Open Access   Article Go Back

Finding Trusted Node in Mobile Ad-Hoc Network

G. Viswanathan1 , M. Jayakumar2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 684-689, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.684689

Online published on May 31, 2019

Copyright © G. Viswanathan, M. Jayakumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G. Viswanathan, M. Jayakumar, “Finding Trusted Node in Mobile Ad-Hoc Network,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.684-689, 2019.

MLA Style Citation: G. Viswanathan, M. Jayakumar "Finding Trusted Node in Mobile Ad-Hoc Network." International Journal of Computer Sciences and Engineering 7.5 (2019): 684-689.

APA Style Citation: G. Viswanathan, M. Jayakumar, (2019). Finding Trusted Node in Mobile Ad-Hoc Network. International Journal of Computer Sciences and Engineering, 7(5), 684-689.

BibTex Style Citation:
@article{Viswanathan_2019,
author = {G. Viswanathan, M. Jayakumar},
title = {Finding Trusted Node in Mobile Ad-Hoc Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {684-689},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4300},
doi = {https://doi.org/10.26438/ijcse/v7i5.684689}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.684689}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4300
TI - Finding Trusted Node in Mobile Ad-Hoc Network
T2 - International Journal of Computer Sciences and Engineering
AU - G. Viswanathan, M. Jayakumar
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 684-689
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
325 334 downloads 131 downloads
  
  
           

Abstract

The mobile ad hoc networks (MANETs) encompassed of a dynamic topology and open wireless medium may lead to MANET affected by several security liabilities. MANET could be set of restricted vary wireless nodes that perform in a cooperative manner thereby increasing the overall range of the network. The performance of ad hoc networks depends on the supportive and trust environment of the distributed nodes. To enhance security in ad hoc networks, it is important to evaluate the trustworthiness of alternative nodes without centralized authorities. In this paper, a study was made based on the trust models such as direct Trust, Indirect Trust and Analytic Network Process (ANP). These trust models are incorporated to reflect the trust relationship`s complexity and uncertainty. Based on the trust factors, the selection of the trusted nodes is obtained by using methods like direct Trust, Indirect Trust, and Analytic Network Process. ANP is used for making trust decisions which replace the traditional methods like direct Trust and Indirect Trust methods. Hence from the study, we analyzed that the selected nodes obtained by using the ANP decision theorem eliminate the malicious nodes and helps to protect the network from any internal attacks.

Key-Words / Index Term

MANET, Trusted Node, Direct Trust, Indirect Trust, Analytic Network Process

References

[1] R. Li, J. Li, P. Liu, and J. Kato, “A Novel Hybrid Trust Management Framework for MANETs,” in Proc. 29th IEEE Int. Conf. Distrib. Comput. Syst. Workshops, 2009, pp.251–256.
[2] J. Luo, X. Liu, and M. Fan, “A Trust Model Based on AFuzzy Recommendation for Mobile Ad-hoc Networks,” Comput. Netw., vol. 53, no. 14, pp. 2396–2407, 2009.
[3] Satty, T.L.: “The Analytic Hierarchy Process” (McGraw-Hill, New York, 1980).
[4] Xia, Hui, et al. "Trust Management Model for Mobile Ad hoc Network Based on Analytic Hierarchy Process and Fuzzy Theory." Wireless Sensor Systems, IET1.4 (2011): 248-266.
[5] Sun, Y. L., Yu, W., Han, Z., Ray, L. K. J.: “Trust Modeling and Evaluation in Adhoc Networks”.Proc. Global Telecommunications, 2005,pp.1–10.
[6] Sun, Y.L., Yu, W., Han, Z., Ray, L. K. J.: “Information Theoretic Framework of Trust Modeling and Evaluation for Ad hoc Networks”, IEEE J. Sel.Areas Commun., 2006, 24, (2), pp.305–319.
[7] Josang, A.: “A Logic for Uncertain Probabilities”, Int. J. Uncertainty, Fuzziness, Knowledge-Based Syst., 2001, 9,(3),pp 179–311 13.
[8] Beth, T., Borcherding, M., Klein, B.:“Valuation of Trust in Open Network”.Proc.ESORICS, 1994, pp.3–15.
[9] H.Yu, S. Liu, A.C.Kot, C.Miao, and C.Leung, ‘’Dynamic Witness Selection for Trustworthy distributed Cooperative Sensing in Cognitive Radio Networks’’, Communication Technology (ICCT), 2011 IEEE 13th International Conference on, pp. 1-6, 2011.
[10] P. B. Velloso, R. P. Laufer, D. de O Cunha, O.C.M.Duarte, and G.Pu-jolle, ‘’Trust Management in mobile ad hoc networks using a scalable maturity-based model,’’Network and Service Management, IEEE Transactions on, 7, (3), pp. 172-185, 2010.
[11] C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, “E-Hermes: A Robust Cooperative trust establishment scheme for mobile Ad-hoc Networks,” Ad Hoc Netw., vol. 7, no. 6,pp. 1156–1168, 2009.
[12] Saaty, Thomas L. "Analytic Network Process." Encyclopedia of Operations Research and Management Science.Springer US, 2001 8-35.
[13] Y. L. Sun, W. Yu, Z. Han, and K. Liu,” Information theoretic framework of trust modeling and evaluation for ad hoc networks, “IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp 305-317, Feb 2006.
[14] X. Li, M. R. Lyu, and J. Liu, “A trust model based routing protocol for secure ad hoc networks,” in Proceedings 2004 IEEE Aerospace Conference, Big Sky, Montana, U.S.A., March 6-13 2004.
[15] Xiao - Lin, LI Xiao - Yong GUI. "Trust Quantitative Model with Multiple Decision Factors in Trusted Network [J]." Chinese Journal of Computers 3 (2009): 004.
[16] Xia, Hui, et al."A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules." Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications. IEEE Computer Society, 2011.
[17] Lubdha M. Bendale, Roshani. L. Jain, Gayatri D. Patil, "Study of Various Routing Protocols in Mobile Ad-Hoc Networks", International Journal of Scientific Research in Network Security and Communication, Vol.06, Issue.01, pp.1-5, 2018.
[18] Afzal Ahmad, Mohammad Asif, Shaikh Rohan Ali, "Review Paper on Shallow Learning and Deep Learning Methods for Network security", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.5, pp.45-54, 2018.