Open Access
Subscription Access
Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks
Mobile ad hoc network (MANET) possess self-configuration, self-control and self-maintenance capabilities. Nodes of MANET are autonomous routers. Hence, they are vulnerable to security attacks. Collaborative attacks such as black hole and wormhole in MANET are difficult to be detected and prevented. Trust based routing decision is an effective approach for security enhancement in MANET. In this study, trust computing using fuzzy based max-product composition scheme is applied to compute aggregated trust values to determine malicious nodes and thereby safe route in MANETs. The results show performance improvement of proposed protocol over AODV protocol. Network metrics are analysed under different mobility conditions and different positions of black hole nodes.
Keywords
Blackhole Attacks, Trust Based Computing, Fuzzy, Manets, Trust Formulation, Max Product Composition.
User
Font Size
Information
- Azzedine Boukerche , Begumhan Turgut, Nevin Aydin, Mohammad Z. Ahmad, Ladislau Bölöni, Damla Turgut , “Routing protocols in ad hoc networks: A survey”, Computer Networks, 55, pp 3032-80, 2011
- Farrukh Aslam Khan a,c,”, Muhammad Imran b,c, Haider Abbasa,d, Muhammad Hanif Durad, “A detection and prevention system against collaborative attacks inMobile Ad hoc Networks”, Future Generation Computer Sysmtems, 68, 2017, pp 416-427
- Kannan Govindan, Prasanna Mohapatra, “Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey”,
- J.Manoranjini, A.Chandrasekar, D.Rajinigirinath, “Hybrid Detector for Detection of Black Holes in Manets”, IERI Procedia, pp 376 – 3822013 International Conference on Electronic Engineering and Computer Science,
- Krishnaprasad Thirunarayan, Pramod Anantharam”, Cory Henson, Amit Sheth, “Comparative trust management with applications:Bayesian approaches emphasis”, Future Generation Computer Systems, 31, pp 182-199, 2014
- Hao-Ting Pai, Fan Wu, “Prevention of wormhole attacks in mobile commerce basedon non-infrastructure wireless networks”, Electronic Commerce Research and Applications, 10 , 384–397, (2011)
- Hoang Lan Nguyen, Uyen Trang Nguyen, “A study of different types of attacks in mobile ad hoc networks “ 25th IEEE Canadian conference on Electrical & Computer Engineering, 2012
- Karim Konate, Gaye Abdourahime, “Ättacks analysis in mobile ad hoc networks: Modelling and Simulation”, second international conference on Intelligent systems, modelling and simulation, 2011
- Jin Hee Cho, Anantram Swami, Ing Ray Chen, “A survey on Trust Management for Mobile Ad hoc Networks” IEEE Communications Surveys and Tutorials, 13(4), pp 562-581, Fourth Quarter 2011.
- Mousami Sardar, Koushik Majumdar, “A survey on trust based secure routing in MANET”, ICC SEA, SPPR,CSIA, 2013
- Baptiste Alcalde, Eric Dubois, Sjouke Mauw, Nicolas Mayer, Sasa Radomirovic, “Towards a decision model on trust and security risk management”, in proceedings of 7th Australasian Information security conference (AISC 2009), Wellington New Zealand
- Asad Amir Pirzada and Chris McDonald, “Establishing Trust in Pure Ad hoc Networks”, 27th Australiasian computer sc. Conference, 2004
- Simin Hall, William McQuay, “Fundamental Features of a Unified Trust Model for distributed systems”,
- Ashish Kumar Jain, VrindaTokekar, “Security Enhancement in MANETs using Fuzzy based Trust Computation against Black hole Attacks”, International congress on Information Communication Technology, 12-14, 2016.
Abstract Views: 255
PDF Views: 2