Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning
R. Esther Raja Pushpa1
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-10 , Page no. 290-295, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.290295
Online published on Oct 31, 2018
Copyright © R. Esther Raja Pushpa . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: R. Esther Raja Pushpa, “Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.290-295, 2018.
MLA Style Citation: R. Esther Raja Pushpa "Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning." International Journal of Computer Sciences and Engineering 6.10 (2018): 290-295.
APA Style Citation: R. Esther Raja Pushpa, (2018). Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning. International Journal of Computer Sciences and Engineering, 6(10), 290-295.
BibTex Style Citation:
@article{Pushpa_2018,
author = {R. Esther Raja Pushpa},
title = {Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {290-295},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3020},
doi = {https://doi.org/10.26438/ijcse/v6i10.290295}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.290295}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3020
TI - Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning
T2 - International Journal of Computer Sciences and Engineering
AU - R. Esther Raja Pushpa
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 290-295
IS - 10
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
439 | 311 downloads | 241 downloads |
Abstract
The mobile ad hoc networks (MANETs) has a dynamic topology and open wireless medium, may leads to MANET suffering from many security liabilities. In this paper, using recent progresses in uncertain reasoning initiated from artificial intelligence community, an unified trust management scheme has been implemented that improves the security in MANETs. In the proposed trust management pattern, the trust model has two components: trust from direct observation and trust from indirect observation. In direct observation from an observer node, the trust value is derived using Bayesian inference, which is a form of uncertain reasoning. In Indirect observation, also called secondhand evidence that is obtained from neighbor nodes of the observer node, here the trust value is derived using the Dempster-Shafer theory, which is another form of uncertain reasoning. Merging these two components in the trust model can achieve more accurate trust values of the observed nodes in MANETs. Then evaluate this pattern under the situation of MANET routing protocol (OLSRv2). The simulation result shows the effectiveness of the proposed scheme. Exactly, throughput and packet delivery ratio can be improved considerably.
Key-Words / Index Term
MANETs, Security, Trust Management, Uncertain Reasoning
References
[1]. Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu Wang, and Peter Mason “Security Enhancements for Mobile Ad Hoc Networks with Trust Management using Uncertain Reasoning” IEEE Transaction Vehicular technology, VOL. 13, NO. 3, 2014.
[2]. Bhavyesh Divecha, Ajith Abraham, Crina Grosanand Sugata Sanyal “Impact of Node Mobility on MANET Routing Protocols Models”, Vol.3, No.1, july 2014.
[3]. Boun padith Kann havong, Hideshisa Nakayama, Yoshiaki Nemoto, Nei Kato – Tohoku university, Abbas Jamalipour – university of Sydney “A Survey Of Routing Attacks In Mobile Adhoc Networks”, Vol.2, No.2, august 2001.
[4]. C´edricAdjih, Daniele Raffo, Paul M¨uhlethaler INRIA, Domaine de Voluceau, France1 “Attacks Against OLSR: Distributed Key Management for Security”, Vol.2, No.2, july 2000.
[5]. Cedric Adjih, Thomas Clausen, Philippe Jacquet, Anis Laouiti, Paul M¨uhlethaler, Daniele Raffo “Securing the OLSR protocol”, Vol.2, No.2, july 2000.
[6]. Huanyu Zhao, Xin Yang, and Xiaolin Li, Member, IEEE ” cTrust: Trust Management in Cyclic Mobile Ad Hoc Networks” IEEE Transaction on Vehicular Technology, VOL. 62, NO. 6, July 2013
[7]. Philip England, Dr Qi Shi, Dr Bob Askwith, Dr.Faycal Bouhafs “A Survey of Trust Management in Mobile Ad-Hoc Networks”, Vol.1, No.2, January 2013
[8]. 7.Quansheng Guan, Member, IEEE, F. Richard Yu, Senior Member, IEEE, Shengming Jiang, Senior Member, IEEE, and Victor C. M. Leung, Fellow, IEEE “Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications” IEEE Transaction on Vehicular Technology, VOL. 61, NO. 6, July 2012.
[9]. F.Richard Yu, Helen Tang, Peter C. Mason, and Fei Wang “A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks” IEEE Transaction on Network and service management, VOL. 7, NO. 4, December 2010.
[10]. Rui Zhang • Yanchao Zhang • Yuguang Fang “AOS: an anonymous overlay system for mobile ad hoc networks”, Vol.3, No.1, july 2005.
[11]. Shengrong Bu, Student Member, IEEE, F. Richard Yu, Senior Member, IEEE, Xiaoping P. Liu, Senior Member, IEEE, Peter Mason, and Helen Tang, Member, IEEE “Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks” IEEE Transaction on Vehicular Technology, VOL. 60, NO. 3, March 2011.
[12]. Shengrong Bu, Student Member, IEEE, F. Richard Yu, Senior Member, IEEE, Xiaoping P. Liu, Senior Member, IEEE, Helen Tang, Member, IEEE “Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Network” IEEE Transaction on Wireless Communications, VOL. 10, NO. 9, September 2011.
[13]. Shohreh Honarbakhsh, Liza Binti Abdul Latif, Azizahbt Abdul Manaf, and BabakEmami “Enhancing Security for Mobile Ad hoc Networks by Using Identity Based Cryptography” International Journal of Computer and Communication Engineering, Vol. 3, No. 1, January 2014.
[14]. Thomas M. Chen and Varadharajan Venkataramanan, Southern Methodist University “Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks”,Vol.1, No.3, september 2000.
[15]. Thomas Clausen, Ulrich Herberg “Vulnerability Analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2)” ,Vol.3, No.1, march 2005.
[16]. Yanwei Wang, F. Richard Yu, Senior Member, IEEE, Helen Tang, Senior Member, IEEE, Minyi Huang, Member, IEEE “A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks” IEEE Transaction on Wireless Communications, VOL. 13, NO. 3, March 2014.