SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7942
A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR
SECURE ADHOC NETWORKS
Ramya. S1 and Prof. B. Sakthivel2
ramyasiva.jothi@gmail.com and everrock17@gmail.com
1PG Student and 2Professor & Head, Department of Computer Science and Engineering
P.S.V. College of Engineering & Technology, Krishnagiri.
--------------------------------------------------------------------***-------------------------------------------------------------------
Abstract - Security issues have been stressed when versatile specially appointed systems (MANETs) are utilized into
militaryand aviation fields. In this paper, we plan a novel secure steering convention for MANETs. This convention
TAODV(Trusted AODV) broadens the generally utilized AODV (Ad hoc On demand Distance Vector) steering convention and
utilizes theidea of a trust model to secure directing practices in the system layerofMANETs.IntheTAODV,trustamonghubs is
represented by supposition, which is a thing gotten from abstract rationale. The sentiments are dynamic and refreshed
frequently as our convention particular: If one hub performs normal communications, its assessment from other hubs'
purposes of view can be expanded; something else, on the off chancethatonehubplaysoutsomeperniciouspractices,itwill be
at last denied by the entire system. A trust proposal instrument is likewise designed to trade trust data among hubs.
Key Words: AODV, MANET’s, TAODV
1. INTRODUCTION
A mobile ad hoc network (MANET) is a kind of wireless network without centralized administration or fixed
networkinfrastructure,inwhichnodesperformroutingdiscoveryandroutingmaintenanceinaself-organizedway.
Nowadays MANET enables many promising applications areas of aerospace and military. Due to some of its
characteristics such as openness, mobility, dynamic topology and protocol weaknesses, MANETs are prone to be
unstable and vulnerable. Consequently, their security issues become more urgent requirements and it is more
difficult to design and implement security solutions for MANETs than for wired networks. Many security schemes
from different aspects of MANETs have been proposed, such as secure routing protocols and secure key
management solutions. However, most of them assume centralized units or trusted third-parties to issue digital
certificates, which actually destroy the self-organization nature of MANETs. Andbyrequiringnodestorequestand
verify digital signaturesallthetime,thesesolutionsoftenbringhugecomputationoverheads.Oursolutionis,onthe
other hand, a secure routing protocol which employs the idea of a trust model so that it canavoidintroducinglarge
overheads andinfluencingthe self-organization nature of MANETs. In this paper, weapplythetrustmodelintothe
security solutions of MANETs. Our trust model is derived and modified from subjective logic, which qualitatively
defines the representation, calculation, andcombination of trust. Trust models have found securityapplicationsin
e-commerce, peer-to-peer networks, and some other distributed systems. In recent years, some research work is
conducted to apply trust models into the security solutions of MANETs. However, there are no concrete and
applicable designs proposed for the security of routing protocols in MANETs, to the best of our knowledge.
2. BACKGROUND
Subjective logic is a kind of trust model which was proposed by A. Josang. It is “a logicwhichoperatesonsubjective
beliefs about the world, and uses the term opinion to denote the representation of a subjective belief”. The trust
between two entities is then represented by opinion. An opinion can be interpreted as a probability measure
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7943
containing secondary uncertainty. In MANET, nodes move with high mobility and may experience long distancein
space among each other. Anode may be uncertain about anothernode’strustworthinessbecauseitdoesnotcollect
enough evidence. This uncertainty is a common phenomenon, therefore we need a model to represent such
uncertainty accordingly. Traditional probability model, which is also used in some trust models, cannot express
uncertainty. While in subjective logic, an opinion consists of belief, disbelief and also uncertainty, which gracefully
meets our demands. Subjective logic also provides a mapping method to transform trust representation between
the evidence space and the opinion space. Our trust model used in TAODV is then derived and modified from the
subjective logic and is more applicable for the instance of MANET. In the subjective logic, an opinion includes four
elements. The fourth one is relative atomicity. Ad hoc On-demand Distance Vector Routing Protocol Ad hoc On-
demand Distance Vector (AODV) routing protocol is one of the most popular routing protocols for MANETs. On
demand is a major characteristic of AODV, which means that a node only performs routing behaviours when it
wants to discover or check route paths towards other nodes. This will greatly increase the efficiency of routing
processes. Routing discovery and routing maintenance are two basic operations in AODV protocol. Routing
discovery happens when a node wants to communions. These mechanisms have been proposed in some previous
work, such as intrusion detection system in and watchdog technique in. Another kind of secure routing protocol
which uses cryptography technologies is recommended to take effect before nodes in the TAODV establish trust
relationships among one another and are the latest security schemes for securing MANET, which employ
cryptography technologies. We assume that the keys and certificates needed by these cryptographic technologies
have been obtained through some key management procedures.
3. OVERVIEW OF THE TRUSTED AODV (TAODV)
Network Model and Assumptions In this work, we make some assumptions and establish the network model of
TAODV. We also argue why we focus our securitysolutiononroutingprotocolinthenetworklayer.Mobilenodesin
MANETs often communicate with one another through an error-prone, bandwidth-limited, and insecure wireless
channel. We do not concern the security problem introduced by the instability of physical layer or link layer. We
only assume that: (1) Each node in the network has the ability to recover all of its neighbors; (2) Each node in the
network can broadcast some essential messages to its neighborswithhighreliability;(3)Eachnodeinthenetwork
possesses a unique ID, the physical network interfaceaddress forexamplethatcanbedistinguishedfromothers.In
the TAODV, we also assume that the system is equipped with some monitor mechanisms or intrusion detection
units either in the network layer or the application layer so that one node can observe the behaviors.
Framework of the Trusted AODV
There are mainly three modules in thewholeTAODVsystem:basicAODVroutingprotocol,trustmodel,andtrusted
AODV routing protocol. Based on our trust model, the TAODV routing protocol contains such procedures as trust
recommendation, trust combination,trustjudging,cryptographicroutingbehaviors,trustedroutingbehaviors,and
trust updating. The structure and relationship among these components are shown in Figure1. The general
procedure for establishing trust relationships among nodes and for performing routing discovery is described as
follows. Let us first imagine the beginning of an ad hoc network which contains a few nodes. Each node’s opinion
towards one another initially is (0,0,1), which means that the node does not trust or distrust another node but it is
only uncertain about another node’s trustworthiness.
4. TRUST MODEL FOR TAODV
Trust Representation Our trust model is an extension of the original trust model in subjective logic which is
introduced in Section 2. In our trust model, opinion is a 3-dimensional metric and is defined as follows:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7944
Definition 1(Opinion).Letdenoteanynode’sopinionaboutanynode’strustworthinessinaMANET,wherethefirst,
second and third component correspond to belief, disbelief and uncertainty, respectively. These three elements
satisfy:
In this definition, belief means the probability of a node can be trusted by a node, and disbelief means the
probability of cannot be trusted by. Then uncertainty fills the void in the absence of both belief and disbelief, and
sum of these three elements.
Mapping between the Evidence and Opinion Spaces A node in MANET will collect and record all the positive and
negative evidences about other nodes’ trustworthiness, which will be explained in detail in Section 5. With these
evidences we can obtain the opinion value by applying the following mapping equation which is derived from.
Definition 2 (Mapping). Let be node A’s opinion about node B’s trustworthiness in a MANET, and let p and n
respectively be the positive and negativeevidences collectedbynodeAaboutnodeB’strustworthiness,thencanbe
expressed as a function of p and n according to:
Trust Combination In our trust model, a node will collect all its neighbors opinions about another node and
combine them together using combination operations. In this way, the node can make a relatively objective
judgment about another node’s trustworthiness even in case several nodes are lying. The followings are two
combination operations nodes may adopt: Discounting Combination and Consensus Combination.
5. ROUTING OPERATIONS IN TAODV
Node Model We add three new fields into each node’s original routing table: positive events, negative events and
opinion. Positive events are the successful communication times between two nodes.Similarlynegativeeventsare
thefailedcommunicationones.Opinionmeansthisnode’sbelieftowardsanother node’strustworthinessasdefined
before. The value of opinion can be calculated according to Formula 2. These three fieldsarethemainfactorswhen
performing trusted routing. One node’s routing table can be illustrated by Figure 2, where some fields are omitted
for highlighting the main parts.
Trust Judging Rules
Before describing the process of trusted routing discovery and maintenance in detail, we predefine some trust
judging rules here andinTable1.(1)Innode’sopiniontowardsnode’strustworthiness,if thefirstcomponentbelief
of opinion is larger than 0.5,will trust and continue to perform routing related to.(2) In node’s opinion towards
node ’s trustworthiness, if the secondcomponent disbelief of opinionislargerthan0.5,willnottrust andwillrefuse
to performing routing related to. Accordingly the route entry for in routing table will be disabled anddeletedafter
an expire time.(3) In node’s opiniontowardsnode’strust worthiness,ifthethirdcomponentuncertaintyofopinion
is larger than 0.5,will request ’s digital signature when ever has interaction (or relationship) with .(4) In node’s
opinion towards node ’s trustworthiness, if the three componentsofopinionareallsmallerthanor equalto0.5,will
request ’s digital signature whenever has interaction(or relationship) with.(5)Ifnodehas norouteentryinnode’s
routing table’s opinion about is initialized as (0,0,1).
Trust Updating Policies
Opinions among nodes change dynamically with the increase of successful or failed communication times. When
and how to update trust opinions among nodes will follow some policies. We derive as follows:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7945
(1) Each time a node has performed a successful communication with another node , including forwarding route
requests or replies normally, generating route requests or route replies normally, etc., ’s successful events in’s
routing table will be increased by .
(2) Each time a node has performed a failed communication with another node including forwarding route
requests or replies abnormally, generating route requests or route replies abnormally, authenticating itself
incorrectly, and so on, ’s failed events in’s routing table will be increased by .
(3) Each time when the field of the successful or failed events changes, the corresponding value of opinion will be
recalculated using Equation 2 from the evidence space to the opinion space.
(4) If node’s route entry has been deleted from node’s route table because of expiry, or there is no ’s route entry
from the beginning, the opinion will be set to (0,0,1).
Trust Recommendation
Existing trust models seldom concern the exchange of trust information. However, it is necessary to design an
information exchange mechanism when applying the trust models into network applications. In our trust
recommendation protocol, there are three types of messages:TrustRequestMessage(TREQ),TrustReplyMessage
(TREP), and TrustWarning Message (TWARN). Nodes who issue TREQ messages are called Requestor. Those who
reply TREP messages are called Recommender.
When a node wants to know another node’s new trustworthiness, it will issue an TREQ message to its neighbors.
TREQmessage uses the above structureandleavesthefieldsofRecommender,OpinionandExpiryempty.TheType
field is set to 0. Nodes which receive the TREQ message will reply with an TREP message with the Type field set to
1. When a node believes that another node has become malicious orunreliable,itwillbroadcastaTWARNmessage
with the Type set to 2 to its neighbors.
Trusted Routing Discovery
We take AODV for example to illustrate how to perform trusted routingdiscoveryusingtheideaofourtrustmodel.
Scenario I: Beginning of A TAODV MANET—Let us consider a simple MANET which only contains 3 nodes:
Now suppose node wants to discover a route path to node. The processes of node, , and are listed below.
1. Broadcasts an RREQ requesting route path to , then begins waiting for an RREP from its neighbor .
Fig. 5.1 Broadcast Nodes
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7946
6. ANALYSIS
By introducing the idea of the trust model into our design, we are able to establish a more flexible and less
overhead secure routing protocol for MANETs. From performance point of view, our trusted routing protocol
introduces less computation overheads than other security solutions n for MANETs. This design does not need to
perform cryptographic computations in every packet, which will cause huge time and performance consumption.
After the trust relationship is established, the subsequent routing operations canbeperformedsecurelyaccording
to trust information instead of certificates all the time. Therefore, the TAODV routing protocol improves the
performanceofsecuritysolutions.Unlikesomeprevioussecurityschemes[3][4],whosebasisofroutingoperations
is “blind un-trust”, TAODVdonotdecreasetheefficiencyofroutingdiscovery andmaintenance.Fromsecuritypoint
of view, our design will detect nodes’ misbehavior finally and reduce the harms to the minimum extent. When a
good node is compromised and becomes a bad one, its misbehavior willbedetectedbyitsneighbors.Thenwith the
help of trust update algorithm, the opinions from the other nodes to this node will be updated shortly. Thus this
node will be denied access to the network.
7. CONCLUSION AND FUTURE WORK
This paper is the first to apply the idea of a trust model in subjective logic into the security solutions of MANETs.
The trust and trust relationship among nodes can be represented, calculated and combined using an item opinion.
In our TAODV routing protocol, nodes can cooperate together to obtain an objective opinion about another node’s
trustworthiness. They can also perform trusted routing behaviors according to the trustrelationshipamongthem.
With an opinion threshold, nodes can flexibly choose whether and how to perform cryptographic operations.
Therefore, the computational overheads are reduced without the need of requesting and verifying certificates at
every routing operation. In summary, our trustedAODVroutingprotocolisamorelight-weightedbutmoreflexible
security solution than other cryptography and authentication designs.
REFERENCES
[1] S. Corson and J. Macker, “Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation
considerations (rfc2501),” January 1999, http://www.ietf.org/rfc/rfc2501.txt.
[2] C. E. Perkins, Ed., Ad Hoc Networking. Boston: Addison-Wesley, 2001.
[3] Y. Teng, V. V. Phoha, and B. Choi, “Design of trust metrics based on dempster-shafer theory,”
http://citeseer.nj.nec.com/461538.html.
[4] E. Gray, J.-M. Seigneur, Y. Chen, and C. Jensen, “Trust propagation in small worlds,” in Proceedings of the 1st
International
Conference on Trust Management, 2002, http://citeseer.nj.nec.com/575876.html.
[5] A. Abdul-Rahman and S. Halles, “A distributed trust model,” in Proceedings of New SecurityParadigms Workshop ’97, 1997, pp.
48–60.

More Related Content

What's hot

MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
 
Defending Man In The Middle Attacks
Defending Man In The Middle AttacksDefending Man In The Middle Attacks
Defending Man In The Middle AttacksIRJET Journal
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkIRJET Journal
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...IJCNCJournal
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...ijcisjournal
 
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...IJNSA Journal
 
A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETIJNSA Journal
 
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...IJMER
 
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET Journal
 
An explicit trust model towards better system security
An explicit trust model towards better system securityAn explicit trust model towards better system security
An explicit trust model towards better system securitycsandit
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...IJECEIAES
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 

What's hot (19)

Fv3510271037
Fv3510271037Fv3510271037
Fv3510271037
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
 
Defending Man In The Middle Attacks
Defending Man In The Middle AttacksDefending Man In The Middle Attacks
Defending Man In The Middle Attacks
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
 
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
 
A Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANETA Novel Multipoint Relay based Secure Routing in MANET
A Novel Multipoint Relay based Secure Routing in MANET
 
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
 
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET-  	  Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
 
An explicit trust model towards better system security
An explicit trust model towards better system securityAn explicit trust model towards better system security
An explicit trust model towards better system security
 
Proj264
Proj264Proj264
Proj264
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
40120140506010
4012014050601040120140506010
40120140506010
 

Similar to IRJET- A Confidence Model based Routing Practice for Secure Adhoc Networks

Trust based security in manet
Trust based security in manetTrust based security in manet
Trust based security in maneteSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESIAEME Publication
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESIAEME Publication
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentIRJET Journal
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...CSEIJJournal
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...cseij
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...sunda2011
 
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...IJCNCJournal
 
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...IJCNCJournal
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET Journal
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...IRJET Journal
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET Journal
 
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...rahulmonikasharma
 

Similar to IRJET- A Confidence Model based Routing Practice for Secure Adhoc Networks (20)

Trust based security in manet
Trust based security in manetTrust based security in manet
Trust based security in manet
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
 
A017320105
A017320105A017320105
A017320105
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
K1803046067
K1803046067K1803046067
K1803046067
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Networkse...
 
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
 
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
 
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

IRJET- A Confidence Model based Routing Practice for Secure Adhoc Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7942 A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS Ramya. S1 and Prof. B. Sakthivel2 ramyasiva.jothi@gmail.com and everrock17@gmail.com 1PG Student and 2Professor & Head, Department of Computer Science and Engineering P.S.V. College of Engineering & Technology, Krishnagiri. --------------------------------------------------------------------***------------------------------------------------------------------- Abstract - Security issues have been stressed when versatile specially appointed systems (MANETs) are utilized into militaryand aviation fields. In this paper, we plan a novel secure steering convention for MANETs. This convention TAODV(Trusted AODV) broadens the generally utilized AODV (Ad hoc On demand Distance Vector) steering convention and utilizes theidea of a trust model to secure directing practices in the system layerofMANETs.IntheTAODV,trustamonghubs is represented by supposition, which is a thing gotten from abstract rationale. The sentiments are dynamic and refreshed frequently as our convention particular: If one hub performs normal communications, its assessment from other hubs' purposes of view can be expanded; something else, on the off chancethatonehubplaysoutsomeperniciouspractices,itwill be at last denied by the entire system. A trust proposal instrument is likewise designed to trade trust data among hubs. Key Words: AODV, MANET’s, TAODV 1. INTRODUCTION A mobile ad hoc network (MANET) is a kind of wireless network without centralized administration or fixed networkinfrastructure,inwhichnodesperformroutingdiscoveryandroutingmaintenanceinaself-organizedway. Nowadays MANET enables many promising applications areas of aerospace and military. Due to some of its characteristics such as openness, mobility, dynamic topology and protocol weaknesses, MANETs are prone to be unstable and vulnerable. Consequently, their security issues become more urgent requirements and it is more difficult to design and implement security solutions for MANETs than for wired networks. Many security schemes from different aspects of MANETs have been proposed, such as secure routing protocols and secure key management solutions. However, most of them assume centralized units or trusted third-parties to issue digital certificates, which actually destroy the self-organization nature of MANETs. Andbyrequiringnodestorequestand verify digital signaturesallthetime,thesesolutionsoftenbringhugecomputationoverheads.Oursolutionis,onthe other hand, a secure routing protocol which employs the idea of a trust model so that it canavoidintroducinglarge overheads andinfluencingthe self-organization nature of MANETs. In this paper, weapplythetrustmodelintothe security solutions of MANETs. Our trust model is derived and modified from subjective logic, which qualitatively defines the representation, calculation, andcombination of trust. Trust models have found securityapplicationsin e-commerce, peer-to-peer networks, and some other distributed systems. In recent years, some research work is conducted to apply trust models into the security solutions of MANETs. However, there are no concrete and applicable designs proposed for the security of routing protocols in MANETs, to the best of our knowledge. 2. BACKGROUND Subjective logic is a kind of trust model which was proposed by A. Josang. It is “a logicwhichoperatesonsubjective beliefs about the world, and uses the term opinion to denote the representation of a subjective belief”. The trust between two entities is then represented by opinion. An opinion can be interpreted as a probability measure
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7943 containing secondary uncertainty. In MANET, nodes move with high mobility and may experience long distancein space among each other. Anode may be uncertain about anothernode’strustworthinessbecauseitdoesnotcollect enough evidence. This uncertainty is a common phenomenon, therefore we need a model to represent such uncertainty accordingly. Traditional probability model, which is also used in some trust models, cannot express uncertainty. While in subjective logic, an opinion consists of belief, disbelief and also uncertainty, which gracefully meets our demands. Subjective logic also provides a mapping method to transform trust representation between the evidence space and the opinion space. Our trust model used in TAODV is then derived and modified from the subjective logic and is more applicable for the instance of MANET. In the subjective logic, an opinion includes four elements. The fourth one is relative atomicity. Ad hoc On-demand Distance Vector Routing Protocol Ad hoc On- demand Distance Vector (AODV) routing protocol is one of the most popular routing protocols for MANETs. On demand is a major characteristic of AODV, which means that a node only performs routing behaviours when it wants to discover or check route paths towards other nodes. This will greatly increase the efficiency of routing processes. Routing discovery and routing maintenance are two basic operations in AODV protocol. Routing discovery happens when a node wants to communions. These mechanisms have been proposed in some previous work, such as intrusion detection system in and watchdog technique in. Another kind of secure routing protocol which uses cryptography technologies is recommended to take effect before nodes in the TAODV establish trust relationships among one another and are the latest security schemes for securing MANET, which employ cryptography technologies. We assume that the keys and certificates needed by these cryptographic technologies have been obtained through some key management procedures. 3. OVERVIEW OF THE TRUSTED AODV (TAODV) Network Model and Assumptions In this work, we make some assumptions and establish the network model of TAODV. We also argue why we focus our securitysolutiononroutingprotocolinthenetworklayer.Mobilenodesin MANETs often communicate with one another through an error-prone, bandwidth-limited, and insecure wireless channel. We do not concern the security problem introduced by the instability of physical layer or link layer. We only assume that: (1) Each node in the network has the ability to recover all of its neighbors; (2) Each node in the network can broadcast some essential messages to its neighborswithhighreliability;(3)Eachnodeinthenetwork possesses a unique ID, the physical network interfaceaddress forexamplethatcanbedistinguishedfromothers.In the TAODV, we also assume that the system is equipped with some monitor mechanisms or intrusion detection units either in the network layer or the application layer so that one node can observe the behaviors. Framework of the Trusted AODV There are mainly three modules in thewholeTAODVsystem:basicAODVroutingprotocol,trustmodel,andtrusted AODV routing protocol. Based on our trust model, the TAODV routing protocol contains such procedures as trust recommendation, trust combination,trustjudging,cryptographicroutingbehaviors,trustedroutingbehaviors,and trust updating. The structure and relationship among these components are shown in Figure1. The general procedure for establishing trust relationships among nodes and for performing routing discovery is described as follows. Let us first imagine the beginning of an ad hoc network which contains a few nodes. Each node’s opinion towards one another initially is (0,0,1), which means that the node does not trust or distrust another node but it is only uncertain about another node’s trustworthiness. 4. TRUST MODEL FOR TAODV Trust Representation Our trust model is an extension of the original trust model in subjective logic which is introduced in Section 2. In our trust model, opinion is a 3-dimensional metric and is defined as follows:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7944 Definition 1(Opinion).Letdenoteanynode’sopinionaboutanynode’strustworthinessinaMANET,wherethefirst, second and third component correspond to belief, disbelief and uncertainty, respectively. These three elements satisfy: In this definition, belief means the probability of a node can be trusted by a node, and disbelief means the probability of cannot be trusted by. Then uncertainty fills the void in the absence of both belief and disbelief, and sum of these three elements. Mapping between the Evidence and Opinion Spaces A node in MANET will collect and record all the positive and negative evidences about other nodes’ trustworthiness, which will be explained in detail in Section 5. With these evidences we can obtain the opinion value by applying the following mapping equation which is derived from. Definition 2 (Mapping). Let be node A’s opinion about node B’s trustworthiness in a MANET, and let p and n respectively be the positive and negativeevidences collectedbynodeAaboutnodeB’strustworthiness,thencanbe expressed as a function of p and n according to: Trust Combination In our trust model, a node will collect all its neighbors opinions about another node and combine them together using combination operations. In this way, the node can make a relatively objective judgment about another node’s trustworthiness even in case several nodes are lying. The followings are two combination operations nodes may adopt: Discounting Combination and Consensus Combination. 5. ROUTING OPERATIONS IN TAODV Node Model We add three new fields into each node’s original routing table: positive events, negative events and opinion. Positive events are the successful communication times between two nodes.Similarlynegativeeventsare thefailedcommunicationones.Opinionmeansthisnode’sbelieftowardsanother node’strustworthinessasdefined before. The value of opinion can be calculated according to Formula 2. These three fieldsarethemainfactorswhen performing trusted routing. One node’s routing table can be illustrated by Figure 2, where some fields are omitted for highlighting the main parts. Trust Judging Rules Before describing the process of trusted routing discovery and maintenance in detail, we predefine some trust judging rules here andinTable1.(1)Innode’sopiniontowardsnode’strustworthiness,if thefirstcomponentbelief of opinion is larger than 0.5,will trust and continue to perform routing related to.(2) In node’s opinion towards node ’s trustworthiness, if the secondcomponent disbelief of opinionislargerthan0.5,willnottrust andwillrefuse to performing routing related to. Accordingly the route entry for in routing table will be disabled anddeletedafter an expire time.(3) In node’s opiniontowardsnode’strust worthiness,ifthethirdcomponentuncertaintyofopinion is larger than 0.5,will request ’s digital signature when ever has interaction (or relationship) with .(4) In node’s opinion towards node ’s trustworthiness, if the three componentsofopinionareallsmallerthanor equalto0.5,will request ’s digital signature whenever has interaction(or relationship) with.(5)Ifnodehas norouteentryinnode’s routing table’s opinion about is initialized as (0,0,1). Trust Updating Policies Opinions among nodes change dynamically with the increase of successful or failed communication times. When and how to update trust opinions among nodes will follow some policies. We derive as follows:
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7945 (1) Each time a node has performed a successful communication with another node , including forwarding route requests or replies normally, generating route requests or route replies normally, etc., ’s successful events in’s routing table will be increased by . (2) Each time a node has performed a failed communication with another node including forwarding route requests or replies abnormally, generating route requests or route replies abnormally, authenticating itself incorrectly, and so on, ’s failed events in’s routing table will be increased by . (3) Each time when the field of the successful or failed events changes, the corresponding value of opinion will be recalculated using Equation 2 from the evidence space to the opinion space. (4) If node’s route entry has been deleted from node’s route table because of expiry, or there is no ’s route entry from the beginning, the opinion will be set to (0,0,1). Trust Recommendation Existing trust models seldom concern the exchange of trust information. However, it is necessary to design an information exchange mechanism when applying the trust models into network applications. In our trust recommendation protocol, there are three types of messages:TrustRequestMessage(TREQ),TrustReplyMessage (TREP), and TrustWarning Message (TWARN). Nodes who issue TREQ messages are called Requestor. Those who reply TREP messages are called Recommender. When a node wants to know another node’s new trustworthiness, it will issue an TREQ message to its neighbors. TREQmessage uses the above structureandleavesthefieldsofRecommender,OpinionandExpiryempty.TheType field is set to 0. Nodes which receive the TREQ message will reply with an TREP message with the Type field set to 1. When a node believes that another node has become malicious orunreliable,itwillbroadcastaTWARNmessage with the Type set to 2 to its neighbors. Trusted Routing Discovery We take AODV for example to illustrate how to perform trusted routingdiscoveryusingtheideaofourtrustmodel. Scenario I: Beginning of A TAODV MANET—Let us consider a simple MANET which only contains 3 nodes: Now suppose node wants to discover a route path to node. The processes of node, , and are listed below. 1. Broadcasts an RREQ requesting route path to , then begins waiting for an RREP from its neighbor . Fig. 5.1 Broadcast Nodes
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 3 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7946 6. ANALYSIS By introducing the idea of the trust model into our design, we are able to establish a more flexible and less overhead secure routing protocol for MANETs. From performance point of view, our trusted routing protocol introduces less computation overheads than other security solutions n for MANETs. This design does not need to perform cryptographic computations in every packet, which will cause huge time and performance consumption. After the trust relationship is established, the subsequent routing operations canbeperformedsecurelyaccording to trust information instead of certificates all the time. Therefore, the TAODV routing protocol improves the performanceofsecuritysolutions.Unlikesomeprevioussecurityschemes[3][4],whosebasisofroutingoperations is “blind un-trust”, TAODVdonotdecreasetheefficiencyofroutingdiscovery andmaintenance.Fromsecuritypoint of view, our design will detect nodes’ misbehavior finally and reduce the harms to the minimum extent. When a good node is compromised and becomes a bad one, its misbehavior willbedetectedbyitsneighbors.Thenwith the help of trust update algorithm, the opinions from the other nodes to this node will be updated shortly. Thus this node will be denied access to the network. 7. CONCLUSION AND FUTURE WORK This paper is the first to apply the idea of a trust model in subjective logic into the security solutions of MANETs. The trust and trust relationship among nodes can be represented, calculated and combined using an item opinion. In our TAODV routing protocol, nodes can cooperate together to obtain an objective opinion about another node’s trustworthiness. They can also perform trusted routing behaviors according to the trustrelationshipamongthem. With an opinion threshold, nodes can flexibly choose whether and how to perform cryptographic operations. Therefore, the computational overheads are reduced without the need of requesting and verifying certificates at every routing operation. In summary, our trustedAODVroutingprotocolisamorelight-weightedbutmoreflexible security solution than other cryptography and authentication designs. REFERENCES [1] S. Corson and J. Macker, “Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations (rfc2501),” January 1999, http://www.ietf.org/rfc/rfc2501.txt. [2] C. E. Perkins, Ed., Ad Hoc Networking. Boston: Addison-Wesley, 2001. [3] Y. Teng, V. V. Phoha, and B. Choi, “Design of trust metrics based on dempster-shafer theory,” http://citeseer.nj.nec.com/461538.html. [4] E. Gray, J.-M. Seigneur, Y. Chen, and C. Jensen, “Trust propagation in small worlds,” in Proceedings of the 1st International Conference on Trust Management, 2002, http://citeseer.nj.nec.com/575876.html. [5] A. Abdul-Rahman and S. Halles, “A distributed trust model,” in Proceedings of New SecurityParadigms Workshop ’97, 1997, pp. 48–60.