SlideShare a Scribd company logo
1 of 10
Download to read offline
Rupak Bhattacharyya et al. (Eds) : ACER 2013,
pp. 295–304, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3228
TRUST ASSESSMENT THROUGH FTA
APPROACH IN AD-HOC NETWORK
Ananya Banerjee1
, Sutanu Ghosh2
and Anirban Neogi3
1,2,3
Dr.Sudhir Chandra Sur Degree Engineering College; Kolkata 700074.
ananya.banerjeee@gmail.com,sutanu99@gmail.com,
anirban_neogi@yahoo.com
ABSTRACT
An Ad-hoc network consists of communicating nodes to establish improvised communication
with environment without any fixed infrastructure. Nodes in Ad-hoc network (MANET) do not
rely on a central infrastructure management but relay packets sent by other nodes. Mobile ad-
hoc network can work properly only if the participating nodes collaborate with routing.
Therefore it is required that the nodes co-operate for the intensity of operator network. Because
of the high mobility of the nodes in the network, detection of misbehaviour of any node is a
complex problem. Nodes have to share the routing information in order for each to find the
route to the destination. This conceptual paper is based on the relationship among the nodes
which makes them to co-operate in an ad-hoc network .This require nodes to Trust each other.
Thus we can say Trust is a important concept in secure routing mechanism among the nodes. In
this paper we present a unique Trust based method in which each node broadcast a RQ packet if
it is received from different neighbours. The secure, efficient and reliable route towards the
destination is calculated as a weighted average of the Trust value of the nodes in the route, with
respect to it’s behaviour observed by the neighbour nodes and the number of nodes in the route.
KEYWORDS
DSR, Trust enhancement, correlation among neighbour nodes, malicious nodes, throughput,
FTA, OPI, routing overhead.
1. INTRODUCTION
The nodes are usually mobile portable devices, self organised and any sort of end to end
communication between them requires routing of information via several intermediate nodes. A
mobile ad-hoc network (MANET) is the collection of wireless mobile nodes to establish a
temporary connection neither in a predefined way nor using a static network structure. Due to the
lack of infrastructure and limited transmission facility of a node in a mobile ad-hoc network, a
node has to rely on neighbour nodes to send a packet to the destination. Since routing is a basic
service in such network and a prerequisite for other services, it has to be reliable and trustworthy.
Recently, the routing protocols for mobile ad hoc network, such as DSR and AODV are based on
the assumption that all nodes will co-operate. Without co-operation no packet can be forwarded
to the desired destination and hence no proper routing is possible.
There are two types of non co-operative nodes can be classified: i) faulty or malicious node and
ii) selfish node. Both of these are misbehaved nodes. Misbehaviour means to attempt the
benefits from other nodes but to refuse to share it’s resources. So with these misbehaved nodes
both DSR and AODV may not result the proper routing. Enforcing the co-operation among the
296 Computer Science & Information Technology (CS & IT)
mobile nodes is particularly challenging which may solve for many routing issues. In this paper a
modified approach for optimising the routing protocol through assessing the trust level between
nodes is introduced. Different scenarios are identified and are combined simulated to determine if
anode is action maliciously or not.
2. EARLIER WORK FOR TRUST ENHANCED ROUTE FOR AD-HOC NETWORKS
In the DSR protocol, DSR routing model faces some security problems, those are given below:
a) Through the non jam-packed route, RQ packets reach the destination very soon rather than the
jam packed route. So jam-packed route can be avoided. But there is a problem that is a shorter
path may present within the jam-packed route which may not be utilised.
b) The one hop neighbour sends RQ packets to the destination end , just after receiving 1st
RQ.As
a result most of the packets from the other nodes(far from destination node) are discarded.
c) A node, after receiving RQ packet, checks it and drops it if it is previously processed. As a
result a malicious node forwards that RQ very quickly, then the other RQ packets from the
other nodes, are dropped.
d) Sometimes malicious node hampers good traffic operation in an ad-hoc network by disturbing
route error information, routing table, routing state etc.
In order to solve these above mentioned problems and to establish a robust secure reliable path
from source to destination without falsification of route and information packet we are going to
introduce Trust Enhancement Route scheme for ad-hoc network.
Trust value: Reliability, of a node with respected to its neighbour node can be represented by a
parameter, called trust value of a node in a network. An initial Trust value is assigned for
neighbour node which is encountered for the 1st
time. Initialisation of assignment of the initial
trust value of the neighbour nodes including malicious nodes can be done by the trust values of
known neighbour nodes. Actually a Trust value depends upon the experience of given node.
Up gradation of trust value: The Trust value for a neighbour node will be upgraded, when a node
gets the RP packet from this neighbour node. So there should be a function to upgrade the Trust
value:
T(next)=K[T(previous)-Ex]+Ex.
Where, T(next)=New upgraded Trust value. T(previous)=previous Trust value, Ex = value of
experience, K = constant
There are two sub modules under this module:
• Administrator module which is use to accumulate Trust information of the known nodes.
It acts as a interface between DSR protocol and previous modules.
• Router module selects the most reliable path having lowest number of malicious nodes,
depending upon the Intimacy of a node with its neighbour nodes.
•
De gradation of trust value: If the RP packet is not received, the Trust value for this neighbour
node has to be de graded.
Computer Science & Information Technology (CS & IT) 297
Establishment of the co-relation of the neighbour nodes:
If the trust value of the neighbour node is greater than a threshold value then that node is a known
node for the source node, otherwise it is an unknown node for the source node. This threshold
value can be represented by a numerical value i.e., 0.5.
This known node is classified into two categories i) Completely known and ii) Moderately
known.
Table 1. Co-relation table
Relation with source Trust value Transaction type
Completely known
node
Tc: 0.75<T<=1 Plenty of reception RP and transmission RQ of
packets
Moderately known
node
Tm: 0.5<=T<0.75 Few transaction
Unknown node /
Malicious node
Tu: 0<=T<0.5 No transaction
When Trust value of a known node is greater than 0.5 and less than 0.75 then this is a moderately
known node. That means the transaction between the source node and this neighbour node is
performed moderately. And when Trust value of a known node is greater than 0.75 and less than
1 then this is a completely known node. That means lots of transaction are performed between
source and this neighbour node.
2.1. For reliable transaction
First of all we should recognise the malicious node which is responsible to falsify the path
detection and the information, to secure the transaction we can follow the above mentioned co-
relation table. During source to destination data transmission we should include the important
field that is Trust field at the header part of the framed packet along with the payload.
For one –way propagation there is a timer, Td =2*R/s+K.
Where R = maximum range for sending data.
s = speed of data which is transmitted.
K = constant.
After every RQ packet reception by a neighbour node, the Trust field of the data is updated by
using a formula
Trust field (new) =Trust field (previous) + Txy (when x node receives the broadcasted data of
node y).
Similarly when the destination node receives the packet which is sent by the source and reaches at
the destination through a reliable, shorted route, another trust field should be introduced at the
header of RP packet, which will be transmitted to the source. For forward direction Trust field is
denoted by Tf and for the reverse direction Trust field is denoted by Tr.
298 Computer Science & Information Technology (CS & IT)
2.2. Total transaction
Fig. 1 : A Network
In a DSR network we consider source S sends data to the destination end D.In this Fig.1 S sends
RQ packet to all the neighbours. A communication between S and C is shown here. In
transmission path the packets routed through S, G, D and C and in reverse path it is routed
through C, B, A and S. Nodes with Tf field along with the header to discover a secure path to
destination. After selection of the secure, shortest path, let S sends packet through the path S, G,
D and C to the destination end. Each and every intermediate node upgrades its Trust field by
involving Trust values of the node from where it receives the packet. From source to destination
RQ packet transmission the total Trust value has to be:
Tf(total) = T(AS)+T(BA)+T(CB)+T(DC).
After reception of the data packet from the source end, D sends an acknowledgement through a
reliable path, therefore like an S node; D node also checks the Trust values of neighbour nodes
within its path to source. So for RP packets the total reverse direction Trust value has to be:
Tr(total) = T(CD)+T(BC)+T(AB)+T(SA).
So for total transaction (From source to destination and destination to source), the total trust value
can be calculated as
T=[{Tf(total)+Tr(total)}/2]*Si=[{T(AS)+T(BA)+T(CB)+T(DC)+
T(CD)+T(BC)+T(AB)+T(SA)}/2]*Si.
X
Where, Si=1/xi / ∑1/xi, for ith
possible path
i=1
Therefore from the above expression of T all nodes have mutual Trust information within the
path from source to destination.
3. PERFORMANCE ANALYSIS IN OUR PREVIOUS WORK
We have used network simulator 2, a simulator for mobile Ad-hoc network to evaluate the
effectiveness of the proposed scheme. The simulator is done with 25 nodes moving with speeds 1,
5, 10, 15, 20 m/s in a 400x400 sq.m. area. The pause time is 10 ms between the movements of the
nodes. The transmission range of the each node is 100 m. We assume that there are 0-40%
malicious nodes in the network.
To analyze the Performance of the proposed scheme we use the following metrics:
Computer Science & Information Technology (CS & IT)
Routing Overhead: It is define as the number of RQ packets transferred taken to find a secure
path from source to destination, in the presence of malicious nodes.
Throughput: It is the ratio of the number of data packets re
number of packets sent by the source node.
The performance of the proposed scheme is compared with standard DSR protocol by varying the
number of malicious nodes and node moving speed. For performance analysi
parameters-
i) Routing overhead, ii) dropping
Fig. 2: Comparative graph of Throughput of T
In fig 2 the achieved throughput is
Fig. 3: Comparative graph of Routing overhead of T
The next observing parameter
standard DSR.
Computer Science & Information Technology (CS & IT)
It is define as the number of RQ packets transferred taken to find a secure
path from source to destination, in the presence of malicious nodes.
It is the ratio of the number of data packets received by the destination node to the
number of packets sent by the source node.
The performance of the proposed scheme is compared with standard DSR protocol by varying the
number of malicious nodes and node moving speed. For performance analysis we have used three
dropping of malicious nodes, iii) Throughput.
Comparative graph of Throughput of T-DSR and DSR with respect to number of malicious node
the achieved throughput is clearly greater than the standard DSR.
Fig. 3: Comparative graph of Routing overhead of T-DSR and DSR with respect to number of malicious
nodes
The next observing parameter is Routing Overhead, which is clearly high compared to the
299
It is define as the number of RQ packets transferred taken to find a secure
ceived by the destination node to the
The performance of the proposed scheme is compared with standard DSR protocol by varying the
have used three
DSR and DSR with respect to number of malicious nodes
DSR and DSR with respect to number of malicious
compared to the
300 Computer Science & Information Technology (CS & IT)
Fig. 4: Comparative graph of dropping malicious node of T
Fig. 4 shows the dropping of malicious node
case of Trust Enhancement scheme compared to standard DSR.
4. OVERVIEW OF THE FTA
Trust Level in an ad-hoc network serves the reliability of nodes during data packets transmission
from source to destination through a most reliable path.
fuzzy logic to evaluate trust value of the nodes, and at the same time this a
recognise the malicious nodes in the network.
The input parameters of FTA are a) number of replay attacks, b) forwarded packets
destination, c) number of untruthful routing message, d
In the undiscovered route if P (source) wants to send information packets to the Q (destination
end), path discovery should be done on
its neighbouring nodes, those are responsible to find out the trust
Here we consider the minimum trust level of k
To choose most reliable path from P to Q,
after sending a RQ, P node can g
routing protocol, the nodes which are not included in a selected path will not participate in
routing table. Destination IP
information next hop should be included in FTA table.
When P starts to send a message to Q it starts to initiate a valid path between them by sending a
signal RQ to its neighbours. the RQ consists of P’s IP address, its sequence no., its current trust
value, hop count and life span .To with when the sequence no. is unknown the sequence no. flag
must be set to some initial value and the hop coun
node the hop-count of RQ packet is increased by 1, and the hopping information
initialisation of the valid path between P and Q is updated. In the same way the trust
current node is compared with the previous one and updates
of originator RQ packet. In this way in each c
greater than the previous one the RQ
In order to establish a reverse path each intermediate node records the address of neighbours from
which they receive packets. Once
Computer Science & Information Technology (CS & IT)
ative graph of dropping malicious node of T-DSR and DSR
shows the dropping of malicious nodes over total drops. The amount of dropping is less in
case of Trust Enhancement scheme compared to standard DSR.
FTA
hoc network serves the reliability of nodes during data packets transmission
from source to destination through a most reliable path. So we propose an algorithm based on
fuzzy logic to evaluate trust value of the nodes, and at the same time this algorithm is used to
recognise the malicious nodes in the network.
The input parameters of FTA are a) number of replay attacks, b) forwarded packets
of untruthful routing message, d) number of dropped packets.
(source) wants to send information packets to the Q (destination
ath discovery should be done on demand. First of all P sends RQ (route request signal) to
its neighbouring nodes, those are responsible to find out the trust values of their next hop nodes.
Here we consider the minimum trust level of kth
node in nth
route, is Tnk where k ϵ (1,….n).
To choose most reliable path from P to Q, FTA uses the trust values of nodes. In this protocol,
after sending a RQ, P node can get more than one RP .Because of the source initiated on
routing protocol, the nodes which are not included in a selected path will not participate in
routing table. Destination IP address, sequence no. flag, trust level, and hop count and
n next hop should be included in FTA table.
When P starts to send a message to Q it starts to initiate a valid path between them by sending a
signal RQ to its neighbours. the RQ consists of P’s IP address, its sequence no., its current trust
unt and life span .To with when the sequence no. is unknown the sequence no. flag
must be set to some initial value and the hop count may be considered as 0.At the
count of RQ packet is increased by 1, and the hopping information
of the valid path between P and Q is updated. In the same way the trust
current node is compared with the previous one and updates the trust parameter in the trust field
of originator RQ packet. In this way in each comparison whenever the present trust level is
greater than the previous one the RQ packet is updated and hence moves towards a valid path.
In order to establish a reverse path each intermediate node records the address of neighbours from
packets. Once RQ reaches the destination Q, a RP packet is generated and
of dropping is less in
hoc network serves the reliability of nodes during data packets transmission
So we propose an algorithm based on
lgorithm is used to
The input parameters of FTA are a) number of replay attacks, b) forwarded packets to the wrong
of dropped packets.
(source) wants to send information packets to the Q (destination
First of all P sends RQ (route request signal) to
values of their next hop nodes.
(1,….n).
nodes. In this protocol,
et more than one RP .Because of the source initiated on-demand
routing protocol, the nodes which are not included in a selected path will not participate in
sequence no. flag, trust level, and hop count and
When P starts to send a message to Q it starts to initiate a valid path between them by sending a
signal RQ to its neighbours. the RQ consists of P’s IP address, its sequence no., its current trust
unt and life span .To with when the sequence no. is unknown the sequence no. flag
t may be considered as 0.At the intermediate
count of RQ packet is increased by 1, and the hopping information towards the
of the valid path between P and Q is updated. In the same way the trust level at the
the trust parameter in the trust field
omparison whenever the present trust level is
towards a valid path.
In order to establish a reverse path each intermediate node records the address of neighbours from
RQ reaches the destination Q, a RP packet is generated and
Computer Science & Information Technology (CS & IT)
travels though the reverse path.
count value by 1since RP is moving through a reverse path, when RP reaches the source, the hop
count indicates the double distance between the P and Q. The source sequence number in RP is
compared with destination sequence number and compared at
current trust value. The minimum value represents the trust level of the route. FTA now picks the
route with highest trust level as the most reliable path between P and
5. PERFORMANCE ANALYSIS
We have started our analysis with the same network as in our earlier paper. We have used
OPNER modeller V11.5 for the simulation.
within AODV routing protocol is considered. The simulation process consists of no. of scenarios
producing practical configuration. Every scenario runs in 5 different c
none of the above 25 nodes acts maliciously or 10 or 15 of them are acting maliciously and so on.
We also have considered the malicious nodes drop packets within the simulation time. In our case
each malicious nodes are dropping packets in between 50 and
simulation is done within the span of 300 seconds. We also have said the condition that for the
60 seconds the nodes move randomly with a speed 10 meter /sec, after that in
seconds they come back to their
We choose our scenarios such that station _1 sends traffic to station _25.To study of the effects of
the malicious node three performance matrix will be measured for their above mentioned
scenarios namely Throughput (T),
performance of different approaches we define overall performance index defined as,
OPI=WT*T+WD*D+WDl*Dl where Dl represents round trip delay and W’s represents
corresponding weights.
The distribution of the weights can defer from one
and video based application the weight for packet loss should have the highest value. In our case
to study the ADHOC network we choose W
Computer Science & Information Technology (CS & IT)
travels though the reverse path. Whenever an intermediate node receives RP it increases the hop
count value by 1since RP is moving through a reverse path, when RP reaches the source, the hop
count indicates the double distance between the P and Q. The source sequence number in RP is
red with destination sequence number and compared at each node in order to conclude
current trust value. The minimum value represents the trust level of the route. FTA now picks the
as the most reliable path between P and Q.
NALYSIS OF TRUST LEVEL USING FTA
We have started our analysis with the same network as in our earlier paper. We have used
simulation. One wireless LAN with 25 nodes with speed 11
is considered. The simulation process consists of no. of scenarios
producing practical configuration. Every scenario runs in 5 different configurations. For example
none of the above 25 nodes acts maliciously or 10 or 15 of them are acting maliciously and so on.
We also have considered the malicious nodes drop packets within the simulation time. In our case
each malicious nodes are dropping packets in between 50 and 100 seconds where as the total
simulation is done within the span of 300 seconds. We also have said the condition that for the
seconds the nodes move randomly with a speed 10 meter /sec, after that in duration
seconds they come back to their initial position.
Fig. 5: Experimental Scenario
We choose our scenarios such that station _1 sends traffic to station _25.To study of the effects of
the malicious node three performance matrix will be measured for their above mentioned
(T), Routing overhead (R) and Drop of packet (D).To compare the
performance of different approaches we define overall performance index defined as,
*Dl where Dl represents round trip delay and W’s represents
the weights can defer from one application to other, as an example for voice
and video based application the weight for packet loss should have the highest value. In our case
to study the ADHOC network we choose WT= Wd=25 and WDl=50.
301
Whenever an intermediate node receives RP it increases the hop
count value by 1since RP is moving through a reverse path, when RP reaches the source, the hop-
count indicates the double distance between the P and Q. The source sequence number in RP is
each node in order to conclude the
current trust value. The minimum value represents the trust level of the route. FTA now picks the
We have started our analysis with the same network as in our earlier paper. We have used
One wireless LAN with 25 nodes with speed 11Mbps
is considered. The simulation process consists of no. of scenarios
onfigurations. For example,
none of the above 25 nodes acts maliciously or 10 or 15 of them are acting maliciously and so on.
We also have considered the malicious nodes drop packets within the simulation time. In our case
100 seconds where as the total
simulation is done within the span of 300 seconds. We also have said the condition that for the 1st
duration of 20
We choose our scenarios such that station _1 sends traffic to station _25.To study of the effects of
the malicious node three performance matrix will be measured for their above mentioned
(D).To compare the
performance of different approaches we define overall performance index defined as,
*Dl where Dl represents round trip delay and W’s represents
application to other, as an example for voice
and video based application the weight for packet loss should have the highest value. In our case
302 Computer Science & Information Technology (CS & IT)
6. RESULTS AND ANALYSIS
The variation of the Throughput, Routing overheads and Drop of packets are
individually .in all the cases the performances are improved with FTA approach. In figure 5 it can
be seen that T is improved by around 30% .Whereas the route over head is improved only 8
because the network consists of 25 nodes. If the no. of node r
improved up to 20-25%.The packet loss is maximum when all node starts to behave maliciously
but it remain almost same in comparison with DSR and T
comparison between TDSR and FTA to establish the
Table 2.
Fig. 6: Comparative graph of Throughput
In this figure throughput is better for FTA. The throughput of DSR decreases so fast than other
two protocols.
Fig. 7: Comparative graph of Routing Overhead of DSR,
Parameters
Drop of packets
OPI
Computer Science & Information Technology (CS & IT)
NALYSIS
The variation of the Throughput, Routing overheads and Drop of packets are
individually .in all the cases the performances are improved with FTA approach. In figure 5 it can
be seen that T is improved by around 30% .Whereas the route over head is improved only 8
because the network consists of 25 nodes. If the no. of node reduced down to 5,
25%.The packet loss is maximum when all node starts to behave maliciously
but it remain almost same in comparison with DSR and T-DSR. The following table makes a
comparison between TDSR and FTA to establish the improvement of our proposed scheme.
Table 2. Comparative table of TDSR and FTA
Fig. 6: Comparative graph of Throughput of DSR, T-DSR and FTA with respect to number of malicious
nodes
throughput is better for FTA. The throughput of DSR decreases so fast than other
Fig. 7: Comparative graph of Routing Overhead of DSR, T-DSR and FTA with respect to number of
malicious nodes
Parameters TDSR
(in percentage)
FTA
(in percentage)
Drop of packets 51 50
45.54 59.66
The variation of the Throughput, Routing overheads and Drop of packets are analysing
individually .in all the cases the performances are improved with FTA approach. In figure 5 it can
be seen that T is improved by around 30% .Whereas the route over head is improved only 8-10 %
educed down to 5, R may be
25%.The packet loss is maximum when all node starts to behave maliciously
DSR. The following table makes a
improvement of our proposed scheme.
FTA with respect to number of malicious
throughput is better for FTA. The throughput of DSR decreases so fast than other
spect to number of
(in percentage)
Computer Science & Information Technology (CS & IT)
In the fig. 7 the routing overhead of FTA is much more than TDSR and DSR. The Routing
overhead is close to 70 above for FTA in our experiment.
Fig. 8: Comparative graph of dropping malicious nodes of DSR, T
In the Fig. 8 the drop of the packets are much more less for the case of FTA.
7. CONCLUSION AND FUTURE
In this paper we have highlighted the significance of Trust Enhancement of the mobile ad
network; we also analyze the different types of security issues to the network. The proposed
scheme can be used to improve the reliability and the performance to a
we are using fuzzy logic concept for Trust Enhancement to solve the problem of
infrastructure in MANET. Significant
scheme which will motivate us for some further improved performance analysis of Ad
network. Further investigations in this regard can be carried out
provide load balancing using alternate ro
REFERENCES
[1] A.Neogi and A. Banerjee. “Trust Improvement among the nodes in a Wireless Ad
International Journal of Advanced
3, May2012.
[2] Alia Fourati, Khaldoun Al Agha and
Networks” Int. J. Electronic Business, 2007
[3] Jeremy J. Blum, Member, IEEE, and Azim
Protocol for Robust and Scalable Intervehicle Communications”
Transportation Systems, vol. 8, no. 1, March 2007.
[4] Huaizhi Li and Mukesh Singha,
Society February 2007.
[5] C.Shiva Ram Murthy and B.S.Manoj, “ ad hoc wireless network: Architecture and Protocol” Prentice
Hall,2004.
[6] D.Johnson, D.Maltz, Y.Hu and J.Jetcheva, The DSR protocol for mobile ad hoc network, Internet
Engineering Task Force, Mar.2001.
[7] Richard Dawkins. The selfish Gene. Oxford University Press,1980 edition.1976.
[8] S.Murthy,” Routing Protocol threat analy
http:/www.ietf.org/internetdrafts/draft
[9] Ernesto Jimenez Caballero, “Vulnerabilities of Intrusion Detection System in Mobile Ad hoc
network- The routing problems”, Tkk t
Computer Science & Information Technology (CS & IT)
the routing overhead of FTA is much more than TDSR and DSR. The Routing
overhead is close to 70 above for FTA in our experiment.
Fig. 8: Comparative graph of dropping malicious nodes of DSR, T-DSR and FTA
the drop of the packets are much more less for the case of FTA.
UTURE WORK
In this paper we have highlighted the significance of Trust Enhancement of the mobile ad
we also analyze the different types of security issues to the network. The proposed
scheme can be used to improve the reliability and the performance to an Ad-hoc network. Here
we are using fuzzy logic concept for Trust Enhancement to solve the problem of
structure in MANET. Significant improvement is been observed after applying the proposed
scheme which will motivate us for some further improved performance analysis of Ad
network. Further investigations in this regard can be carried out to prevent node congestion and to
provide load balancing using alternate routes discovered by the proposed protocol.
A. Banerjee. “Trust Improvement among the nodes in a Wireless Ad-
International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue
Alia Fourati, Khaldoun Al Agha and Hella Kaffel Ben Ayed “Secure and Fair Auctions over Ad
Int. J. Electronic Business, 2007.
Jeremy J. Blum, Member, IEEE, and Azim Eskandarian, Member, IEEE, “A Reliable Link
Protocol for Robust and Scalable Intervehicle Communications” IEEE Transactions On Intelligent
Transportation Systems, vol. 8, no. 1, March 2007.
Mukesh Singha, “Trust Management in Distributed Systems” IEEE Computer
and B.S.Manoj, “ ad hoc wireless network: Architecture and Protocol” Prentice
Y.Hu and J.Jetcheva, The DSR protocol for mobile ad hoc network, Internet
ineering Task Force, Mar.2001. http://www.ietf.org/internetdrafts/draft-ietf.
Richard Dawkins. The selfish Gene. Oxford University Press,1980 edition.1976.
S.Murthy,” Routing Protocol threat analysis” Internet Engineering Task Force, Mar.2002.
http:/www.ietf.org/internetdrafts/draft-ietf.
Ernesto Jimenez Caballero, “Vulnerabilities of Intrusion Detection System in Mobile Ad hoc
The routing problems”, Tkk t-110.5290 seminar on Network security 2006.
303
the routing overhead of FTA is much more than TDSR and DSR. The Routing
DSR and FTA
In this paper we have highlighted the significance of Trust Enhancement of the mobile ad-hoc
we also analyze the different types of security issues to the network. The proposed
hoc network. Here
we are using fuzzy logic concept for Trust Enhancement to solve the problem of lack of
improvement is been observed after applying the proposed
scheme which will motivate us for some further improved performance analysis of Ad-hoc
to prevent node congestion and to
-hoc Network”
Volume 1, Issue
Hella Kaffel Ben Ayed “Secure and Fair Auctions over Ad Hoc
A Reliable Link-Layer
IEEE Transactions On Intelligent
IEEE Computer
and B.S.Manoj, “ ad hoc wireless network: Architecture and Protocol” Prentice
Y.Hu and J.Jetcheva, The DSR protocol for mobile ad hoc network, Internet
sis” Internet Engineering Task Force, Mar.2002.
Ernesto Jimenez Caballero, “Vulnerabilities of Intrusion Detection System in Mobile Ad hoc
304 Computer Science & Information Technology (CS & IT)
[10] Y.C.Hu, A.Perring and D.B.Johnson,” Packet Leashes: A Defence against Wormhole attacks in
wireless Ad hoc network”, Proc. 22nd
annual joint conference . IEEE computer and communication
society (Infocom 03) Sanfransisco,CA, April’2003.
[11] Sonja Buchegger and Jean-Yves Le Boudec ,” Performance analysis of CONFIDANT Protocol”,
Proceedings of the 3rd
ACM International symposium on mobile Ad hoc networking and
computing’02.
[12] John Keane, “ trust Based DSR in Mobile Ad hoc networks, Trinity College Dublin,2002.
[13] Kevin Fall and Kannan Vardhan, The ns nam manual, www.isi.edu/nsnam/ns/doc/index.html.
[14] Sergio Marti,T.J.Giuli, Kevin Lai and Mary Baker,” Mitigating routing misbehaviour in Mobile ad-
hoc networks”. In Proceedings of MOBICOM 2000. Pages 255-256. 2000.
[15] H.Hallani and S.A.Shahrestani “Trust assessment in wireless Ad-hoc network”978-1-4244-
2829,IEEE 2008.
[16] H.Hallani and S.A.Shahrestani, “Wireless Ad-hoc network : employing behaviour history to combat
malicious nodes”, In Proc. International Conf on Signal Processing and Telecommunication
Systems(ICSPCS’07), Gold Coast , Australia, December, 2007, pp.1-6.
AUTHORS
Ananya Banerjee
She is associated with ECE department in Dr Sudhir Chandra Sur Degree Engineering
College (WBUT) from 2010. She has started her carrier as a lecturer in Academy of
Technology (WBUT) and then Institute of Engineering and Management (WBUT). In
total 4.7 years experienced, Mrs. Banerjee has passed her M.Tech from Institute of
Radio Physics and Electronics and M.Sc. in Electronic Science from University College
of science and technology, Calcutta University. Having interest in Communication
network, she has published one inter national journal paper on “Trust Improvement
among the nodes in a Wireless Ad-hoc Network” International Journal of Advanced
Research in Computer Engineering & Technology Vol. 1, Issue 3, May2012.
Sutanu Ghosh
Presently he is working as Assistant Professor in Electronics and Communication
Engineering Department of Dr Sudhir Chandra Sur Degree Engineering College,
Kolkata. After the completion of M.tech. Degree in Mobile Computing and
Communication Engineering from Jadavpur University (2009), he is actively engaged in
teaching since 2009. His current research interests are in the areas of Network
Architecture and protocols, Integration Architecture of WLAN and 3G Networks,Voice
Over IP network and Wireless Ad-hoc Networks. Mr. Ghosh is a Member of IAENG
and IACSIT. He has published many research contributions in prestigious peer Reviewed
journals.
Anirban Neogi
He is currently working as the HOD of ECE department of Dr. Sudhir Chandra Sur
Degree Engineering College.She has started her carrier as a lecturer in Bengal Institute of
Technology (Under Techno India Group). He has total experience of over 10 years in
teaching. As a part of his research activity he got 6 international journal publications and
few conference papers in the field of Nanoscience and as well as in Ad-hoc
network. He did his M.Tech from Institute of Radio Physics and Electronics and M.Sc. in
Electronic Science from university college of science and technology, Calcutta
university.

More Related Content

What's hot

Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksJPINFOTECH JAYAPRAKASH
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsIDES Editor
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153IJRAT
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
 
17 21 jan17 9dec16 13655 27902-1-ed(edit)
17 21 jan17 9dec16 13655 27902-1-ed(edit)17 21 jan17 9dec16 13655 27902-1-ed(edit)
17 21 jan17 9dec16 13655 27902-1-ed(edit)IAESIJEECS
 
Enhancement and performance evaluation of a multicast routing mechanism in zi...
Enhancement and performance evaluation of a multicast routing mechanism in zi...Enhancement and performance evaluation of a multicast routing mechanism in zi...
Enhancement and performance evaluation of a multicast routing mechanism in zi...Raja' Masa'deh
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
 
Cv31424430
Cv31424430Cv31424430
Cv31424430IJMER
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 

What's hot (18)

A2546035115
A2546035115A2546035115
A2546035115
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
 
Be31390392
Be31390392Be31390392
Be31390392
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
 
17 21 jan17 9dec16 13655 27902-1-ed(edit)
17 21 jan17 9dec16 13655 27902-1-ed(edit)17 21 jan17 9dec16 13655 27902-1-ed(edit)
17 21 jan17 9dec16 13655 27902-1-ed(edit)
 
Enhancement and performance evaluation of a multicast routing mechanism in zi...
Enhancement and performance evaluation of a multicast routing mechanism in zi...Enhancement and performance evaluation of a multicast routing mechanism in zi...
Enhancement and performance evaluation of a multicast routing mechanism in zi...
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
 
A018210109
A018210109A018210109
A018210109
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
G0544650
G0544650G0544650
G0544650
 
Cv31424430
Cv31424430Cv31424430
Cv31424430
 
B0960512
B0960512B0960512
B0960512
 
new-Modified
new-Modifiednew-Modified
new-Modified
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 

Similar to TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK

A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET cscpconf
 
A survey on trust based secure routing in manet
A survey on trust based secure routing in manetA survey on trust based secure routing in manet
A survey on trust based secure routing in manetcsandit
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...IJERA Editor
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Networkijsrd.com
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd Iaetsd
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobileIJCNCJournal
 

Similar to TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK (20)

A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
A SURVEY ON TRUST BASED SECURE ROUTING IN MANET
 
A survey on trust based secure routing in manet
A survey on trust based secure routing in manetA survey on trust based secure routing in manet
A survey on trust based secure routing in manet
 
SZRP.pdf
SZRP.pdfSZRP.pdf
SZRP.pdf
 
AD HOC.doc
AD HOC.docAD HOC.doc
AD HOC.doc
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
Interference Minimization Protocol in Heterogeneous Wireless Sensor Network f...
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
47 50
47 5047 50
47 50
 
47 50
47 5047 50
47 50
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
 
G343741
G343741G343741
G343741
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobile
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Recently uploaded (20)

FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK

  • 1. Rupak Bhattacharyya et al. (Eds) : ACER 2013, pp. 295–304, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3228 TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK Ananya Banerjee1 , Sutanu Ghosh2 and Anirban Neogi3 1,2,3 Dr.Sudhir Chandra Sur Degree Engineering College; Kolkata 700074. ananya.banerjeee@gmail.com,sutanu99@gmail.com, anirban_neogi@yahoo.com ABSTRACT An Ad-hoc network consists of communicating nodes to establish improvised communication with environment without any fixed infrastructure. Nodes in Ad-hoc network (MANET) do not rely on a central infrastructure management but relay packets sent by other nodes. Mobile ad- hoc network can work properly only if the participating nodes collaborate with routing. Therefore it is required that the nodes co-operate for the intensity of operator network. Because of the high mobility of the nodes in the network, detection of misbehaviour of any node is a complex problem. Nodes have to share the routing information in order for each to find the route to the destination. This conceptual paper is based on the relationship among the nodes which makes them to co-operate in an ad-hoc network .This require nodes to Trust each other. Thus we can say Trust is a important concept in secure routing mechanism among the nodes. In this paper we present a unique Trust based method in which each node broadcast a RQ packet if it is received from different neighbours. The secure, efficient and reliable route towards the destination is calculated as a weighted average of the Trust value of the nodes in the route, with respect to it’s behaviour observed by the neighbour nodes and the number of nodes in the route. KEYWORDS DSR, Trust enhancement, correlation among neighbour nodes, malicious nodes, throughput, FTA, OPI, routing overhead. 1. INTRODUCTION The nodes are usually mobile portable devices, self organised and any sort of end to end communication between them requires routing of information via several intermediate nodes. A mobile ad-hoc network (MANET) is the collection of wireless mobile nodes to establish a temporary connection neither in a predefined way nor using a static network structure. Due to the lack of infrastructure and limited transmission facility of a node in a mobile ad-hoc network, a node has to rely on neighbour nodes to send a packet to the destination. Since routing is a basic service in such network and a prerequisite for other services, it has to be reliable and trustworthy. Recently, the routing protocols for mobile ad hoc network, such as DSR and AODV are based on the assumption that all nodes will co-operate. Without co-operation no packet can be forwarded to the desired destination and hence no proper routing is possible. There are two types of non co-operative nodes can be classified: i) faulty or malicious node and ii) selfish node. Both of these are misbehaved nodes. Misbehaviour means to attempt the benefits from other nodes but to refuse to share it’s resources. So with these misbehaved nodes both DSR and AODV may not result the proper routing. Enforcing the co-operation among the
  • 2. 296 Computer Science & Information Technology (CS & IT) mobile nodes is particularly challenging which may solve for many routing issues. In this paper a modified approach for optimising the routing protocol through assessing the trust level between nodes is introduced. Different scenarios are identified and are combined simulated to determine if anode is action maliciously or not. 2. EARLIER WORK FOR TRUST ENHANCED ROUTE FOR AD-HOC NETWORKS In the DSR protocol, DSR routing model faces some security problems, those are given below: a) Through the non jam-packed route, RQ packets reach the destination very soon rather than the jam packed route. So jam-packed route can be avoided. But there is a problem that is a shorter path may present within the jam-packed route which may not be utilised. b) The one hop neighbour sends RQ packets to the destination end , just after receiving 1st RQ.As a result most of the packets from the other nodes(far from destination node) are discarded. c) A node, after receiving RQ packet, checks it and drops it if it is previously processed. As a result a malicious node forwards that RQ very quickly, then the other RQ packets from the other nodes, are dropped. d) Sometimes malicious node hampers good traffic operation in an ad-hoc network by disturbing route error information, routing table, routing state etc. In order to solve these above mentioned problems and to establish a robust secure reliable path from source to destination without falsification of route and information packet we are going to introduce Trust Enhancement Route scheme for ad-hoc network. Trust value: Reliability, of a node with respected to its neighbour node can be represented by a parameter, called trust value of a node in a network. An initial Trust value is assigned for neighbour node which is encountered for the 1st time. Initialisation of assignment of the initial trust value of the neighbour nodes including malicious nodes can be done by the trust values of known neighbour nodes. Actually a Trust value depends upon the experience of given node. Up gradation of trust value: The Trust value for a neighbour node will be upgraded, when a node gets the RP packet from this neighbour node. So there should be a function to upgrade the Trust value: T(next)=K[T(previous)-Ex]+Ex. Where, T(next)=New upgraded Trust value. T(previous)=previous Trust value, Ex = value of experience, K = constant There are two sub modules under this module: • Administrator module which is use to accumulate Trust information of the known nodes. It acts as a interface between DSR protocol and previous modules. • Router module selects the most reliable path having lowest number of malicious nodes, depending upon the Intimacy of a node with its neighbour nodes. • De gradation of trust value: If the RP packet is not received, the Trust value for this neighbour node has to be de graded.
  • 3. Computer Science & Information Technology (CS & IT) 297 Establishment of the co-relation of the neighbour nodes: If the trust value of the neighbour node is greater than a threshold value then that node is a known node for the source node, otherwise it is an unknown node for the source node. This threshold value can be represented by a numerical value i.e., 0.5. This known node is classified into two categories i) Completely known and ii) Moderately known. Table 1. Co-relation table Relation with source Trust value Transaction type Completely known node Tc: 0.75<T<=1 Plenty of reception RP and transmission RQ of packets Moderately known node Tm: 0.5<=T<0.75 Few transaction Unknown node / Malicious node Tu: 0<=T<0.5 No transaction When Trust value of a known node is greater than 0.5 and less than 0.75 then this is a moderately known node. That means the transaction between the source node and this neighbour node is performed moderately. And when Trust value of a known node is greater than 0.75 and less than 1 then this is a completely known node. That means lots of transaction are performed between source and this neighbour node. 2.1. For reliable transaction First of all we should recognise the malicious node which is responsible to falsify the path detection and the information, to secure the transaction we can follow the above mentioned co- relation table. During source to destination data transmission we should include the important field that is Trust field at the header part of the framed packet along with the payload. For one –way propagation there is a timer, Td =2*R/s+K. Where R = maximum range for sending data. s = speed of data which is transmitted. K = constant. After every RQ packet reception by a neighbour node, the Trust field of the data is updated by using a formula Trust field (new) =Trust field (previous) + Txy (when x node receives the broadcasted data of node y). Similarly when the destination node receives the packet which is sent by the source and reaches at the destination through a reliable, shorted route, another trust field should be introduced at the header of RP packet, which will be transmitted to the source. For forward direction Trust field is denoted by Tf and for the reverse direction Trust field is denoted by Tr.
  • 4. 298 Computer Science & Information Technology (CS & IT) 2.2. Total transaction Fig. 1 : A Network In a DSR network we consider source S sends data to the destination end D.In this Fig.1 S sends RQ packet to all the neighbours. A communication between S and C is shown here. In transmission path the packets routed through S, G, D and C and in reverse path it is routed through C, B, A and S. Nodes with Tf field along with the header to discover a secure path to destination. After selection of the secure, shortest path, let S sends packet through the path S, G, D and C to the destination end. Each and every intermediate node upgrades its Trust field by involving Trust values of the node from where it receives the packet. From source to destination RQ packet transmission the total Trust value has to be: Tf(total) = T(AS)+T(BA)+T(CB)+T(DC). After reception of the data packet from the source end, D sends an acknowledgement through a reliable path, therefore like an S node; D node also checks the Trust values of neighbour nodes within its path to source. So for RP packets the total reverse direction Trust value has to be: Tr(total) = T(CD)+T(BC)+T(AB)+T(SA). So for total transaction (From source to destination and destination to source), the total trust value can be calculated as T=[{Tf(total)+Tr(total)}/2]*Si=[{T(AS)+T(BA)+T(CB)+T(DC)+ T(CD)+T(BC)+T(AB)+T(SA)}/2]*Si. X Where, Si=1/xi / ∑1/xi, for ith possible path i=1 Therefore from the above expression of T all nodes have mutual Trust information within the path from source to destination. 3. PERFORMANCE ANALYSIS IN OUR PREVIOUS WORK We have used network simulator 2, a simulator for mobile Ad-hoc network to evaluate the effectiveness of the proposed scheme. The simulator is done with 25 nodes moving with speeds 1, 5, 10, 15, 20 m/s in a 400x400 sq.m. area. The pause time is 10 ms between the movements of the nodes. The transmission range of the each node is 100 m. We assume that there are 0-40% malicious nodes in the network. To analyze the Performance of the proposed scheme we use the following metrics:
  • 5. Computer Science & Information Technology (CS & IT) Routing Overhead: It is define as the number of RQ packets transferred taken to find a secure path from source to destination, in the presence of malicious nodes. Throughput: It is the ratio of the number of data packets re number of packets sent by the source node. The performance of the proposed scheme is compared with standard DSR protocol by varying the number of malicious nodes and node moving speed. For performance analysi parameters- i) Routing overhead, ii) dropping Fig. 2: Comparative graph of Throughput of T In fig 2 the achieved throughput is Fig. 3: Comparative graph of Routing overhead of T The next observing parameter standard DSR. Computer Science & Information Technology (CS & IT) It is define as the number of RQ packets transferred taken to find a secure path from source to destination, in the presence of malicious nodes. It is the ratio of the number of data packets received by the destination node to the number of packets sent by the source node. The performance of the proposed scheme is compared with standard DSR protocol by varying the number of malicious nodes and node moving speed. For performance analysis we have used three dropping of malicious nodes, iii) Throughput. Comparative graph of Throughput of T-DSR and DSR with respect to number of malicious node the achieved throughput is clearly greater than the standard DSR. Fig. 3: Comparative graph of Routing overhead of T-DSR and DSR with respect to number of malicious nodes The next observing parameter is Routing Overhead, which is clearly high compared to the 299 It is define as the number of RQ packets transferred taken to find a secure ceived by the destination node to the The performance of the proposed scheme is compared with standard DSR protocol by varying the have used three DSR and DSR with respect to number of malicious nodes DSR and DSR with respect to number of malicious compared to the
  • 6. 300 Computer Science & Information Technology (CS & IT) Fig. 4: Comparative graph of dropping malicious node of T Fig. 4 shows the dropping of malicious node case of Trust Enhancement scheme compared to standard DSR. 4. OVERVIEW OF THE FTA Trust Level in an ad-hoc network serves the reliability of nodes during data packets transmission from source to destination through a most reliable path. fuzzy logic to evaluate trust value of the nodes, and at the same time this a recognise the malicious nodes in the network. The input parameters of FTA are a) number of replay attacks, b) forwarded packets destination, c) number of untruthful routing message, d In the undiscovered route if P (source) wants to send information packets to the Q (destination end), path discovery should be done on its neighbouring nodes, those are responsible to find out the trust Here we consider the minimum trust level of k To choose most reliable path from P to Q, after sending a RQ, P node can g routing protocol, the nodes which are not included in a selected path will not participate in routing table. Destination IP information next hop should be included in FTA table. When P starts to send a message to Q it starts to initiate a valid path between them by sending a signal RQ to its neighbours. the RQ consists of P’s IP address, its sequence no., its current trust value, hop count and life span .To with when the sequence no. is unknown the sequence no. flag must be set to some initial value and the hop coun node the hop-count of RQ packet is increased by 1, and the hopping information initialisation of the valid path between P and Q is updated. In the same way the trust current node is compared with the previous one and updates of originator RQ packet. In this way in each c greater than the previous one the RQ In order to establish a reverse path each intermediate node records the address of neighbours from which they receive packets. Once Computer Science & Information Technology (CS & IT) ative graph of dropping malicious node of T-DSR and DSR shows the dropping of malicious nodes over total drops. The amount of dropping is less in case of Trust Enhancement scheme compared to standard DSR. FTA hoc network serves the reliability of nodes during data packets transmission from source to destination through a most reliable path. So we propose an algorithm based on fuzzy logic to evaluate trust value of the nodes, and at the same time this algorithm is used to recognise the malicious nodes in the network. The input parameters of FTA are a) number of replay attacks, b) forwarded packets of untruthful routing message, d) number of dropped packets. (source) wants to send information packets to the Q (destination ath discovery should be done on demand. First of all P sends RQ (route request signal) to its neighbouring nodes, those are responsible to find out the trust values of their next hop nodes. Here we consider the minimum trust level of kth node in nth route, is Tnk where k ϵ (1,….n). To choose most reliable path from P to Q, FTA uses the trust values of nodes. In this protocol, after sending a RQ, P node can get more than one RP .Because of the source initiated on routing protocol, the nodes which are not included in a selected path will not participate in routing table. Destination IP address, sequence no. flag, trust level, and hop count and n next hop should be included in FTA table. When P starts to send a message to Q it starts to initiate a valid path between them by sending a signal RQ to its neighbours. the RQ consists of P’s IP address, its sequence no., its current trust unt and life span .To with when the sequence no. is unknown the sequence no. flag must be set to some initial value and the hop count may be considered as 0.At the count of RQ packet is increased by 1, and the hopping information of the valid path between P and Q is updated. In the same way the trust current node is compared with the previous one and updates the trust parameter in the trust field of originator RQ packet. In this way in each comparison whenever the present trust level is greater than the previous one the RQ packet is updated and hence moves towards a valid path. In order to establish a reverse path each intermediate node records the address of neighbours from packets. Once RQ reaches the destination Q, a RP packet is generated and of dropping is less in hoc network serves the reliability of nodes during data packets transmission So we propose an algorithm based on lgorithm is used to The input parameters of FTA are a) number of replay attacks, b) forwarded packets to the wrong of dropped packets. (source) wants to send information packets to the Q (destination First of all P sends RQ (route request signal) to values of their next hop nodes. (1,….n). nodes. In this protocol, et more than one RP .Because of the source initiated on-demand routing protocol, the nodes which are not included in a selected path will not participate in sequence no. flag, trust level, and hop count and When P starts to send a message to Q it starts to initiate a valid path between them by sending a signal RQ to its neighbours. the RQ consists of P’s IP address, its sequence no., its current trust unt and life span .To with when the sequence no. is unknown the sequence no. flag t may be considered as 0.At the intermediate count of RQ packet is increased by 1, and the hopping information towards the of the valid path between P and Q is updated. In the same way the trust level at the the trust parameter in the trust field omparison whenever the present trust level is towards a valid path. In order to establish a reverse path each intermediate node records the address of neighbours from RQ reaches the destination Q, a RP packet is generated and
  • 7. Computer Science & Information Technology (CS & IT) travels though the reverse path. count value by 1since RP is moving through a reverse path, when RP reaches the source, the hop count indicates the double distance between the P and Q. The source sequence number in RP is compared with destination sequence number and compared at current trust value. The minimum value represents the trust level of the route. FTA now picks the route with highest trust level as the most reliable path between P and 5. PERFORMANCE ANALYSIS We have started our analysis with the same network as in our earlier paper. We have used OPNER modeller V11.5 for the simulation. within AODV routing protocol is considered. The simulation process consists of no. of scenarios producing practical configuration. Every scenario runs in 5 different c none of the above 25 nodes acts maliciously or 10 or 15 of them are acting maliciously and so on. We also have considered the malicious nodes drop packets within the simulation time. In our case each malicious nodes are dropping packets in between 50 and simulation is done within the span of 300 seconds. We also have said the condition that for the 60 seconds the nodes move randomly with a speed 10 meter /sec, after that in seconds they come back to their We choose our scenarios such that station _1 sends traffic to station _25.To study of the effects of the malicious node three performance matrix will be measured for their above mentioned scenarios namely Throughput (T), performance of different approaches we define overall performance index defined as, OPI=WT*T+WD*D+WDl*Dl where Dl represents round trip delay and W’s represents corresponding weights. The distribution of the weights can defer from one and video based application the weight for packet loss should have the highest value. In our case to study the ADHOC network we choose W Computer Science & Information Technology (CS & IT) travels though the reverse path. Whenever an intermediate node receives RP it increases the hop count value by 1since RP is moving through a reverse path, when RP reaches the source, the hop count indicates the double distance between the P and Q. The source sequence number in RP is red with destination sequence number and compared at each node in order to conclude current trust value. The minimum value represents the trust level of the route. FTA now picks the as the most reliable path between P and Q. NALYSIS OF TRUST LEVEL USING FTA We have started our analysis with the same network as in our earlier paper. We have used simulation. One wireless LAN with 25 nodes with speed 11 is considered. The simulation process consists of no. of scenarios producing practical configuration. Every scenario runs in 5 different configurations. For example none of the above 25 nodes acts maliciously or 10 or 15 of them are acting maliciously and so on. We also have considered the malicious nodes drop packets within the simulation time. In our case each malicious nodes are dropping packets in between 50 and 100 seconds where as the total simulation is done within the span of 300 seconds. We also have said the condition that for the seconds the nodes move randomly with a speed 10 meter /sec, after that in duration seconds they come back to their initial position. Fig. 5: Experimental Scenario We choose our scenarios such that station _1 sends traffic to station _25.To study of the effects of the malicious node three performance matrix will be measured for their above mentioned (T), Routing overhead (R) and Drop of packet (D).To compare the performance of different approaches we define overall performance index defined as, *Dl where Dl represents round trip delay and W’s represents the weights can defer from one application to other, as an example for voice and video based application the weight for packet loss should have the highest value. In our case to study the ADHOC network we choose WT= Wd=25 and WDl=50. 301 Whenever an intermediate node receives RP it increases the hop count value by 1since RP is moving through a reverse path, when RP reaches the source, the hop- count indicates the double distance between the P and Q. The source sequence number in RP is each node in order to conclude the current trust value. The minimum value represents the trust level of the route. FTA now picks the We have started our analysis with the same network as in our earlier paper. We have used One wireless LAN with 25 nodes with speed 11Mbps is considered. The simulation process consists of no. of scenarios onfigurations. For example, none of the above 25 nodes acts maliciously or 10 or 15 of them are acting maliciously and so on. We also have considered the malicious nodes drop packets within the simulation time. In our case 100 seconds where as the total simulation is done within the span of 300 seconds. We also have said the condition that for the 1st duration of 20 We choose our scenarios such that station _1 sends traffic to station _25.To study of the effects of the malicious node three performance matrix will be measured for their above mentioned (D).To compare the performance of different approaches we define overall performance index defined as, *Dl where Dl represents round trip delay and W’s represents application to other, as an example for voice and video based application the weight for packet loss should have the highest value. In our case
  • 8. 302 Computer Science & Information Technology (CS & IT) 6. RESULTS AND ANALYSIS The variation of the Throughput, Routing overheads and Drop of packets are individually .in all the cases the performances are improved with FTA approach. In figure 5 it can be seen that T is improved by around 30% .Whereas the route over head is improved only 8 because the network consists of 25 nodes. If the no. of node r improved up to 20-25%.The packet loss is maximum when all node starts to behave maliciously but it remain almost same in comparison with DSR and T comparison between TDSR and FTA to establish the Table 2. Fig. 6: Comparative graph of Throughput In this figure throughput is better for FTA. The throughput of DSR decreases so fast than other two protocols. Fig. 7: Comparative graph of Routing Overhead of DSR, Parameters Drop of packets OPI Computer Science & Information Technology (CS & IT) NALYSIS The variation of the Throughput, Routing overheads and Drop of packets are individually .in all the cases the performances are improved with FTA approach. In figure 5 it can be seen that T is improved by around 30% .Whereas the route over head is improved only 8 because the network consists of 25 nodes. If the no. of node reduced down to 5, 25%.The packet loss is maximum when all node starts to behave maliciously but it remain almost same in comparison with DSR and T-DSR. The following table makes a comparison between TDSR and FTA to establish the improvement of our proposed scheme. Table 2. Comparative table of TDSR and FTA Fig. 6: Comparative graph of Throughput of DSR, T-DSR and FTA with respect to number of malicious nodes throughput is better for FTA. The throughput of DSR decreases so fast than other Fig. 7: Comparative graph of Routing Overhead of DSR, T-DSR and FTA with respect to number of malicious nodes Parameters TDSR (in percentage) FTA (in percentage) Drop of packets 51 50 45.54 59.66 The variation of the Throughput, Routing overheads and Drop of packets are analysing individually .in all the cases the performances are improved with FTA approach. In figure 5 it can be seen that T is improved by around 30% .Whereas the route over head is improved only 8-10 % educed down to 5, R may be 25%.The packet loss is maximum when all node starts to behave maliciously DSR. The following table makes a improvement of our proposed scheme. FTA with respect to number of malicious throughput is better for FTA. The throughput of DSR decreases so fast than other spect to number of (in percentage)
  • 9. Computer Science & Information Technology (CS & IT) In the fig. 7 the routing overhead of FTA is much more than TDSR and DSR. The Routing overhead is close to 70 above for FTA in our experiment. Fig. 8: Comparative graph of dropping malicious nodes of DSR, T In the Fig. 8 the drop of the packets are much more less for the case of FTA. 7. CONCLUSION AND FUTURE In this paper we have highlighted the significance of Trust Enhancement of the mobile ad network; we also analyze the different types of security issues to the network. The proposed scheme can be used to improve the reliability and the performance to a we are using fuzzy logic concept for Trust Enhancement to solve the problem of infrastructure in MANET. Significant scheme which will motivate us for some further improved performance analysis of Ad network. Further investigations in this regard can be carried out provide load balancing using alternate ro REFERENCES [1] A.Neogi and A. Banerjee. “Trust Improvement among the nodes in a Wireless Ad International Journal of Advanced 3, May2012. [2] Alia Fourati, Khaldoun Al Agha and Networks” Int. J. Electronic Business, 2007 [3] Jeremy J. Blum, Member, IEEE, and Azim Protocol for Robust and Scalable Intervehicle Communications” Transportation Systems, vol. 8, no. 1, March 2007. [4] Huaizhi Li and Mukesh Singha, Society February 2007. [5] C.Shiva Ram Murthy and B.S.Manoj, “ ad hoc wireless network: Architecture and Protocol” Prentice Hall,2004. [6] D.Johnson, D.Maltz, Y.Hu and J.Jetcheva, The DSR protocol for mobile ad hoc network, Internet Engineering Task Force, Mar.2001. [7] Richard Dawkins. The selfish Gene. Oxford University Press,1980 edition.1976. [8] S.Murthy,” Routing Protocol threat analy http:/www.ietf.org/internetdrafts/draft [9] Ernesto Jimenez Caballero, “Vulnerabilities of Intrusion Detection System in Mobile Ad hoc network- The routing problems”, Tkk t Computer Science & Information Technology (CS & IT) the routing overhead of FTA is much more than TDSR and DSR. The Routing overhead is close to 70 above for FTA in our experiment. Fig. 8: Comparative graph of dropping malicious nodes of DSR, T-DSR and FTA the drop of the packets are much more less for the case of FTA. UTURE WORK In this paper we have highlighted the significance of Trust Enhancement of the mobile ad we also analyze the different types of security issues to the network. The proposed scheme can be used to improve the reliability and the performance to an Ad-hoc network. Here we are using fuzzy logic concept for Trust Enhancement to solve the problem of structure in MANET. Significant improvement is been observed after applying the proposed scheme which will motivate us for some further improved performance analysis of Ad network. Further investigations in this regard can be carried out to prevent node congestion and to provide load balancing using alternate routes discovered by the proposed protocol. A. Banerjee. “Trust Improvement among the nodes in a Wireless Ad- International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue Alia Fourati, Khaldoun Al Agha and Hella Kaffel Ben Ayed “Secure and Fair Auctions over Ad Int. J. Electronic Business, 2007. Jeremy J. Blum, Member, IEEE, and Azim Eskandarian, Member, IEEE, “A Reliable Link Protocol for Robust and Scalable Intervehicle Communications” IEEE Transactions On Intelligent Transportation Systems, vol. 8, no. 1, March 2007. Mukesh Singha, “Trust Management in Distributed Systems” IEEE Computer and B.S.Manoj, “ ad hoc wireless network: Architecture and Protocol” Prentice Y.Hu and J.Jetcheva, The DSR protocol for mobile ad hoc network, Internet ineering Task Force, Mar.2001. http://www.ietf.org/internetdrafts/draft-ietf. Richard Dawkins. The selfish Gene. Oxford University Press,1980 edition.1976. S.Murthy,” Routing Protocol threat analysis” Internet Engineering Task Force, Mar.2002. http:/www.ietf.org/internetdrafts/draft-ietf. Ernesto Jimenez Caballero, “Vulnerabilities of Intrusion Detection System in Mobile Ad hoc The routing problems”, Tkk t-110.5290 seminar on Network security 2006. 303 the routing overhead of FTA is much more than TDSR and DSR. The Routing DSR and FTA In this paper we have highlighted the significance of Trust Enhancement of the mobile ad-hoc we also analyze the different types of security issues to the network. The proposed hoc network. Here we are using fuzzy logic concept for Trust Enhancement to solve the problem of lack of improvement is been observed after applying the proposed scheme which will motivate us for some further improved performance analysis of Ad-hoc to prevent node congestion and to -hoc Network” Volume 1, Issue Hella Kaffel Ben Ayed “Secure and Fair Auctions over Ad Hoc A Reliable Link-Layer IEEE Transactions On Intelligent IEEE Computer and B.S.Manoj, “ ad hoc wireless network: Architecture and Protocol” Prentice Y.Hu and J.Jetcheva, The DSR protocol for mobile ad hoc network, Internet sis” Internet Engineering Task Force, Mar.2002. Ernesto Jimenez Caballero, “Vulnerabilities of Intrusion Detection System in Mobile Ad hoc
  • 10. 304 Computer Science & Information Technology (CS & IT) [10] Y.C.Hu, A.Perring and D.B.Johnson,” Packet Leashes: A Defence against Wormhole attacks in wireless Ad hoc network”, Proc. 22nd annual joint conference . IEEE computer and communication society (Infocom 03) Sanfransisco,CA, April’2003. [11] Sonja Buchegger and Jean-Yves Le Boudec ,” Performance analysis of CONFIDANT Protocol”, Proceedings of the 3rd ACM International symposium on mobile Ad hoc networking and computing’02. [12] John Keane, “ trust Based DSR in Mobile Ad hoc networks, Trinity College Dublin,2002. [13] Kevin Fall and Kannan Vardhan, The ns nam manual, www.isi.edu/nsnam/ns/doc/index.html. [14] Sergio Marti,T.J.Giuli, Kevin Lai and Mary Baker,” Mitigating routing misbehaviour in Mobile ad- hoc networks”. In Proceedings of MOBICOM 2000. Pages 255-256. 2000. [15] H.Hallani and S.A.Shahrestani “Trust assessment in wireless Ad-hoc network”978-1-4244- 2829,IEEE 2008. [16] H.Hallani and S.A.Shahrestani, “Wireless Ad-hoc network : employing behaviour history to combat malicious nodes”, In Proc. International Conf on Signal Processing and Telecommunication Systems(ICSPCS’07), Gold Coast , Australia, December, 2007, pp.1-6. AUTHORS Ananya Banerjee She is associated with ECE department in Dr Sudhir Chandra Sur Degree Engineering College (WBUT) from 2010. She has started her carrier as a lecturer in Academy of Technology (WBUT) and then Institute of Engineering and Management (WBUT). In total 4.7 years experienced, Mrs. Banerjee has passed her M.Tech from Institute of Radio Physics and Electronics and M.Sc. in Electronic Science from University College of science and technology, Calcutta University. Having interest in Communication network, she has published one inter national journal paper on “Trust Improvement among the nodes in a Wireless Ad-hoc Network” International Journal of Advanced Research in Computer Engineering & Technology Vol. 1, Issue 3, May2012. Sutanu Ghosh Presently he is working as Assistant Professor in Electronics and Communication Engineering Department of Dr Sudhir Chandra Sur Degree Engineering College, Kolkata. After the completion of M.tech. Degree in Mobile Computing and Communication Engineering from Jadavpur University (2009), he is actively engaged in teaching since 2009. His current research interests are in the areas of Network Architecture and protocols, Integration Architecture of WLAN and 3G Networks,Voice Over IP network and Wireless Ad-hoc Networks. Mr. Ghosh is a Member of IAENG and IACSIT. He has published many research contributions in prestigious peer Reviewed journals. Anirban Neogi He is currently working as the HOD of ECE department of Dr. Sudhir Chandra Sur Degree Engineering College.She has started her carrier as a lecturer in Bengal Institute of Technology (Under Techno India Group). He has total experience of over 10 years in teaching. As a part of his research activity he got 6 international journal publications and few conference papers in the field of Nanoscience and as well as in Ad-hoc network. He did his M.Tech from Institute of Radio Physics and Electronics and M.Sc. in Electronic Science from university college of science and technology, Calcutta university.