL;DR: RFSTrust, a trust model based on fuzzy recommendation similarity, is proposed to quantify and to evaluate the trustworthiness of nodes, which includes five types of fuzzy trust recommendation relationships based on the fuzzy relation theory and a mathematical description for MANETs.
Proceedings ArticleDOI

Context aware detection of selfish nodes in DSR based ad-hoc networks

TL;DR: This paper provides a mechanism to inform other nodes of the system about the accused, provide a context aware inference scheme to blame the accused and malicious accuser without doubt, and achieves this with minimal extension of DSR and in a cost effective manner.
Proceedings ArticleDOI

Fuzzy Trust for Peer-to-Peer Systems

TL;DR: This paper shows how peers can use trust to manage this risk of failure, and uses fuzzy logic to allow peers to represent and reason with uncertain and imprecise information regarding others’ trustworthiness.
Journal ArticleDOI

Trust management in mobile ad hoc networks for bias minimization and application performance maximization

TL;DR: This paper identifies and validate the best trust protocol settings under which trust bias is minimized and application performance is maximized in MANETs and demonstrates the effectiveness of the approach with an integrated social and quality-of-service (QoS) trust protocol.
Related Papers (5)