SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7942
A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR
SECURE ADHOC NETWORKS
Ramya. S1 and Prof. B. Sakthivel2
ramyasiva.jothi@gmail.com and everrock17@gmail.com
1PG Student and 2Professor & Head, Department of Computer Science and Engineering
P.S.V. College of Engineering & Technology, Krishnagiri.
--------------------------------------------------------------------***-------------------------------------------------------------------
Abstract - Security issues have been stressed when versatile specially appointed systems (MANETs) are utilized into
militaryand aviation fields. In this paper, we plan a novel secure steering convention for MANETs. This convention
TAODV(Trusted AODV) broadens the generally utilized AODV (Ad hoc On demand Distance Vector) steering convention and
utilizes theidea of a trust model to secure directing practices in the system layerofMANETs.IntheTAODV,trustamonghubs is
represented by supposition, which is a thing gotten from abstract rationale. The sentiments are dynamic and refreshed
frequently as our convention particular: If one hub performs normal communications, its assessment from other hubs'
purposes of view can be expanded; something else, on the off chancethatonehubplaysoutsomeperniciouspractices,itwill be
at last denied by the entire system. A trust proposal instrument is likewise designed to trade trust data among hubs.
Key Words: AODV, MANET’s, TAODV
1. INTRODUCTION
A mobile ad hoc network (MANET) is a kind of wireless network without centralized administration or fixed
networkinfrastructure,inwhichnodesperformroutingdiscoveryandroutingmaintenanceinaself-organizedway.
Nowadays MANET enables many promising applications areas of aerospace and military. Due to some of its
characteristics such as openness, mobility, dynamic topology and protocol weaknesses, MANETs are prone to be
unstable and vulnerable. Consequently, their security issues become more urgent requirements and it is more
difficult to design and implement security solutions for MANETs than for wired networks. Many security schemes
from different aspects of MANETs have been proposed, such as secure routing protocols and secure key
management solutions. However, most of them assume centralized units or trusted third-parties to issue digital
certificates, which actually destroy the self-organization nature of MANETs. Andbyrequiringnodestorequestand
verify digital signaturesallthetime,thesesolutionsoftenbringhugecomputationoverheads.Oursolutionis,onthe
other hand, a secure routing protocol which employs the idea of a trust model so that it canavoidintroducinglarge
overheads andinfluencingthe self-organization nature of MANETs. In this paper, weapplythetrustmodelintothe
security solutions of MANETs. Our trust model is derived and modified from subjective logic, which qualitatively
defines the representation, calculation, andcombination of trust. Trust models have found securityapplicationsin
e-commerce, peer-to-peer networks, and some other distributed systems. In recent years, some research work is
conducted to apply trust models into the security solutions of MANETs. However, there are no concrete and
applicable designs proposed for the security of routing protocols in MANETs, to the best of our knowledge.
2. BACKGROUND
Subjective logic is a kind of trust model which was proposed by A. Josang. It is “a logicwhichoperatesonsubjective
beliefs about the world, and uses the term opinion to denote the representation of a subjective belief”. The trust
between two entities is then represented by opinion. An opinion can be interpreted as a probability measure
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7943
containing secondary uncertainty. In MANET, nodes move with high mobility and may experience long distancein
space among each other. Anode may be uncertain about anothernode’strustworthinessbecauseitdoesnotcollect
enough evidence. This uncertainty is a common phenomenon, therefore we need a model to represent such
uncertainty accordingly. Traditional probability model, which is also used in some trust models, cannot express
uncertainty. While in subjective logic, an opinion consists of belief, disbelief and also uncertainty, which gracefully
meets our demands. Subjective logic also provides a mapping method to transform trust representation between
the evidence space and the opinion space. Our trust model used in TAODV is then derived and modified from the
subjective logic and is more applicable for the instance of MANET. In the subjective logic, an opinion includes four
elements. The fourth one is relative atomicity. Ad hoc On-demand Distance Vector Routing Protocol Ad hoc On-
demand Distance Vector (AODV) routing protocol is one of the most popular routing protocols for MANETs. On
demand is a major characteristic of AODV, which means that a node only performs routing behaviours when it
wants to discover or check route paths towards other nodes. This will greatly increase the efficiency of routing
processes. Routing discovery and routing maintenance are two basic operations in AODV protocol. Routing
discovery happens when a node wants to communions. These mechanisms have been proposed in some previous
work, such as intrusion detection system in and watchdog technique in. Another kind of secure routing protocol
which uses cryptography technologies is recommended to take effect before nodes in the TAODV establish trust
relationships among one another and are the latest security schemes for securing MANET, which employ
cryptography technologies. We assume that the keys and certificates needed by these cryptographic technologies
have been obtained through some key management procedures.
3. OVERVIEW OF THE TRUSTED AODV (TAODV)
Network Model and Assumptions In this work, we make some assumptions and establish the network model of
TAODV. We also argue why we focus our securitysolutiononroutingprotocolinthenetworklayer.Mobilenodesin
MANETs often communicate with one another through an error-prone, bandwidth-limited, and insecure wireless
channel. We do not concern the security problem introduced by the instability of physical layer or link layer. We
only assume that: (1) Each node in the network has the ability to recover all of its neighbors; (2) Each node in the
network can broadcast some essential messages to its neighborswithhighreliability;(3)Eachnodeinthenetwork
possesses a unique ID, the physical network interfaceaddress forexamplethatcanbedistinguishedfromothers.In
the TAODV, we also assume that the system is equipped with some monitor mechanisms or intrusion detection
units either in the network layer or the application layer so that one node can observe the behaviors.
Framework of the Trusted AODV
There are mainly three modules in thewholeTAODVsystem:basicAODVroutingprotocol,trustmodel,andtrusted
AODV routing protocol. Based on our trust model, the TAODV routing protocol contains such procedures as trust
recommendation, trust combination,trustjudging,cryptographicroutingbehaviors,trustedroutingbehaviors,and
trust updating. The structure and relationship among these components are shown in Figure1. The general
procedure for establishing trust relationships among nodes and for performing routing discovery is described as
follows. Let us first imagine the beginning of an ad hoc network which contains a few nodes. Each node’s opinion
towards one another initially is (0,0,1), which means that the node does not trust or distrust another node but it is
only uncertain about another node’s trustworthiness.
4. TRUST MODEL FOR TAODV
Trust Representation Our trust model is an extension of the original trust model in subjective logic which is
introduced in Section 2. In our trust model, opinion is a 3-dimensional metric and is defined as follows:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7944
Definition 1(Opinion).Letdenoteanynode’sopinionaboutanynode’strustworthinessinaMANET,wherethefirst,
second and third component correspond to belief, disbelief and uncertainty, respectively. These three elements
satisfy:
In this definition, belief means the probability of a node can be trusted by a node, and disbelief means the
probability of cannot be trusted by. Then uncertainty fills the void in the absence of both belief and disbelief, and
sum of these three elements.
Mapping between the Evidence and Opinion Spaces A node in MANET will collect and record all the positive and
negative evidences about other nodes’ trustworthiness, which will be explained in detail in Section 5. With these
evidences we can obtain the opinion value by applying the following mapping equation which is derived from.
Definition 2 (Mapping). Let be node A’s opinion about node B’s trustworthiness in a MANET, and let p and n
respectively be the positive and negativeevidences collectedbynodeAaboutnodeB’strustworthiness,thencanbe
expressed as a function of p and n according to:
Trust Combination In our trust model, a node will collect all its neighbors opinions about another node and
combine them together using combination operations. In this way, the node can make a relatively objective
judgment about another node’s trustworthiness even in case several nodes are lying. The followings are two
combination operations nodes may adopt: Discounting Combination and Consensus Combination.
5. ROUTING OPERATIONS IN TAODV
Node Model We add three new fields into each node’s original routing table: positive events, negative events and
opinion. Positive events are the successful communication times between two nodes.Similarlynegativeeventsare
thefailedcommunicationones.Opinionmeansthisnode’sbelieftowardsanother node’strustworthinessasdefined
before. The value of opinion can be calculated according to Formula 2. These three fieldsarethemainfactorswhen
performing trusted routing. One node’s routing table can be illustrated by Figure 2, where some fields are omitted
for highlighting the main parts.
Trust Judging Rules
Before describing the process of trusted routing discovery and maintenance in detail, we predefine some trust
judging rules here andinTable1.(1)Innode’sopiniontowardsnode’strustworthiness,if thefirstcomponentbelief
of opinion is larger than 0.5,will trust and continue to perform routing related to.(2) In node’s opinion towards
node ’s trustworthiness, if the secondcomponent disbelief of opinionislargerthan0.5,willnottrust andwillrefuse
to performing routing related to. Accordingly the route entry for in routing table will be disabled anddeletedafter
an expire time.(3) In node’s opiniontowardsnode’strust worthiness,ifthethirdcomponentuncertaintyofopinion
is larger than 0.5,will request ’s digital signature when ever has interaction (or relationship) with .(4) In node’s
opinion towards node ’s trustworthiness, if the three componentsofopinionareallsmallerthanor equalto0.5,will
request ’s digital signature whenever has interaction(or relationship) with.(5)Ifnodehas norouteentryinnode’s
routing table’s opinion about is initialized as (0,0,1).
Trust Updating Policies
Opinions among nodes change dynamically with the increase of successful or failed communication times. When
and how to update trust opinions among nodes will follow some policies. We derive as follows:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7945
(1) Each time a node has performed a successful communication with another node , including forwarding route
requests or replies normally, generating route requests or route replies normally, etc., ’s successful events in’s
routing table will be increased by .
(2) Each time a node has performed a failed communication with another node including forwarding route
requests or replies abnormally, generating route requests or route replies abnormally, authenticating itself
incorrectly, and so on, ’s failed events in’s routing table will be increased by .
(3) Each time when the field of the successful or failed events changes, the corresponding value of opinion will be
recalculated using Equation 2 from the evidence space to the opinion space.
(4) If node’s route entry has been deleted from node’s route table because of expiry, or there is no ’s route entry
from the beginning, the opinion will be set to (0,0,1).
Trust Recommendation
Existing trust models seldom concern the exchange of trust information. However, it is necessary to design an
information exchange mechanism when applying the trust models into network applications. In our trust
recommendation protocol, there are three types of messages:TrustRequestMessage(TREQ),TrustReplyMessage
(TREP), and TrustWarning Message (TWARN). Nodes who issue TREQ messages are called Requestor. Those who
reply TREP messages are called Recommender.
When a node wants to know another node’s new trustworthiness, it will issue an TREQ message to its neighbors.
TREQmessage uses the above structureandleavesthefieldsofRecommender,OpinionandExpiryempty.TheType
field is set to 0. Nodes which receive the TREQ message will reply with an TREP message with the Type field set to
1. When a node believes that another node has become malicious orunreliable,itwillbroadcastaTWARNmessage
with the Type set to 2 to its neighbors.
Trusted Routing Discovery
We take AODV for example to illustrate how to perform trusted routingdiscoveryusingtheideaofourtrustmodel.
Scenario I: Beginning of A TAODV MANET—Let us consider a simple MANET which only contains 3 nodes:
Now suppose node wants to discover a route path to node. The processes of node, , and are listed below.
1. Broadcasts an RREQ requesting route path to , then begins waiting for an RREP from its neighbor .
Fig. 5.1 Broadcast Nodes
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7946
6. ANALYSIS
By introducing the idea of the trust model into our design, we are able to establish a more flexible and less
overhead secure routing protocol for MANETs. From performance point of view, our trusted routing protocol
introduces less computation overheads than other security solutions n for MANETs. This design does not need to
perform cryptographic computations in every packet, which will cause huge time and performance consumption.
After the trust relationship is established, the subsequent routing operations canbeperformedsecurelyaccording
to trust information instead of certificates all the time. Therefore, the TAODV routing protocol improves the
performanceofsecuritysolutions.Unlikesomeprevioussecurityschemes[3][4],whosebasisofroutingoperations
is “blind un-trust”, TAODVdonotdecreasetheefficiencyofroutingdiscovery andmaintenance.Fromsecuritypoint
of view, our design will detect nodes’ misbehavior finally and reduce the harms to the minimum extent. When a
good node is compromised and becomes a bad one, its misbehavior willbedetectedbyitsneighbors.Thenwith the
help of trust update algorithm, the opinions from the other nodes to this node will be updated shortly. Thus this
node will be denied access to the network.
7. CONCLUSION AND FUTURE WORK
This paper is the first to apply the idea of a trust model in subjective logic into the security solutions of MANETs.
The trust and trust relationship among nodes can be represented, calculated and combined using an item opinion.
In our TAODV routing protocol, nodes can cooperate together to obtain an objective opinion about another node’s
trustworthiness. They can also perform trusted routing behaviors according to the trustrelationshipamongthem.
With an opinion threshold, nodes can flexibly choose whether and how to perform cryptographic operations.
Therefore, the computational overheads are reduced without the need of requesting and verifying certificates at
every routing operation. In summary, our trustedAODVroutingprotocolisamorelight-weightedbutmoreflexible
security solution than other cryptography and authentication designs.
REFERENCES
[1] S. Corson and J. Macker, “Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation
considerations (rfc2501),” January 1999, http://www.ietf.org/rfc/rfc2501.txt.
[2] C. E. Perkins, Ed., Ad Hoc Networking. Boston: Addison-Wesley, 2001.
[3] Y. Teng, V. V. Phoha, and B. Choi, “Design of trust metrics based on dempster-shafer theory,”
http://citeseer.nj.nec.com/461538.html.
[4] E. Gray, J.-M. Seigneur, Y. Chen, and C. Jensen, “Trust propagation in small worlds,” in Proceedings of the 1st
International
Conference on Trust Management, 2002, http://citeseer.nj.nec.com/575876.html.
[5] A. Abdul-Rahman and S. Halles, “A distributed trust model,” in Proceedings of New SecurityParadigms Workshop ’97, 1997, pp.
48–60.

Weitere ähnliche Inhalte

Was ist angesagt?

MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
 
Defending Man In The Middle Attacks
Defending Man In The Middle AttacksDefending Man In The Middle Attacks
Defending Man In The Middle AttacksIRJET Journal
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkIRJET Journal
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...IJCNCJournal
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...ijcisjournal
 
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...IJNSA Journal
 
A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETIJNSA Journal
 
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...IJMER
 
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET Journal
 
An explicit trust model towards better system security
An explicit trust model towards better system securityAn explicit trust model towards better system security
An explicit trust model towards better system securitycsandit
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...IJECEIAES
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 

Was ist angesagt? (19)

Fv3510271037
Fv3510271037Fv3510271037
Fv3510271037
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
 
Defending Man In The Middle Attacks
Defending Man In The Middle AttacksDefending Man In The Middle Attacks
Defending Man In The Middle Attacks
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
 
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
 
A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANET
 
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
 
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
 
An explicit trust model towards better system security
An explicit trust model towards better system securityAn explicit trust model towards better system security
An explicit trust model towards better system security
 
Proj264
Proj264Proj264
Proj264
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
40120140506010
4012014050601040120140506010
40120140506010
 

Ähnlich wie IRJET- A Confidence Model based Routing Practice for Secure Adhoc Networks

Trust based security in manet
Trust based security in manetTrust based security in manet
Trust based security in maneteSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESIAEME Publication
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESIAEME Publication
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentIRJET Journal
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...CSEIJJournal
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...cseij
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...sunda2011
 
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...IJCNCJournal
 
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...IJCNCJournal
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET Journal
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...IRJET Journal
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET Journal
 
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...rahulmonikasharma
 

Ähnlich wie IRJET- A Confidence Model based Routing Practice for Secure Adhoc Networks (20)

Trust based security in manet
Trust based security in manetTrust based security in manet
Trust based security in manet
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
 
A017320105
A017320105A017320105
A017320105
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
K1803046067
K1803046067K1803046067
K1803046067
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
 
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
 
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
 
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 

Kürzlich hochgeladen (20)

Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 

IRJET- A Confidence Model based Routing Practice for Secure Adhoc Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7942 A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS Ramya. S1 and Prof. B. Sakthivel2 ramyasiva.jothi@gmail.com and everrock17@gmail.com 1PG Student and 2Professor & Head, Department of Computer Science and Engineering P.S.V. College of Engineering & Technology, Krishnagiri. --------------------------------------------------------------------***------------------------------------------------------------------- Abstract - Security issues have been stressed when versatile specially appointed systems (MANETs) are utilized into militaryand aviation fields. In this paper, we plan a novel secure steering convention for MANETs. This convention TAODV(Trusted AODV) broadens the generally utilized AODV (Ad hoc On demand Distance Vector) steering convention and utilizes theidea of a trust model to secure directing practices in the system layerofMANETs.IntheTAODV,trustamonghubs is represented by supposition, which is a thing gotten from abstract rationale. The sentiments are dynamic and refreshed frequently as our convention particular: If one hub performs normal communications, its assessment from other hubs' purposes of view can be expanded; something else, on the off chancethatonehubplaysoutsomeperniciouspractices,itwill be at last denied by the entire system. A trust proposal instrument is likewise designed to trade trust data among hubs. Key Words: AODV, MANET’s, TAODV 1. INTRODUCTION A mobile ad hoc network (MANET) is a kind of wireless network without centralized administration or fixed networkinfrastructure,inwhichnodesperformroutingdiscoveryandroutingmaintenanceinaself-organizedway. Nowadays MANET enables many promising applications areas of aerospace and military. Due to some of its characteristics such as openness, mobility, dynamic topology and protocol weaknesses, MANETs are prone to be unstable and vulnerable. Consequently, their security issues become more urgent requirements and it is more difficult to design and implement security solutions for MANETs than for wired networks. Many security schemes from different aspects of MANETs have been proposed, such as secure routing protocols and secure key management solutions. However, most of them assume centralized units or trusted third-parties to issue digital certificates, which actually destroy the self-organization nature of MANETs. Andbyrequiringnodestorequestand verify digital signaturesallthetime,thesesolutionsoftenbringhugecomputationoverheads.Oursolutionis,onthe other hand, a secure routing protocol which employs the idea of a trust model so that it canavoidintroducinglarge overheads andinfluencingthe self-organization nature of MANETs. In this paper, weapplythetrustmodelintothe security solutions of MANETs. Our trust model is derived and modified from subjective logic, which qualitatively defines the representation, calculation, andcombination of trust. Trust models have found securityapplicationsin e-commerce, peer-to-peer networks, and some other distributed systems. In recent years, some research work is conducted to apply trust models into the security solutions of MANETs. However, there are no concrete and applicable designs proposed for the security of routing protocols in MANETs, to the best of our knowledge. 2. BACKGROUND Subjective logic is a kind of trust model which was proposed by A. Josang. It is “a logicwhichoperatesonsubjective beliefs about the world, and uses the term opinion to denote the representation of a subjective belief”. The trust between two entities is then represented by opinion. An opinion can be interpreted as a probability measure
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7943 containing secondary uncertainty. In MANET, nodes move with high mobility and may experience long distancein space among each other. Anode may be uncertain about anothernode’strustworthinessbecauseitdoesnotcollect enough evidence. This uncertainty is a common phenomenon, therefore we need a model to represent such uncertainty accordingly. Traditional probability model, which is also used in some trust models, cannot express uncertainty. While in subjective logic, an opinion consists of belief, disbelief and also uncertainty, which gracefully meets our demands. Subjective logic also provides a mapping method to transform trust representation between the evidence space and the opinion space. Our trust model used in TAODV is then derived and modified from the subjective logic and is more applicable for the instance of MANET. In the subjective logic, an opinion includes four elements. The fourth one is relative atomicity. Ad hoc On-demand Distance Vector Routing Protocol Ad hoc On- demand Distance Vector (AODV) routing protocol is one of the most popular routing protocols for MANETs. On demand is a major characteristic of AODV, which means that a node only performs routing behaviours when it wants to discover or check route paths towards other nodes. This will greatly increase the efficiency of routing processes. Routing discovery and routing maintenance are two basic operations in AODV protocol. Routing discovery happens when a node wants to communions. These mechanisms have been proposed in some previous work, such as intrusion detection system in and watchdog technique in. Another kind of secure routing protocol which uses cryptography technologies is recommended to take effect before nodes in the TAODV establish trust relationships among one another and are the latest security schemes for securing MANET, which employ cryptography technologies. We assume that the keys and certificates needed by these cryptographic technologies have been obtained through some key management procedures. 3. OVERVIEW OF THE TRUSTED AODV (TAODV) Network Model and Assumptions In this work, we make some assumptions and establish the network model of TAODV. We also argue why we focus our securitysolutiononroutingprotocolinthenetworklayer.Mobilenodesin MANETs often communicate with one another through an error-prone, bandwidth-limited, and insecure wireless channel. We do not concern the security problem introduced by the instability of physical layer or link layer. We only assume that: (1) Each node in the network has the ability to recover all of its neighbors; (2) Each node in the network can broadcast some essential messages to its neighborswithhighreliability;(3)Eachnodeinthenetwork possesses a unique ID, the physical network interfaceaddress forexamplethatcanbedistinguishedfromothers.In the TAODV, we also assume that the system is equipped with some monitor mechanisms or intrusion detection units either in the network layer or the application layer so that one node can observe the behaviors. Framework of the Trusted AODV There are mainly three modules in thewholeTAODVsystem:basicAODVroutingprotocol,trustmodel,andtrusted AODV routing protocol. Based on our trust model, the TAODV routing protocol contains such procedures as trust recommendation, trust combination,trustjudging,cryptographicroutingbehaviors,trustedroutingbehaviors,and trust updating. The structure and relationship among these components are shown in Figure1. The general procedure for establishing trust relationships among nodes and for performing routing discovery is described as follows. Let us first imagine the beginning of an ad hoc network which contains a few nodes. Each node’s opinion towards one another initially is (0,0,1), which means that the node does not trust or distrust another node but it is only uncertain about another node’s trustworthiness. 4. TRUST MODEL FOR TAODV Trust Representation Our trust model is an extension of the original trust model in subjective logic which is introduced in Section 2. In our trust model, opinion is a 3-dimensional metric and is defined as follows:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7944 Definition 1(Opinion).Letdenoteanynode’sopinionaboutanynode’strustworthinessinaMANET,wherethefirst, second and third component correspond to belief, disbelief and uncertainty, respectively. These three elements satisfy: In this definition, belief means the probability of a node can be trusted by a node, and disbelief means the probability of cannot be trusted by. Then uncertainty fills the void in the absence of both belief and disbelief, and sum of these three elements. Mapping between the Evidence and Opinion Spaces A node in MANET will collect and record all the positive and negative evidences about other nodes’ trustworthiness, which will be explained in detail in Section 5. With these evidences we can obtain the opinion value by applying the following mapping equation which is derived from. Definition 2 (Mapping). Let be node A’s opinion about node B’s trustworthiness in a MANET, and let p and n respectively be the positive and negativeevidences collectedbynodeAaboutnodeB’strustworthiness,thencanbe expressed as a function of p and n according to: Trust Combination In our trust model, a node will collect all its neighbors opinions about another node and combine them together using combination operations. In this way, the node can make a relatively objective judgment about another node’s trustworthiness even in case several nodes are lying. The followings are two combination operations nodes may adopt: Discounting Combination and Consensus Combination. 5. ROUTING OPERATIONS IN TAODV Node Model We add three new fields into each node’s original routing table: positive events, negative events and opinion. Positive events are the successful communication times between two nodes.Similarlynegativeeventsare thefailedcommunicationones.Opinionmeansthisnode’sbelieftowardsanother node’strustworthinessasdefined before. The value of opinion can be calculated according to Formula 2. These three fieldsarethemainfactorswhen performing trusted routing. One node’s routing table can be illustrated by Figure 2, where some fields are omitted for highlighting the main parts. Trust Judging Rules Before describing the process of trusted routing discovery and maintenance in detail, we predefine some trust judging rules here andinTable1.(1)Innode’sopiniontowardsnode’strustworthiness,if thefirstcomponentbelief of opinion is larger than 0.5,will trust and continue to perform routing related to.(2) In node’s opinion towards node ’s trustworthiness, if the secondcomponent disbelief of opinionislargerthan0.5,willnottrust andwillrefuse to performing routing related to. Accordingly the route entry for in routing table will be disabled anddeletedafter an expire time.(3) In node’s opiniontowardsnode’strust worthiness,ifthethirdcomponentuncertaintyofopinion is larger than 0.5,will request ’s digital signature when ever has interaction (or relationship) with .(4) In node’s opinion towards node ’s trustworthiness, if the three componentsofopinionareallsmallerthanor equalto0.5,will request ’s digital signature whenever has interaction(or relationship) with.(5)Ifnodehas norouteentryinnode’s routing table’s opinion about is initialized as (0,0,1). Trust Updating Policies Opinions among nodes change dynamically with the increase of successful or failed communication times. When and how to update trust opinions among nodes will follow some policies. We derive as follows:
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7945 (1) Each time a node has performed a successful communication with another node , including forwarding route requests or replies normally, generating route requests or route replies normally, etc., ’s successful events in’s routing table will be increased by . (2) Each time a node has performed a failed communication with another node including forwarding route requests or replies abnormally, generating route requests or route replies abnormally, authenticating itself incorrectly, and so on, ’s failed events in’s routing table will be increased by . (3) Each time when the field of the successful or failed events changes, the corresponding value of opinion will be recalculated using Equation 2 from the evidence space to the opinion space. (4) If node’s route entry has been deleted from node’s route table because of expiry, or there is no ’s route entry from the beginning, the opinion will be set to (0,0,1). Trust Recommendation Existing trust models seldom concern the exchange of trust information. However, it is necessary to design an information exchange mechanism when applying the trust models into network applications. In our trust recommendation protocol, there are three types of messages:TrustRequestMessage(TREQ),TrustReplyMessage (TREP), and TrustWarning Message (TWARN). Nodes who issue TREQ messages are called Requestor. Those who reply TREP messages are called Recommender. When a node wants to know another node’s new trustworthiness, it will issue an TREQ message to its neighbors. TREQmessage uses the above structureandleavesthefieldsofRecommender,OpinionandExpiryempty.TheType field is set to 0. Nodes which receive the TREQ message will reply with an TREP message with the Type field set to 1. When a node believes that another node has become malicious orunreliable,itwillbroadcastaTWARNmessage with the Type set to 2 to its neighbors. Trusted Routing Discovery We take AODV for example to illustrate how to perform trusted routingdiscoveryusingtheideaofourtrustmodel. Scenario I: Beginning of A TAODV MANET—Let us consider a simple MANET which only contains 3 nodes: Now suppose node wants to discover a route path to node. The processes of node, , and are listed below. 1. Broadcasts an RREQ requesting route path to , then begins waiting for an RREP from its neighbor . Fig. 5.1 Broadcast Nodes
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7946 6. ANALYSIS By introducing the idea of the trust model into our design, we are able to establish a more flexible and less overhead secure routing protocol for MANETs. From performance point of view, our trusted routing protocol introduces less computation overheads than other security solutions n for MANETs. This design does not need to perform cryptographic computations in every packet, which will cause huge time and performance consumption. After the trust relationship is established, the subsequent routing operations canbeperformedsecurelyaccording to trust information instead of certificates all the time. Therefore, the TAODV routing protocol improves the performanceofsecuritysolutions.Unlikesomeprevioussecurityschemes[3][4],whosebasisofroutingoperations is “blind un-trust”, TAODVdonotdecreasetheefficiencyofroutingdiscovery andmaintenance.Fromsecuritypoint of view, our design will detect nodes’ misbehavior finally and reduce the harms to the minimum extent. When a good node is compromised and becomes a bad one, its misbehavior willbedetectedbyitsneighbors.Thenwith the help of trust update algorithm, the opinions from the other nodes to this node will be updated shortly. Thus this node will be denied access to the network. 7. CONCLUSION AND FUTURE WORK This paper is the first to apply the idea of a trust model in subjective logic into the security solutions of MANETs. The trust and trust relationship among nodes can be represented, calculated and combined using an item opinion. In our TAODV routing protocol, nodes can cooperate together to obtain an objective opinion about another node’s trustworthiness. They can also perform trusted routing behaviors according to the trustrelationshipamongthem. With an opinion threshold, nodes can flexibly choose whether and how to perform cryptographic operations. Therefore, the computational overheads are reduced without the need of requesting and verifying certificates at every routing operation. In summary, our trustedAODVroutingprotocolisamorelight-weightedbutmoreflexible security solution than other cryptography and authentication designs. REFERENCES [1] S. Corson and J. Macker, “Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations (rfc2501),” January 1999, http://www.ietf.org/rfc/rfc2501.txt. [2] C. E. Perkins, Ed., Ad Hoc Networking. Boston: Addison-Wesley, 2001. [3] Y. Teng, V. V. Phoha, and B. Choi, “Design of trust metrics based on dempster-shafer theory,” http://citeseer.nj.nec.com/461538.html. [4] E. Gray, J.-M. Seigneur, Y. Chen, and C. Jensen, “Trust propagation in small worlds,” in Proceedings of the 1st International Conference on Trust Management, 2002, http://citeseer.nj.nec.com/575876.html. [5] A. Abdul-Rahman and S. Halles, “A distributed trust model,” in Proceedings of New SecurityParadigms Workshop ’97, 1997, pp. 48–60.