TRUST MODEL WITH DEFENSE SCHEME IN MANETS
Journal Title: International Journal of Advanced Research in Engineering and Technology - Year 2019, Vol 10, Issue 2
Abstract
The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that relies on the recommendations from other nodes in the network is vulnerable to the possible dishonest behaviour, such as badmouthing, ballot-stuffing, and collusion, of the recommending nodes. This paper investigates the problems of attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation-based trust model with a defence scheme that utilises clustering technique to dynamically filter attacks related to dishonest recommendations within certain time based on number of interactions, compatibility of information and node closeness. The model is empirically tested in several mobile and disconnected topologies in which nodes experience changes in their neighbourhoods and consequently face frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment.
Authors and Affiliations
SYEDA KAUSAR FATIMA, SYEDA GAUHAR FATIMA ,SYED ABDUL SATTAR and SYED MOHD ALI
WIDEBAND MICROSTRIP ANTENNA USING PARASITIC PATCH ELEMENT
A wideband microstrip antenna using parasitic patch element is proposed in this paper. Initially a circular patch antenna is designed. The antenna is found to resonate at 5.2 GHz and provides impedance bandwidth of 3.8...
AN ADVANCED DATA SECURITY METHOD IN WSN
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical app...
DESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORING
This article put forward a technique to realize the communication between wireless sensor network and the Internet. The IOT (Internet of Things) gateway is used as part of the greenhouse checking system. The design wel...
PADDY THRESHER AND PERFORMANCE ANALYSIS UNDER VARIOUS CONDITIONS OF PADDY STRAW
Paddy is the most vital and extensively grown up food crop within the World. It’s the staple food of over sixty percent of the globe population; Thresher may be a rice seed separation tool. Threshing is a key part of a...
AN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKS.
Nowadays, with the rapid development of science and technology and the everincreasing demand in every field, wireless sensor networks are emerging as a necessary scientific achievement to meet the demand of human in mod...