International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

A Competent Intelligence Modeling for Trust-Based Security Scheme in Mobile Ad Hoc Network

Author NameAuthor Details

K. Vijay Anand, G. Abel Thangaraja

K. Vijay Anand[1]

G. Abel Thangaraja[2]

[1]Department of Computer Science, SNMV College of Arts and Science, Coimbatore, Tamil Nadu, India

[2]Department of Computer Technology, Sri Krishna Adithya College of Arts and Science, Coimbatore, Tamil Nadu, India

Abstract

Mobile Ad Hoc Network (MANET) is one of the rising wireless configurations which have self-organizing wireless mobile nodes and adaptive network connectivity. Because of its dynamic nature and constantly changing topology, security is a critical issue for MANET. So, a trust-based secure energy-efficient routing protocol has been suggested in MANET which predicts the node’s trust level based on the static threshold value to detect malicious nodes and choose the best paths for data transfer. But, this threshold might not be ideal regarding identification accuracy and Packet Loss Ratio (PLR). To solve this issue, a highly suitable trust level must be estimated according to the node parameters like mobility, Node Degree (ND), etc. Hence, this article proposes an adaptive Trust Threshold (TT)-aware secure energy-efficient protocol by considering the network parameters to adaptively choose the TT. The TT in this protocol is adjusted dynamically at each node based on the different network factors. Initially, these various network variables are determined for all nodes. After that, an Artificial Neural Network (ANN) classifier learns such parameters to identify the TT, which aids in predicting the node's trust level. Further, malicious and benign nodes are discovered properly based on their trust level. At last, the simulation results exhibit that the proposed protocol achieves 92.1% accuracy while deploying 300 nodes compared to the other protocols.

Index Terms

MANET

Security

Data Transfer

Trust-Aware Routing

Energy Efficiency

Adaptive Trust Threshold

ANN

Reference

  1. 1.
    N. Raza, M.U. Aftab, M.Q. Akbar, O. Ashraf, M. Irfan, “Mobile ad-hoc networks applications and its challenges”, Communications and Network, vol. 8, no. 3, 2016, pp. 131-136.
  2. 2.
    N. A. M. Saudi, M. A. Arshad, A. G. Buja, A. F. A. Fadzil, R. M. Saidi, “Mobile ad-hoc network (MANET) routing protocols: a performance assessment”, In Proceedings of the Third International Conference on Computing, Mathematics and Statistics, Springer, Singapore, 2019, pp. 53-59.
  3. 3.
    T. K. Saini, S. C. Sharma, “Recent advancements, review analysis, and extensions of the AODV with the illustration of the applied concept”, Ad Hoc Networks, vol 103, 2020, pp.1-20.
  4. 4.
    M. I. Talukdar, R. Hassan, M. S. Hossen, K. Ahmad, F. Qamar, A. S. Ahmed, “Performance improvements of AODV by black hole attack detection using IDS and digital signature”, Wireless Communications and Mobile Computing, 2021, pp 1-13.
  5. 5.
    R. Menaka, J. M. Mathana, R. Dhanagopal, B. Sundarambal, “Performance evaluation of DSR protocol in MANET untrustworthy environment” , In IEEE 6th International Conference on Advanced Computing and Communication Systems, 2020, pp. 1049-1052.
  6. 6.
    W. Alnumay, U. Ghosh, P. Chatterjee, “A Trust-Based predictive model for mobile ad hoc network in internet of things”, Sensors, vol.19, no.6, 2019 , pp 1-14.
  7. 7.
    Usman, A. B., Gutierrez, J. Toward trust based protocols in a pervasive and mobile computing environment: A survey. Ad Hoc Networks, 81, 2018, 143-159.
  8. 8.
    R. J. Cai, W. C. W. Tan, P. H. J. Chong, “An overview of trust-based routing design under adversarial mobile ad hoc network environment”, Wireless Personal Communications, vol. 96, no.3, 2017 , pp. 3923-3946.
  9. 9.
    A. Sharma, E. S. Pilli, A. P. Mazumdar, P. Gera “Towards trustworthy internet of things: a survey on trust management applications and schemes”, Computer Communications, vol .160, 2020, pp .475-493.
  10. 10.
    R. K Chahal, N. Kumar, S. Batra, “Trust management in social internet of things: a taxonomy, open issues, and challenges”, Computer Communications, vol. 150, 2020, pp. 13-46.
  11. 11.
    H. Xu, H. Si, H. Zhang, L. Zhang, Y. Leng, J. Wang, D. Li, “Trust-based probabilistic broadcast scheme for mobile ad hoc networks”, IEEE Access, vol. 8, 2020 , pp. 21380-21392.
  12. 12.
    D. Zhang, C. Gong, K. Jiang, X. Zhang, T. Zhang, “A kind of new method of intelligent trust engineering metrics (ITEM) for application of mobile ad hoc network”, Engineering Computations, 2019 , pp.1617-1643.
  13. 13.
    N.Veeraiah, O. I.Khalaf, C. V. P. R. Prasad, Y. Alotaibi, A. Alsufyani, S. Alghamdi, N.Alsufyani, “Trust aware secure energy efficient hybrid protocol for MANET”, IEEE Access, 2020, pp. 120996-121005.
  14. 14.
    S. Gurung, S. Chauhan, “A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET”, Wireless Networks, vol. 25 no.4, 2019, pp. 1685-1695.
  15. 15.
    R. J. Cai, X. J. Li, P. H. J. Chong, “An evolutionary self-cooperative trust scheme against routing disruptions in MANETs”, IEEE Transactions on Mobile Computing, vol.18, no.1, 2018, pp .42-55.
  16. 16.
    S. Doss, A. Nayyar, G. Suseendran, S. Tanwar, A. Khanna, P. H. Thong, “APD-JFAD: accurate prevention and detection of jelly fish attack in MANET”, IEEE Access, vol 6, 2018, pp.56954-56965.
  17. 17.
    B.Paul, S.Biswas, S.Nandi, S.Chakraborty, “MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing”, Journal of Network and Computer Applications, 2018, pp.104, 1-20.
  18. 18.
    R. T. Merlin, R. Ravi, “Novel trust based energy aware routing mechanism for mitigation of black hole attacks in MANE”, Wireless Personal Communications, vol. 104, no. 4, 2019, pp.1599-1636.
  19. 19.
    M.Elhoseny, & K.Shankar, “Reliable data transmission model for mobile ad hoc network using signcryption technique”, IEEE Transactions on Reliability, vol. 69, no. 3, 2019, pp.1077-1086.
  20. 20.
    N. T. Luong, T. T. Vo, D.Hoang, “FAPRP: A machine learning approach to flooding attacks prevention routing protocol in mobile ad hoc networks”,Wireless Communications and Mobile Computing, 2019, pp.1-17.
  21. 21.
    J.Zhao, J. Huang, N.Xiong, “An effective exponential-based trust and reputation evaluation system in wireless sensor networks”, IEEE Access, vol .7, 2019, pp.33859-33869.
  22. 22.
    R. Suganthi, I. Poonguzhali, J. Navarajan, R. Krishnaveni, N. N. Saranya, “Trust based efficient routing (TER) protocol for MANETS”, Materials Today: Proceedings, 2021.
  23. 23.
    G. S. Kumar, P. R. Devi, “A novel proactive routing strategy to defend node isolation attack in MANETS”, Materials Today: Proceedings, 2021.
  24. 24.
    M. Sirajuddin, C. Rupa, C. Iwendi, C. Biamba, “TBSMR: a trust-based secure multipath routing protocol for enhancing the QoS of the mobile ad hoc network”, Security and Communication Networks, 2021, pp.1-9.
  25. 25.
    A. Mahamune, M. M. Chandane, “An efficient trust-based routing scheme against malicious communication in MANET”, International Journal of Wireless Information Networks, 2021, pp.1-18.
SCOPUS
SCImago Journal & Country Rank