Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme for Malicious Adversaries Detection
R. Saravanan1 , E. Ilavarasan2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-10 , Page no. 715-721, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.715721
Online published on Oct 31, 2018
Copyright © R. Saravanan, E. Ilavarasan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: R. Saravanan, E. Ilavarasan, “Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme for Malicious Adversaries Detection,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.715-721, 2018.
MLA Style Citation: R. Saravanan, E. Ilavarasan "Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme for Malicious Adversaries Detection." International Journal of Computer Sciences and Engineering 6.10 (2018): 715-721.
APA Style Citation: R. Saravanan, E. Ilavarasan, (2018). Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme for Malicious Adversaries Detection. International Journal of Computer Sciences and Engineering, 6(10), 715-721.
BibTex Style Citation:
@article{Saravanan_2018,
author = { R. Saravanan, E. Ilavarasan},
title = {Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme for Malicious Adversaries Detection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {715-721},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3089},
doi = {https://doi.org/10.26438/ijcse/v6i10.715721}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.715721}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3089
TI - Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme for Malicious Adversaries Detection
T2 - International Journal of Computer Sciences and Engineering
AU - R. Saravanan, E. Ilavarasan
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 715-721
IS - 10
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
416 | 341 downloads | 265 downloads |
Abstract
There is a growing interest for mobile ad hoc network (MANET) in the recent years for many time-critical applications, such as military applications or during a disaster recovery scenario in a collaborative manner. In this paper, we proposed a Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme (GKRNTS) for malicious adversaries node detection which focuses on the discrimination of mobile nodes into malicious and benevolent nodes. The interactions between the mobile nodes are periodically monitored and the elucidated data are useful for determining the degree of collaboration between the mobile nodes through the computation of Gwet Kappa. The Gwet Kappa parameter used in this Repeated Node Taxonomy Scheme is stored with each node as an adjacency matrix that stores the interaction activity between the nodes of the network. This adjacency matrix quantifies the extent of cooperation existing between the mobile nodes of the network and they are considered as the taxonomy of the mobile nodes during data communication. The proposed GKRNTS is compared against the TPFPPDM and NPDRDS techniques by simulation using NS2 network simulator has led to promising results in terms of reduced packet rate, energy consumption and computational cost.
Key-Words / Index Term
MANETs, Node Taxonomy, Gwet Kappa, Malicious Nodes
References
[1] Shailja Sharma , “A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network”, International Journal of Scientific Research in Network Security and Communication, Vol.6 , Issue.2 , pp.66-69, Apr-2018.
[2] Jaya, S and X. Deepak, “ An Improved Naïve Bayes classifier for Intrusion DetectionSystem”, International Journal of Innovations & Advancement in Computer Science, vol. 5, no.6, pp-128-134, 2016.
[3] Mitrokotsa, A., and Dimitrakakis, C., Intrusion detection in MANET using classification algorithms: The effects of cost and model selection, Journal of Ad Hoc Networks, 11(1), pp. 226-237, 2013.
[4] Youngseok Lee ; Ilkyu Park ; Yanghee Choi(2002),Improving TCP performance in multipath packet forwarding networks . Journal of Communications and Networks , Vol. 4(2)., pp 148 - 157 .
[5] Rebecca M. Warner,(1992) Dimensions of social interaction tempo: A factor analytic study of time and frequency domain indexes of interaction structure, The Journal of Psycholinguistic Research., Vol 21(3)., pp 173–191.
[6] K. Ravikumar, V. Manikandan , “Detection of Node Capture Attack in Wireless Sensor Networks”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6 , Issue.4 , pp.56-61, Aug-2018 .
[7] M. Natkaniec ; A.R. Pach (2000),An analysis of the influence of the threshold parameter on the IEEE 802.11 network performance , IEEE Wireless Communications and Networking Conference. Vol (3)., pp 23–28.
[8] Albers, P., Camp, O., Percher, J. M., Jouga, B., Me, L., and Puttini, R. S., Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches, Journal of Wireless Information Systems, pp. 1-12, 2002.
[9] Ishay Weissman,(2007), Confidence intervals for the threshold parameter, Journal of communications in statistics , Vol 1, pp 549-557 .
[10] Gopalakrishnan, S., and Kumar, P. M. (2016). Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET. Circuits and Systems, 07(06), pp 748-758.