Open Access   Article Go Back

Analyzing Trust Categories and Generating Trusted Network Path of MANET using Fuzzy Credibility Distribution Function

S.Bandyopadhyay 1 , S. Karforma2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-01 , Page no. 274-279, Jan-2019

Online published on Jan 20, 2019

Copyright © S.Bandyopadhyay, S. Karforma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Bandyopadhyay, S. Karforma, “Analyzing Trust Categories and Generating Trusted Network Path of MANET using Fuzzy Credibility Distribution Function,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.274-279, 2019.

MLA Style Citation: S.Bandyopadhyay, S. Karforma "Analyzing Trust Categories and Generating Trusted Network Path of MANET using Fuzzy Credibility Distribution Function." International Journal of Computer Sciences and Engineering 07.01 (2019): 274-279.

APA Style Citation: S.Bandyopadhyay, S. Karforma, (2019). Analyzing Trust Categories and Generating Trusted Network Path of MANET using Fuzzy Credibility Distribution Function. International Journal of Computer Sciences and Engineering, 07(01), 274-279.

BibTex Style Citation:
@article{Karforma_2019,
author = {S.Bandyopadhyay, S. Karforma},
title = {Analyzing Trust Categories and Generating Trusted Network Path of MANET using Fuzzy Credibility Distribution Function},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {01},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {274-279},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=631},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=631
TI - Analyzing Trust Categories and Generating Trusted Network Path of MANET using Fuzzy Credibility Distribution Function
T2 - International Journal of Computer Sciences and Engineering
AU - S.Bandyopadhyay, S. Karforma
PY - 2019
DA - 2019/01/20
PB - IJCSE, Indore, INDIA
SP - 274-279
IS - 01
VL - 07
SN - 2347-2693
ER -

           

Abstract

Mobile ad-hoc network (MANET) is one of the significant approaches with highly decentralized and dynamic configured architecture. For transferring packets from one node to another node in MANET security is a big challenge. Trust between two consecutive nodes is a prime important factor for secure data transmission through a trusted network path. As we all know trust of any particular node observed by other one varies with time for different constrains. Here we try to depict the variation of trust with fuzzy mathematics where trust value for each node is represented with triangular fuzzy number. Using fuzzy credibility distribution function we convert the triangular fuzzy trust value in interval based form and represent the trust variation in much more reliable format. These interval based trust values are used to generate direct, indirect trust value in interval based matrix format and from them we prepare overall communication trust matrix to generate the secure network path to send data from particular source to destination.

Key-Words / Index Term

fuzzy credibility distribution, inverse credibility distribution, triangular fuzzy number, membership value

References

[1] V.B.Reddy, S.Venkataraman, A. Negi, “Communication and Data Trust for Wireless Sensor Networks using D-S Theory”, IEEE Sensors, Vol. 12, Issue.12, pp.3921 –3929, 2017.
[2] S. Subramaniam, , R. Saravanan, P. K Prakash, “Trust Based Routing to Improve Network Lifetime of Mobile Ad Hoc Networks”, Journal of Computing and Information Technology , Vol. 21, Issue.3, pp.149–160, 2013.
[3] G. Dhananjayan, J.Subbiah, “T2AR : trust-aware ad-hoc routing protocol for MANET”, SpringerPlus, Vol. 5, Issue.1,pp.1-6,2016.
[4] R.Akbani, T.Korkmaz, G. Raju, “ Mobile ad-hoc networks security”, In Recent Advances in Computer Science and Information Engineering, Springer Publisher, Berlin, Heidelberg, pp-659–666,2012.
[5] Theodorakopoulos , J.S. Baras, “On Trust Models and Trust Evaluation Metrics for Ad-hoc Networks”, IEEE Journal on selected Areas in Communications, Vol. 24, Issue.2, pp.318-328,2016.
[6] J.Sen, “A Distributed Trust Management Framework For Detecting Malicious Packet dropping Nodes In a Mobile Ad Hoc Network”, International Journal of Network Security & Its Applications (IJNSA), Vol. 2, Issue.4, pp-92-104,2010.
[7] P. M. Nanaware, S. D. Babar, “ Fuzzy Model for Intrusion Detection using Trust System based Bias Minimization & Application Performance Maximization In MANET”, International Journal of Computer Applications,pp.6-8,2016.
[8] I.Dokmanic , R. Parhizkar , J. Ranieri , M. Vetterli , “Euclidean Distance Matrices: Essential theory, algorithms, and applications”, IEEE Signal Processing Magazine, Vol. 32, Issue.6, pp.12-30, 2015.
[9] S. Bandyopadhyay, S.Karforma,“Improving the Performance of Fuzzy Minimum Spanning Tree based Routing Process through P-Node Fuzzy Multicasting Approach in MANET”, International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.6, pp.16-26, 2018.
[10] H. Yang, , H. Luo, F. Ye, S. W. Lu, L. Zhang, “ Security in Mobile Ad Hoc Networks: Challenges and Solutions” , IEEE Wireless Communications, Vol. 11, Issue.1, pp. 38-47,2004.
[11] Y. Ren, A. and Boukerche, “A trust-based security system for ubiquitous and pervasive computing environments”, Elsevier Journal on Computer Communications, Vol. 31, Issue.18, pp.4343–4351, 2008.
[12] [12] T. Camp, J. Boleng, V. Davies , “A survey of mobility models for ad-hoc network research”, Wireless Communications and Mobile Computing (WCMC): Special Issue Mobile Ad Hoc Network, Vol. 2,pp.483–502, 2002.