Open Access
Subscription Access
Open Access
Subscription Access
Fuzzy Based Optimization for Improving the Trust Score in Manets
Subscribe/Renew Journal
In this paper, research develop a method for identifying abnormal behavior based on two inputs: the trustworthiness of the user, as well as the reliability of the recommendations that they make. Specifically, research look at the reliability of the user recommendations. The next thing that needs to be done is to calculate the node general trust value in order to determine if there has been any kind of malicious attack. This will show whether or not the node has been compromised in any way. It is conceivable that this could lessen the amount of power that is needed for the communication that takes place between different networks. Additionally, it demonstrates that the model is better able to utilize the evaluation results of the common neighbor nodes to synthesize the confidence value when fewer nodes are deployed in the network. This is demonstrated by the fact that fewer nodes are deployed in the network. The reliability of the trust assessment improves while the number of trusts for which recommendations are made decreases.
Keywords
Fuzzy Optimization, Trust, Score, MANETs, Direct Trust
Subscription
Login to verify subscription
User
Font Size
Information
- R. Sabitha, V. Anusuya and V. Saravanan, “Network Based Detection of IoT Attack Using AIS-IDS Model”, Wireless Personal Communications, Vol. 98, pp. 1-24, 2022.
- N. Khandelwal and S. Gupta, “A Review: Trust based Secure IoT Architecture in Mobile Ad-hoc Network”, Proceedings of International Conference on Applied Artificial Intelligence and Computing, pp. 1464-1472, 2022.
- V. Thirunavukkarasu, and P. Prakasam, “Cluster and Angular based Energy Proficient Trusted Routing Protocol for Mobile Ad-Hoc Network”,Peer-to-Peer Networking and Applications, Vol. 15, No. 5, pp. 2240-2252, 2022.
- J. Singh and S. Sakthivel, “Energy-Efficient Clustering and Routing Algorithm Using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks”, Security and Communication Networks, Vol. 2022, pp. 1-13, 2022.
- Y. Wang and L.C. Kho, “Towards Strengthening the Resilience of IoV Networks-A Trust Management Perspective”, Future Internet, Vol. 14, No. 7, pp. 202-215, 2022.
- J. Kuriakose and A.K. Bairwa, “EMBN-MANET: A Method to Eliminating Malicious Beacon Nodes in Ultra-Wideband (UWB) based Mobile Ad-Hoc Network”, Ad Hoc Networks, Vol. 140, pp. 103063-103076, 2023.
- S. Ayed and L. Chaari, “Blockchain and Trust-Based Clustering Scheme for the IoV”, Ad Hoc Networks, Vol. 140, pp. 103093-103108, 2023.
- Y.H. Robinson, V. Saravanan and P.E. Darney, “Enhanced Energy Proficient Encoding Algorithm for Reducing Medium Time in Wireless Networks”, Wireless Personal Communications, Vol. 119, pp. 3569-3588, 2021.
- N. El Ioini and C. Pahl, “Trust Management for Service Migration in Multi-Access Edge Computing Environments”, Computer Communications, Vol. 194, pp. 167-179, 2022.
- M. Kandasamy and A.S. Kumar, “QoS Design using Mmwave Backhaul Solution for Utilising Underutilised 5G Bandwidth In GHz Transmission”, Proceedings of International Conference on Artificial Intelligence and Smart Energy, pp. 1615-1620, 2023.
- N.M.M. Hiraide and N. Yoshida, “Trust Management in Growing Decentralized Networks”, Journal of Computations and Modelling, Vol. 12, No. 3, pp. 1-12, 2022.
- J. Kundu and S. Pal, “Trust-Based Efficient Computational Scheme for MANET in Clustering Environment”, Proceedings of International Conference on Mathematical Modeling and Computational Science, pp. 305-314, 2022.
Abstract Views: 165
PDF Views: 0