MANET (Mobile Ad-hoc Network) is hot spot for research due to its various advantages and
disadvantages. Providing safe communication between mobile nodes, recognization the position of
nodes, reducing overhead, handling misbehavior and location updates are such a difficult issues in
ad-hoc network, so providing trust schemes is an important in this network. MANET provides some
basic functions like routing, communication, network management and packet forwarding etc over
self organized network. Because MANET has not a fixed topology, in which mobile nodes comes and
leaves the network within a random period of time. It effects energy, bandwidth and memory
computations of network. Providing trust in MANET is such a crucial task because it doesn’t having
centralized infrastructure. In this paper, we survey the different trust model schemes of MANET with
their unique features, merits and demerits & findings.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
A Survey of Techniques Used To Detect Selfish Nodes in MANETijsrd.com
An mobile Ad Hoc network is a collection of mobile nodes. They do not have any existing infrastructure and they do not have any centralized administrator. So the MANET is self-creating, self-organizing and self-administrative wireless network. In MANET each node acts as router. In practice some of the nodes may act as the selfish nodes. These nodes use the network and its services but they do not cooperate with other nodes. Such selfish nodes do not consume any energy such as CPU power, battery and bandwidth for retransmitting the data of other nodes. They will preserve the resources for their own use. In this paper we have provide the comparative study of different type of methods to increase the selfish node detection and the network throughput
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have
a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring
down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating
malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using
trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective
trust determination algorithm. This paper presents the performance analysis of a recently developed trust
determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The
performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The
simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and
isolating any maliciously behaving node(s) in a timely manner.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
A Survey of Techniques Used To Detect Selfish Nodes in MANETijsrd.com
An mobile Ad Hoc network is a collection of mobile nodes. They do not have any existing infrastructure and they do not have any centralized administrator. So the MANET is self-creating, self-organizing and self-administrative wireless network. In MANET each node acts as router. In practice some of the nodes may act as the selfish nodes. These nodes use the network and its services but they do not cooperate with other nodes. Such selfish nodes do not consume any energy such as CPU power, battery and bandwidth for retransmitting the data of other nodes. They will preserve the resources for their own use. In this paper we have provide the comparative study of different type of methods to increase the selfish node detection and the network throughput
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have
a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring
down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating
malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using
trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective
trust determination algorithm. This paper presents the performance analysis of a recently developed trust
determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The
performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The
simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and
isolating any maliciously behaving node(s) in a timely manner.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Abstract
Mobile ad-hoc network (MANET) is one of the most propitious area in research and development of wireless network. Popularity
of mobile device and wireless networks significantly increased over the past years. MANET has no centralized control to handle
the network, so this may cause to fails the functioning. This characteristic force a component node to be careful when
communicating with other nodes as the behavior of nodes change with time and environmental conditions, so the security issues
may arise like impersonation etc. Therefore behavior of node should consider improving the security of MANET. This is mostly
important in big network where heterogeneous nodes are the parts of network for e.g. tactical and social network. The behavior of
node is shown in the form of numerical value called as trust. Trust is calculated and aggregated and shared among network.
Every node’s generated trust is on the basis of serious study, others node opinion, and previous interaction and their own policy.
In this report, we have analyzed different proposed trust based mechanism and trust evaluation based security solution. These
techniques are proposed to make trust security solutions more effective.
Keywords: Manet, Trust, Smrti, Maturity-Based Model, Rep, Truism
Security Enhancement using Trust Management in MANETsIJTET Journal
Abstract— The distinctive options of mobile ad hoc networks (MANETs), victimization recent advances in unsure reasoning originated from AI community, we tend to projected a unified trust management schemes Mobile Ad-hoc networks area unit self-organizing and self re-configuring multi hop wireless networks wherever, the structure of the network changes dynamically the safety of the OLSR protocol is rib by a selected variety of attack known as ‗Black Hole‘ attack. During this attack a malicious node advertises itself as having the shortest path to the destination node. To combat with region attack, it\'s projected to attend and check the replies from all the neighboring nodes to search out a secure route with protection to our data, however this approach suffers from high delay. Associate in Nursing approach is projected to combat the region attack by victimization Trust management schemes with neighbors WHO claim to possess a route to destination. during this project we tend to area unit victimization NS2.34 software system for our projected model testing. and that we got the simplest result against the safety attack.
The working of MANET protocol, may compromise the security in it. In this paper, we propose a new key
exchange method to improve the security of MANETs. In this proposed mechanism we send the key through the
control packets instead data packets. By using this mechanism we can ensure that even if the intruder gets access to
the data packet he cannot decrypt it because there is no key associated with the packet. Brute force attack also
becomes infeasible because the packet is alive in the network for a less time
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network’s topology causes weak trust relationship among the nodes in the network. . In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs is divided into groups having a group leader in each group. Group leader has responsibility of key management in its group. Proposed key management scheme is a decentralized scheme that does not require any Trusted Third Party (TTP) for key management. In proposed key management system, both a new node and group leader authenticates each other mutually before joining the network. While proposed secure routing protocol allows both communicating parties as well as intermediate nodes to authenticate other nodes and maintains message integrity.
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...ijcisjournal
The present work is dedicated to study attacks and countermeasure in MANET. After a short introduction to what the Mobile Ad hoc Networks (MANETs) are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. We also study a mechanism of security, named the reputation, proposed for the MANETs and the protocol which implements it. We also propose a secure mechanism which is based on the reputation. Our work ends with a proposal analytical model to the modules of our mechanism and the equilibrium states of our model.
Generating images from a text description is as challenging as it is interesting. The Adversarial network
performs in a competitive fashion where the networks are the rivalry of each other. With the introduction of
Generative Adversarial Network, lots of development is happening in the field of Computer Vision. With
generative adversarial networks as the baseline model, studied Stack GAN consisting of two-stage GANS
step-by-step in this paper that could be easily understood. This paper presents visual comparative study of
other models attempting to generate image conditioned on the text description. One sentence can be related
to many images. And to achieve this multi-modal characteristic, conditioning augmentation is also
performed. The performance of Stack-GAN is better in generating images from captions due to its unique
architecture. As it consists of two GANS instead of one, it first draws a rough sketch and then corrects the
defects yielding a high-resolution image.
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move
randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In
MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc.
When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in
loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an
insider. Among various mobility models to generate mobility patterns the Random waypoint mobility
model is used .To solve these issues an IDPS framework for MANET using image processing techniques
under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like
authentication and confidentiality.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
The emerging trend of using mobile agents for mobile adhoc network (MANET) applications intensifies the need for protecting them. Here we propose a distributed trust based framework to protect both the agents and the host platforms (running at the nodes) especially against threats of the underlying environment where agents may get killed or rerouted by visiting hosts. The best way to defend against this situation is to prevent both the hosts and agents from communicating with the malicious ones. In this regard this paper develops a distributed reputation model of MANET using concepts from DempsterShafer theory. The agents (deployed for some purposes like ervice discovery) while roaming in the networkwork collaboratively with the hosts they visit to form a consistent trust view of MANET. An agent may exchange information about suspected nodes with a visiting host. To speed up convergence, information about an unknown node can be solicited from trusted neighborhood. Thus an inactive node, without deploying agents may also get a partial view of the network. The agents can use combination of encryption and digital signature to provide privacy and authentication services. Node mobility and the effect of environmental noise are considered. The results show the robustness of our proposed scheme even in bigger networks.
Placate packet dropping attack using secure routing protocol and incentive ba...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
A TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKSpijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
A Novel Energy Efficient and Administrator Based Secured Routing in MANETIJNSA Journal
The lack of static infrastructure causes several issues in mobile Ad Hoc network , such as energy utilization, node authentication and secure routing. In this paper we propose a new scheme for energy efficient secure routing of data packets in MANET. This approach will reduce the computational overhead to make it more energy efficient than existing schemes. As there is no stationary infrastructure,each node in MANET acts a router that forwards data packets to other nodes. Therefore selection of effective, suitable, adaptive and robust routing scheme is of utmost importance. We have reduced the amount of network activity for each node required to route a data packet. This leads to lesser wastage of energy and increases security.Our simulation results will show how this is energy efficient and
secure. Finally we have discussed how this scheme prevents various attacks which may jeopardize any wireless network.
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
More Related Content
Similar to Different Ways to Achieve Trust in MANET
Abstract
Mobile ad-hoc network (MANET) is one of the most propitious area in research and development of wireless network. Popularity
of mobile device and wireless networks significantly increased over the past years. MANET has no centralized control to handle
the network, so this may cause to fails the functioning. This characteristic force a component node to be careful when
communicating with other nodes as the behavior of nodes change with time and environmental conditions, so the security issues
may arise like impersonation etc. Therefore behavior of node should consider improving the security of MANET. This is mostly
important in big network where heterogeneous nodes are the parts of network for e.g. tactical and social network. The behavior of
node is shown in the form of numerical value called as trust. Trust is calculated and aggregated and shared among network.
Every node’s generated trust is on the basis of serious study, others node opinion, and previous interaction and their own policy.
In this report, we have analyzed different proposed trust based mechanism and trust evaluation based security solution. These
techniques are proposed to make trust security solutions more effective.
Keywords: Manet, Trust, Smrti, Maturity-Based Model, Rep, Truism
Security Enhancement using Trust Management in MANETsIJTET Journal
Abstract— The distinctive options of mobile ad hoc networks (MANETs), victimization recent advances in unsure reasoning originated from AI community, we tend to projected a unified trust management schemes Mobile Ad-hoc networks area unit self-organizing and self re-configuring multi hop wireless networks wherever, the structure of the network changes dynamically the safety of the OLSR protocol is rib by a selected variety of attack known as ‗Black Hole‘ attack. During this attack a malicious node advertises itself as having the shortest path to the destination node. To combat with region attack, it\'s projected to attend and check the replies from all the neighboring nodes to search out a secure route with protection to our data, however this approach suffers from high delay. Associate in Nursing approach is projected to combat the region attack by victimization Trust management schemes with neighbors WHO claim to possess a route to destination. during this project we tend to area unit victimization NS2.34 software system for our projected model testing. and that we got the simplest result against the safety attack.
The working of MANET protocol, may compromise the security in it. In this paper, we propose a new key
exchange method to improve the security of MANETs. In this proposed mechanism we send the key through the
control packets instead data packets. By using this mechanism we can ensure that even if the intruder gets access to
the data packet he cannot decrypt it because there is no key associated with the packet. Brute force attack also
becomes infeasible because the packet is alive in the network for a less time
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network’s topology causes weak trust relationship among the nodes in the network. . In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs is divided into groups having a group leader in each group. Group leader has responsibility of key management in its group. Proposed key management scheme is a decentralized scheme that does not require any Trusted Third Party (TTP) for key management. In proposed key management system, both a new node and group leader authenticates each other mutually before joining the network. While proposed secure routing protocol allows both communicating parties as well as intermediate nodes to authenticate other nodes and maintains message integrity.
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...ijcisjournal
The present work is dedicated to study attacks and countermeasure in MANET. After a short introduction to what the Mobile Ad hoc Networks (MANETs) are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. We also study a mechanism of security, named the reputation, proposed for the MANETs and the protocol which implements it. We also propose a secure mechanism which is based on the reputation. Our work ends with a proposal analytical model to the modules of our mechanism and the equilibrium states of our model.
Generating images from a text description is as challenging as it is interesting. The Adversarial network
performs in a competitive fashion where the networks are the rivalry of each other. With the introduction of
Generative Adversarial Network, lots of development is happening in the field of Computer Vision. With
generative adversarial networks as the baseline model, studied Stack GAN consisting of two-stage GANS
step-by-step in this paper that could be easily understood. This paper presents visual comparative study of
other models attempting to generate image conditioned on the text description. One sentence can be related
to many images. And to achieve this multi-modal characteristic, conditioning augmentation is also
performed. The performance of Stack-GAN is better in generating images from captions due to its unique
architecture. As it consists of two GANS instead of one, it first draws a rough sketch and then corrects the
defects yielding a high-resolution image.
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move
randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In
MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc.
When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in
loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an
insider. Among various mobility models to generate mobility patterns the Random waypoint mobility
model is used .To solve these issues an IDPS framework for MANET using image processing techniques
under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like
authentication and confidentiality.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
The emerging trend of using mobile agents for mobile adhoc network (MANET) applications intensifies the need for protecting them. Here we propose a distributed trust based framework to protect both the agents and the host platforms (running at the nodes) especially against threats of the underlying environment where agents may get killed or rerouted by visiting hosts. The best way to defend against this situation is to prevent both the hosts and agents from communicating with the malicious ones. In this regard this paper develops a distributed reputation model of MANET using concepts from DempsterShafer theory. The agents (deployed for some purposes like ervice discovery) while roaming in the networkwork collaboratively with the hosts they visit to form a consistent trust view of MANET. An agent may exchange information about suspected nodes with a visiting host. To speed up convergence, information about an unknown node can be solicited from trusted neighborhood. Thus an inactive node, without deploying agents may also get a partial view of the network. The agents can use combination of encryption and digital signature to provide privacy and authentication services. Node mobility and the effect of environmental noise are considered. The results show the robustness of our proposed scheme even in bigger networks.
Placate packet dropping attack using secure routing protocol and incentive ba...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
A TRUST-BASED PREDICTIVE MODEL FOR MOBILE AD HOC NETWORKSpijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
A Novel Energy Efficient and Administrator Based Secured Routing in MANETIJNSA Journal
The lack of static infrastructure causes several issues in mobile Ad Hoc network , such as energy utilization, node authentication and secure routing. In this paper we propose a new scheme for energy efficient secure routing of data packets in MANET. This approach will reduce the computational overhead to make it more energy efficient than existing schemes. As there is no stationary infrastructure,each node in MANET acts a router that forwards data packets to other nodes. Therefore selection of effective, suitable, adaptive and robust routing scheme is of utmost importance. We have reduced the amount of network activity for each node required to route a data packet. This leads to lesser wastage of energy and increases security.Our simulation results will show how this is energy efficient and
secure. Finally we have discussed how this scheme prevents various attacks which may jeopardize any wireless network.
Similar to Different Ways to Achieve Trust in MANET (20)
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approachpijans
The number of vehicle used in the world are increasing day by day resulting in the obvious problem of
parking of these vehicle’s in residential and vocational areas. We perceive the problem of vehicles parking
in vocational establishments / malls. Today majority of parking systems are manual parking systems where
in, on the spot, parking of the vehicle is done and a parking slip is generated and handed over to customer.
This is cumbersome technique wherein various parking attendants in the parking areas manually keeps on
informing the Parking inspector on how many free parking slots available so that only that many number of
parking slips/tickets are generated as the number of free parking slots. We address the problem of parking
in Delay Tolerant Network (DTN) by proposing metaheuristic driven approach of Ant Colony optimization
(ACO) technique with anycast semantics models . Here we propose the parking architecture to solve the
problem of parking especially in commercial areas with their design diagrams . In this architecture we
apply the delivery model to deliver the packet correctly to the intended receiver. Using this we can book
various parking’s through remote areas so that the customer can get the information about availability of
various parking’s inside an area and the parking fare for each category of the automobile. Using this
architecture the customer can get the prior knowledge about various vacant parking slots inside a parking
area and he can book the corresponding parking from his location.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...pijans
Mobile Adhoc Networks is a wireless network and it has become an important technology in current years
in which security has become an important problem. Black hole Attack is one of the promising and severe
security attacks in mobile ad hoc networks which block the communication of secret data during packet
delivery. Black hole attack directly attacks the node’s data traffic on the path and with intent drops, alters
or delays the data traffic passing through that node. In other type of black hole attack which misleadingly
replies for the route request which comes from the node which initiates the route discovery process that it
has as much as necessary routes to the destination even it does not have path to the destination. This paper
deals with prevention of black hole attacks using Shamir’s secret sharing and Random Multipath Routing
Algorithm
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
Power conservation in Mobile Ad hoc Network (MANET) is a major challenge even today for researchers.
To conserve it various power aware routing protocols have been proposed. These protocols do not take into
consideration the residual power left in nodes. To find the impact of the same a simulator was designed in
MATLAB-7.01. The routing protocol used in our simulation is Minimum Total Power Routing (MTPR) and
different performance metrics such as path optimality, throughput and hop count were recorded in
presence and absence of power scarce node. The result shows significant impact of power scarce node on
MANET performance.
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
In Vehicular Ad hoc Networks (VANETs) the mobility of the nodes is the main concern. This mobility of
nodes makes the route unstable and unreliable for the information exchange and communication between
two nodes in the network. To enhance the performance and throughput of the VANETs, routes between
nodes must be reliable and stable. In this paper, we study the significance of path duration and link
duration in Vehicular Ad hoc Networks (VANETs). Because of this mobility, connectivity graphs changes
very frequently and it affects the performance of VANETs. Therefore, path duration can be used to predict
the behaviour of the mobile nodes in the network. Estimation of the path duration in VANETs can be a key
factor to improve the performance of the routing protocol. Estimation of path duration is a challenging task
to perform as it depends on many parameters including node density, transmission range, numbers of hops,
and velocity of nodes. This paper will provide a comprehensive study for estimating the path duration in
VANETs.
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
As there is a growing need for the cost effective and highly dynamic large-bandwidth networks over large
coverage area , the Wireless Mesh Network provide first step towards effective communication. A Wireless
Mesh Network is one of the most advanced wireless network used for communication. During their
operating period , the wireless mesh network may suffer from frequent link failure which results in poor
performance of network. Link failure detection plays crucial role in performance of WMN. The proposed
paper presents the review of various techniques used for detection of link failure and the techniques used
for recovery of wireless mesh network.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
This document is Intended for the purpose of Enabling the power of social media to Empower Ridesharing.
this entails the creation of an ad-ridesharing Initiative with a view to tackling real-world problems such as
traffic congestion and the ever-increasing fuel prices. The main objectives include creating applications,
both web and mobile based, to seamlessly integrate the app’s functionality into and everyday user’s
routine.
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The
main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These
schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we
have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that
allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance
between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also
adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make
neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through
the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show
significant improvement in protocol.
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
In this paper, we present a comprehensive overview on Ad hoc networking by directional antennas. Use of
Directional antennas can largely reduce the interference, increase the spatial reuse and due to their longer
range we can have routes with fewer hop for two distant nodes. However the main problem of using
directional antennas in Ad hoc networks is due to the dynamic nature of the network. Neighbour discovery,
maintenance the track of moving neighbours, exploitation of the benefit of long range and directional MAC
protocols are the most challenging issues. We present three Directional MAC protocols and two
combinational protocols and system which give solutions to MAC and Neighbour discovery and compare
the throughput of them with 802.11 with omnidirectional antennas.
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
The widespread adoption of IEEE 802.11 WLANs is attributed to their inherent mobility, flexibility, and
cost-effectiveness. Within the IEEE 802 working group, a dedicated task group is diligently advancing
WLAN technologies, particularly tailored for dense network scenarios. Amidst these advancements, the
802.11ac protocols have emerged as a preferred choice, delivering superior data transfer rates compared
to the preceding 802.11n standard. Significantly, the sixth-generation wireless protocol, IEEE 802.11ax,
has been introduced, showcasing enhanced performance capabilities that outpace its fifth-generation
predecessor, 802.11ac.In this pioneering investigation, we engage in an in-depth simulation-based scrutiny
of prominentWLAN protocols—namely, IEEE 802.11n, IEEE 802.11ac, and the cutting-edge IEEE
802.11ax. Our exhaustive analyses traverse a spectrum of critical metrics, encompassing throughput,
coverage, spectral efficiency, Tx/Rx gain, and Tx/Rx power.In a single-user and SISO scenario, both
802.11ac and 802.11ax outperform 802.11n. Significantly, 802.11ax surpasses the previous 802.11n/ac
standards, highlighting substantial advancements in wireless performance.
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
Mobile Ad-hoc Networks (MANETS) consists of a collection of mobile nodes without having a central
coordination. In MANET, node mobility and dynamic topology play an important role in the performance.
MANET provide a solution for network connection at anywhere and at any time. The major features of
MANET are quick set up, self organization and self maintenance. Routing is a major challenge in MANET
due to it’s dynamic topology and high mobility. Several routing algorithms have been developed for
routing. This paper studies the AODV protocol and how AODV is performed under multiple connections in
the network. Several issues have been identified. The bandwidth is recognized as the prominent factor
reducing the performance of the network. This paper gives an improvement of normal AODV for
simultaneous multiple connections under the consideration of bandwidth of node.
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
Personal Communication Network (PCN) is an emerging wireless network that promises many new
services for the telecommunication industry. The proliferation of demands for extending wireless services
to integrated services, which supports the transmission of data and multimedia information, has resulted in
the need for broadband wireless systems that are able to provide service capabilities similar to those of
wire line networks. The ATM cell - relay paradigm is one possible approach to provide broadband wireless
transmission with PCN’s using the ATM switching networks for interconnection of PCN cells. As traffic in
these mobile cellular networks increases, Handoffs will become an increasingly important issue. As cell
sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff
schemes need to be used. In this paper, the authors describe the use of novel and efficient data structure
which dynamically allocates guard channel for handoffs and introduces the concept of channel borrowing
strategy. The proposed scheme allocates the guard channels for handoff requests dynamically, based on the
traffic load for certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and
handoff calls. This approach maximizes the channel utilization. The simulation results prove that the
channel borrowing scheme improves the overall throughput.
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a challenge. However, the impact of EVs varies significantly between each LVDN area and charging scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and 60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be distributed over several days, thus raising concerns about how to prevent it. The broader implications of our research suggest that, despite initial worries primarily centered on congestion due to unregulated charging during peak hours, a transition to cost-based smart charging, propelled by an increasing awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization, bringing about undesirable consequences for the power distribution network (PDN).
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV
charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV
adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized
municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a
challenge. However, the impact of EVs varies significantly between each LVDN area and charging
scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and
60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be
beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely
lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be
distributed over several days, thus raising concerns about how to prevent it. The broader implications of
our research suggest that, despite initial worries primarily centered on congestion due to unregulated
charging during peak hours, a transition to cost-based smart charging, propelled by an increasing
awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization,
bringing about undesirable consequences for the power distribution network (PDN).
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
In this paper, a multilayer perceptron guided key generation for encryption/decryption (MLPKG) has been
proposed through recursive replacement using mutated character code generation for wireless
communication of data/information. Multilayer perceptron transmitting systems at both ends accept an
identical input vector, generate an output bit and the network are trained based on the output bit which is
used to form a protected variable length secret-key. For each session, different hidden layer of multilayer
neural network is selected randomly and weights or hidden units of this selected hidden layer help to form
a secret session key. The plain text is encrypted using mutated character code table. Intermediate cipher
text is yet again encrypted through recursive replacement technique to from next intermediate encrypted
text which is again encrypted to form the final cipher text through chaining , cascaded xoring of multilayer
perceptron generated session key. If size of the final block of intermediate cipher text is less than the size of
the key then this block is kept unaltered. Receiver will use identical multilayer perceptron generated
session key for performing deciphering process for getting the recursive replacement encrypted cipher text
and then mutated character code table is used for decoding. Parametric tests have been done and results
are compared in terms of Chi-Square test, response time in transmission with some existing classical
techniques, which shows comparable results for the proposed technique.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
Manet Security Breaches : Threat to A Secure Communication Platformpijans
Ad-hoc networks are the collection of autonomous nodes where all the nodes are configured dynamically
without any centralized management system. Mobile Adhoc Networks (MANETs) are self-configuring
network of mobile routers connected via a wireless link. However,the feature of decentralization and
dynamic configuration of nodes makes MANETs vulnerable to various security attacks,that are otherwise
not so common in a wired network. For mitigation of these attacks,several secured routing protocols are
being proposed till now. This paper provides the view of overall security breaches present in the Ad-hoc
Networks till now and will discuss in brief about the several proposed secure routing protocols.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Different Ways to Achieve Trust in MANET
1. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
DOI : 10.5121/ijans.2012.2206 53
Different Ways to Achieve Trust in MANET
Renu Dalal1#
, Manju Khari 1
and Yudhvir Singh2
1
Computer Science & Engg. Department, Ambedkar Institute of Technology, New Delhi,
India.
2
Department of Computer Science & Engg, U.I.E.T M.D University Rohtak, India
#
Coressponding Auther: dalalrenu1987@gmail.com
ABSTRACT
MANET (Mobile Ad-hoc Network) is hot spot for research due to its various advantages and
disadvantages. Providing safe communication between mobile nodes, recognization the position of
nodes, reducing overhead, handling misbehavior and location updates are such a difficult issues in
ad-hoc network, so providing trust schemes is an important in this network. MANET provides some
basic functions like routing, communication, network management and packet forwarding etc over
self organized network. Because MANET has not a fixed topology, in which mobile nodes comes and
leaves the network within a random period of time. It effects energy, bandwidth and memory
computations of network. Providing trust in MANET is such a crucial task because it doesn’t having
centralized infrastructure. In this paper, we survey the different trust model schemes of MANET with
their unique features, merits and demerits & findings.
KEYWORDS:
MANET, Trust, Cluster based, Maturity based, PKI, ABED.
1. INTRODUCTION
MANET (Mobile Ad-hoc Network) is a structureless & dynamics network, which consist of
mobile nodes without any physical link between them. There is some important properties of
MANET, which differentiates wired & wireless network. MANET is extensively used in various
fields of application like in military, home intelligence devices, PAN and Sensor networks etc [1].
Security is an important issue in wired network (like LAN, WAN, Ethernet etc) as well as in
wireless network (wireless sensor network, cognitive radio network, MANET etc). In MANET
trust can be defined as a level of belief according to the behavior of nodes (or entities, agents etc)
[2].The probability value of trust varying from 0 to1, where 0 represent DISTRUST and 1
represents TRUST [3]. According to Golybeck [4] trust has three basic properties: Transitivity,
Asymmetry and Personalization (or personal opinion).Providing trust model in ad-hoc network is
necessary because it gains higher security level and improves efficiency in network. The different
existing trust based schemes in Ad-hoc network were discussed in this paper as shown in Figure
1. Section 2 Including Protocol based trust schemes (ABED, GRE, OTHER). Section 3 presents
seven different System level based trust models, Section 4 will give the review of Cluster based
trust model, section 5 covers Maturity based trust model. PKI based trust model comes in section
6, Discuss the Summary Table in 7 section and conclusion in section 8.
2. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
54
Figure 1. Trust Based Schemes in MANET
2. PROTOCOL BASED TRUST SCHEMES
2.1 ABED
ABED is Ant Based Evidence Distribution scheme, which was purposed by Jiang & Baras [5].
This scheme uses the concept of swarm intelligence paradigm. In this scheme, mobile nodes (in
MANET) communicate indirectly with other mobile nodes through “agents” which called “ants”
in ABED. Agents found the optimal path for evaluating trust evidence, through the information
called “Pheromones” that is collected by “ants”. Features of ABED: Easily adaptive to mobility,
effectively work in structure less network. It can solve the problem of Dynamic optimization and
combinatorial optimization. Work on Stigmergy principle.
2.2 GRE
Generalized Reputation Evidence (GRE) protocol based scheme is discovered by Buckerche &
Ren [6]. The main feature of GRE is, it provide security to trusted community of MANET from
malicious nodes because GRE scheme will not entered any suspicious node in trusted network.
Merit of this scheme, neither attack is addressed on GRE model.
2.3 Other Scheme
Trust evidence evaluation scheme is discovered by Theodorakopoulos and Baras [5]. Features:
Solving path problem in directed graph. Theory of Semirings is used for provide trust between
TRUST MODEL SCHEME IN MANET
PROTOCOL
BASED
SYSTEM
LEVEL BASED
CLUSTER
BASED
MATURITY
BASED
PKI BASED
ABED BASED
TRUST
EVIEDENCE
GRE
OTHER
WATCHDOG
PATHRATER
CONFIDENT
CORE
SORI
OCEAN
LARS
3. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
55
nodes (where node as entities and link between two nodes as trust relationship) without using
direct communication between them. This model is robust in nature in presence of Intruders.
Binary variables (0 or 1) used as trust value. Trust is transistive according to this model.
3. SYSTEM LEVELBASED TRUST MODELS
System level trust model is the combination of Individual level trust model and punishment or
reward system. In this model, system will give punishment to those nodes which found as
malicious or selfish in network and also give reward to those nodes which behave in a trustworthy
way most of the time. The system level trust model includes “Trust evidence dissemination
mechanism” [7].
3.1 Watchdog
In 2000, the Watchdog trust model was discovered by [8]. Watchdog mechanism find out the
selfish node in MANET by observing each and every function (listening next node’s
transmission, exploiting promiscuous mode of operation etc) performed by mobile node. The
mobile node considered as malicious node in the two cases and source is notified, case 1: if the
packet is not forwarded by node within a certain period of time in network. Case 2: each node
have a buffer for keeping recently sent packets, if overheard packet is not same as one stored in
buffer.
3.2 Pathrater
Pathrater behaves as the Watchdog with including the feature of providing the” best route
link (which is likely to be reliable) [8] for reliable data”. For searching the best route for data,
node calculates the path metric according to observe the rating for every neighboring node which
is known in MANET. This scheme provides the shortest path selection when reliable information
is not available. If negative value exists in path metric, it indicates one or more malicious node in
the path
.
3.3 CONFIDENT
CONFIDENT is a system level based trust model, which purposed in 2002 by [9]. Nodes are
extracted in this model which does not behave normally in network. Implementation of
Cooperation of Nodes Fairness in Dynamic Network (CONFIDENT) required four components:
1 Monitor:-The node found abnormal behavior by monitoring the transmission of next node or by
behavior of route protocol. 2 Reputation System: - If any node found suspicious node in MANET,
an ALARM message sent to the trust manager component. 3 Trust Manager: - It evaluates the
trust of malicious node. The malicious node refers to as trustworthy node, if trust manager is not
capable to prove malicious behavior (exceeding threshold to rule out coincidences etc). 4 Path
Manager: - Each node having a list that contains the all malicious node and this list is
interchanged at random period of time between other nodes.
3.4 CORE
Collaborative Reputation (CORE) trust scheme was founded in 2002 by [10]. CORE scheme
differentiate the selfish node and malicious node. The nodes which not cooperate with other
nodes in the MANET, for saving battery for its own communication is called “selfish node” while
these nodes does not damage other node. The malicious node in MANET behaves abnormally
and can damage other nodes by doing any suspicious activity. CORE purposed three different
type of reputation: 1. Subjective Reputation: - Reputation value evaluated by giving priority to
4. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
56
past observation of mobile node, rather than current one. If malicious node is found out then
node’s subjective reputation value is changed by using WD (watchdog) mechanism. 2. Indirect
Reputation: - This value is calculated by providing reputation by one node to other node.
Reputation value can be updated through reply message that contains the list of nodes which
behaved normally in context of every function. If any node having negative reputation value all
requested by that node will be rejected and this node works only as service provider not as
requester. For long period of time if this node will provide correct services to all other nodes in
MANET, node can achieved their reputation value again. When reputation value is above then the
threshold reputation value, that node will again works as service provider as well as service
requester. 3. Functional Reputation: - This reputation is the combination of indirect and
subjective reputation value. The weight combine formula is used for calculation of functional
reputation value.
3.5 OCEAN
Observation Based Cooperation Enforcement in Ad-hoc Network (OCEAN) trust scheme was
discovered in 2003 by [11]. This scheme is not allowed to exchange the second hand knowledge
about nodes to other nodes in MANET. OCEAN model has five components, 1. Neighbor Watch:
- It will watch the behavior of neighboring node. 2 Route Ranker: - It maintains the route rank list
for each of the neighboring node. 3 Rank based routing: - This component extracts those routes
which contains malicious node. 4 Malicious Traffic Rejection: - All suspicious traffic is removed
from node which consider as misleading by this component. 5 Second-chance Mechanism: -
Malicious node is removed from the faulty list after a fixed duration of observation inactivity and
constant value assigned to the node.
3.6 SORI
In 2004, Secure and Objective Reputation-based Incentive (SORI) scheme was discovered by
[12]. SORI scheme takes concept of reputation rating which based on packet forwarding ratio of a
node. It consists of three components, 1. Neighbors Monitoring, This component used to collect
information of neighboring node about the behavior of packet forwarding. 2. Reputation
Propagation: - It providing information sharing of other nodes with its neighbor. 3. Punishment: -
It includes the process of removing the packet from the network. This scheme can’t differentiate
between the selfish and malicious node.
3.7 LARS
Locally Aware Reputation System (LARS) level trust model was purposed by [13] in 2006. It
provides reputation value to its entire one hop neighboring node. This value can be changed on
direct observation of neighbor node. The Warning message will be generated by the evaluator
node (EN) to its neighbor, if EN founds any node’s reputation value below to the threshold
trustworthy value.
4. CLUSTER BASED TRUST MODEL
The aim of Cluster based model to maintain trust relationship dynamically and efficiently in
MANET. The cluster based trust model for MANET was introduced in 2008 by [14]. In this
model, ad-hoc network divided into clusters. Important terms used in this model, 1. Direct trust
value: - any two nodes in cluster calculate trust value between them according to recent
transaction records. For ex.n2 and n3 takes α1 value as direct trust value in cluster c1. 2. Inter
5. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
57
cluster trust value: - Cluster head collected the recommendation information from other nodes to
compute the inter cluster trust value.3. Gateway: - It maintains interaction between MANET’s
node with adjacent cluster. 4. Routing:-Two type of cluster routing is used in this model. One is
Intra-cluster routing, the routing with in a cluster. Another is Inter-cluster routing, the routing
between two different clusters. Zone routing protocol is used in cluster based model, which is
combination of “Proactive” (intra-cluster routing) and "Reactive” (inter-cluster routing).
(A)Direct trust Representation & its computation [14, 15, 16]
From Node NJ to Ni direct trust represented as TRij
D calculation of direct trust:
/ 2
TRij m
D
t a
t a
+
=
+
tm, t ≥ 0, a > 0
(1)
In case, when there is no previous interaction between mode NJ and Ni
t is the time transactions, tm is time success and a is a positive real number. a is inversely
proportional to evidence in this model.
(B) Intercluster Recommendation Trust value’s Representation & its calculation
It is denoted as j
r
TR and calculated as:
1
1
.
t
hi ij
D D
j i
r t
hi
D
i
TR TR
TR
TR
=
=
=
∑
∑
Where TRhi
D>H, i≠j. (2)
TRhi
D is aggregation weight (direct trust value of node Ni, computed by CH), TRij
D is direct trust
recommendations information and n is the number of nodes in current cluster.
N1 N7
N5
N2 N5 CH2 N8
CH1 N6
N3 N9
N4
Figure 2. Cluster Based Trust Model in MANET
6. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
58
CLUSTER-HEAD
GATEWAY
MANET’S NODE
(C) Total trust representation & computation
It is represented as ┌ (Ni, Nj) and computed as:
┌ (Ni, Nj) = α TRij
D + βTRi
r
(3)
Where α, β ≥0 and α + β = 1. TRij
D is the direct trust between nodes Ni and Nj, α is the impact
weight of direct trust and β is the impact weight of recommendation trust.
(D) Cross cluster trust:
The cross cluster trust between nodes N3 & N7 can be calculated as:
┌ (N3, N7) =┌ (N3, N6).┌ (N6, N7)
(4)
N3 node is in cluster c1 and N7 is in c2, through node N6 (gateway) both nodes are connected.
┌(N3, N6) is the global trust of node N6 by node N3.This trust value is calculated in c1 because
node N3 and N6 locates in c1.┌(N6, N7) is global trust, which calculates in cluster c2 because
node N6 and N7 comes in cluster c2. Merits of cluster based trust model: No need of personal or
past experience of any node in MANET for evaluation of trust value on nodes. Effective work in
a small scale Ad-hoc network, Cluster head (CH) and gateways used in this model. There is no
need of centralized infrastructure. Demerits: The performances will be degraded when cluster
based model used in larger size MANET.
5. MATURITY BASED TRUST MODEL
It was disclosed in 2010 by [17], figure [5] shows Maturity based trust model. In this model,
every node having the trust values which gives view of the behavior history of their specific
neighbor in MANET. Trust values will be calculated as the combination of past experiences that
is given by node’s neighbor and also view of other neighbor. Its features are as follows: This trust
model introduces the concept of relationship maturity in Ad-hoc network. Trust increases
between people as times goes by, same concept is used in maturity based model for MANET.
Every node takes direct recommendation value to its neighborhood node only. This value will be
decreased if new neighbor comes in network. This model purposed the REP (recommendation
exchange protocol) for interchanging recommendation value for their neighbors.
7. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
59
(A) Calculation of recommendation value in Ad-hoc:
8
3 10 2
6 4 6
5 N5
Figure 3. Evaluation of recommendation value
In Figure [3], Decimal digits show how long the nodes know each other. Dotted arrows are used
for connecting the neighboring nodes. Normal arrow indicates recommendation. Here N5 is
neighboring node of N2, N1 & N3. Nodes N1 and N3 send recommendation value of N5 to N2.
N2 consider the recommendation value (5) of N3 more important than N1 because node N3
knows node N5 as longer period of time also N3 having more older experience to interact with
N5 as compared to N1.
(B) Maturity based trust model operation modes:
This model defines three types of operation modes. These are as follows: (i) Simple Mode, in
which node using trust table and REP protocol optional. Nodes operated in less power capacity.
(ii) In Intermediate Mode, nodes are operated in medium capacity and takes recommendations of
other nodes. (iii)Advanced Mode, nodes are operated in higher power capacity & developed the
system with all features. REP protocol is used for providing interface between network (TCP/IP)
and trust, learning plan of System.
(C) Evaluation of Trust in Maturity based Model:
The evaluation of trust from node a to b is denoted as Ta (b). It takes the concept of T a (b)
evaluation from [1]. Ta (b) = (1-α) Qa (b) + α Ra (b); α ranges from 0 to 1, parameter in this
model, that permits node to take most relevant factor. Qa(b) lies from 0 to 1 and presents direct
value of node a to b. Ra(b) lies between 0 to 1 and represents aggregate recommendation value of
all other neighbors.
Qa (b) = β Ea (b)+ (1-β) Ta (b); β lies between 0 to 1 and presents different weights for the factor of
eq. & select best relevant at instance. Ea (b) evaluates trust value by classifier components and Ta
(b) is the last trust value stored in trust table.
(5)
N5
5
( ) ( ) ( )
( ) ( )
a
a
a i i
i K
a
i a j
j K
T i M b X b
R
X T j M b
∈
∈
=
∑
∑
N3
N5
5
N2
5
N4
8. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
60
Where Xi (b) according to [18]
Xi (b) = N (Ti (b), σi (b)); Ra (b) defined as recommendation value from all nodes, iϵKa about node
b, X(i) is the accuracy, M(i)is the relationship maturity and value in a trust table of node i to b.
(D) Working of REP in MANET
This protocol permits the nodes to interchange recommendations value between neighboring
nodes. REP uses 3 messages, (i) Trust request (TREQ) (ii) Trust reply (TREP) (iii) Trust
advertisement (TA)
Step 1 when new nodes (TN) come in network it sends TREQ message with IP address to
each node
( )
Step 2 now neighboring node will only sends TREP with its recommendation value to
TN (target node) ( )
4
6
Figure 4 Working of REP Protocol
(E) Maturity Based Trust Model Components:
[A] Learning Plan having only three components 1. Behaviour Monitor:- This component will
togethers the data about the behavior of neighboring node and observe their actions. All output of
this component will given to classifier component. 2. Classifier:- This component is dedicated to
reason regarding the data which is collected by last component. Quality of action will be does by
this component according to past defined classification. 3. Experience Calculator:- It calculates
the partial trust value for a given mobile node.
[B] Trust Plan is composited with five different components 1. Recommendation Manager:- REP
is used for providing communication between network interface and this component. This
component is responsible for sending, receiving and storing recommendations values about nodes
in MANET. 2. Recommendation Calculator:- It calculates recommendation value and determine
trust values of mobile nodes which is based on the opinion of other node. 3. ATT:- Auxilary trust
table(ATT) having trust table which includes trust level and relationship maturity. 4. Trust
Calculator:- Experience calculator sends trust value to this component and this component
determines trust level. 5. Trust Table:- It having trust level for each neighbor.
N3
3
N4
TN
N2
3
N1
9. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
61
Figure 5. Maturity Based Trust Model
Advantages: In this model no need of authentication mechanism. There is low vulnerability to
false recommendation attack. It requires less resource consumption. This model is robust to
slander colluding attack and tolerates up to 35% of liars. Any change in behavior of node can be
easily identified by this model.
6. PKI BASED TRUST MODEL SCHEME
The PKI approach in MANET can be implemented using either distributed certification or self
organized public key management. In distributed certification scheme, by using a threshold
digital signature, which provides facility of renewing & issuing, certificates [20-22]. Demerits:
Needed additional storage requirement of public key. DOS attack not surely eliminated by this
approach.
The self organized approach using centralized CA (certification authority) as self organized
scenario [23]. Each node trusts on its neighboring node and stores information. The certificates
receive trough chain of certificates which issued by nodes. According to [24], it uses this
approach because of these reasons. All mobile nodes have equal roles. It requires less
maintenance overhead. Simple bootstrap mechanism used in this scheme.
NETWORK INTERFACE
LEARNING PLAN TRUST PLAN
BEHAVIOR
MONITOR
CLASSIFIER
EXPERIENCE
CALCULATOR
RECOMMENDATIO
N MANAGER
AUXILARY TRUST
TABLE
RECOMMENDATIO
N CALCULATOR
TRUST
CALCULATOR
TRUST TABLE
10. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
62
In this approach, each node in MANET performs these tasks:
Certificate Management: (i) Key generation, development of key pair (public key, private
key) by node themselves (ii) Certificate issuance, public key with nodes identity binds in
certificates, which issued by nodes it. (iii) Updated Certificate Repository, it is developed by
node. (iv) Certificate exchange, non updated repository constructed by interchanging the
certificates with other nodes.
Public Key verification: Searching and comparing the certificates in the chain. In algorithm,
MPR technology used which was proposed by [24]. In MPR, the redundancy of messages can be
decreased at local level. It search minimum number of nodes those required for reaching whole
network, when applied recursively. For finding smallest number of certificates chain that is
necessary to reach the node, algorithm: MPR Gout heuristic is used. This algorithm [24] defines
re- transmission set for each vertex in certificate graph. Merits: Increment of certificate rate by
using MPR technology. It reduced the length of certificate chain. Efficient verification procedure
and authentication needs less communication between nodes.
7. SUMMARY TABLE
Key Terms Protocol
based
System Level Based Cluster
Based
Maturity
Based
PKI Based
Proposed
Year
Before 2000 Between 2000 to 2006 In 2008 In 2010 In 2010
Concept Security
Protocols are
used
Using Concept of
individual level trust
model and
punishment/reward
system
Ad-hoc
network is
divided
into
clusters.
Concept of
Maturity is
introduced
for MANET
Concept of
Public Key
Infrastructu
re is
proposed
for
MANET
Way of
communicatio
n between
nodes
Indirectly Directly [a]Directly
with in one
cluster.
[b]Indirectl
y (through
CH)
between
two
clusters.
Direct Through
Certificates
Features 1 swaram
intelligence,
stimergy
principle&
theory of
simrings is
1 it can find out selfish
node (WATCHDOG).
2 provide best route link
for reliable data
(PATHRATER)
1 Zone
routing
protocol is
used
2 trust is
calculated
1 trust
increases
between
people as
time goes
by, same
1 higher
level of
security is
achieved
2 equal
work is
11. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
63
used
2 easily
adaptive to
mobility
3 solve the
problem of
dynamic and
combinatori
al
optimization
3 extracting the nodes
which not behaves
normally
(CONFIDENT)
4 can differentiates
selfish and malicious
node(CORE)
5 second hand
knowledge can’t
exchanged(OCEAN)
6 using concept of
reputation rating(SORI)
by using
mathematic
al
equations
3 no need
of personal
and past
experiences
4 CH and
gateways
are used
concept is
used
2 proposed
REP
protocol
3 using
different
types of
operation
modes.
4 no need of
authenticati
on
5 trust is
calculated
by using
mathematic
al equations
6 tolerates
up to 35%
of liars
done by
nodes in
self
organized
approach
3
centralized
CA is used
in self
organized
approach
4 simple
bootstrap
mechanism
& having
less
maintenanc
e overhead
in self
organized
approach
Types/Exampl
es
ABED,GRE
and Trust
evidence &
evaluation
scheme(Oth
er)
CORE,SORI,CONFIDE
NT etc.
Not exist Not exist Self
organized
and
distributed
certificate
approach
Applicable Small and
large scale
of ad-hoc
network
Small and large scale of
ad-hoc network
Only for
small scale
of MANET
Small and
large scale
of ad-hoc
network
Small and
large scale
of ad-hoc
network
8. CONCLUSION
In this paper, we surveyed existing trust schemes for mobile ad-hoc network to achieve the
security and trustworthiness. It is concluded that, Protocol based trust scheme evaluate the trust
through indirect communication but System level trust scheme is more feasible as compared to
Protocol based. System level trust model uses concept of punishment or reward for nodes and it
calculates trust value on the basis of direct communication. Cluster based and Maturity based
model using standard eq. (1), (2) & (3) to find out trust value of node. Maturity based model is
best as compared to Cluster based. In PKI based schemes, self organized scheme is more efficient
than Distributed scheme of PKI. Some schemes like individual level trust model CRFSN, PTM
etc, threshold cryptography, and cluster & non cluster based certification schemes in MANET are
not covered in this paper. In future work, we plan to continue towards with unified trust model
scheme.
12. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
64
References:
[1] Hamed Samavati, Behrougz Tork Ladani, Hossein Moodi, “AMLeT: Adaptive Multi Level Trust
frameworkfor MANETs” , International Symposium on Computer Network and Distributed System
(CNDS), February 23-24, 2011
[2] L. Capra. “Toward a Human Trust Model for Mobile Ad-hoc Network”, Proc. 2nd UK-UbiNet Workshop,
5-7 May 2004, Cambridge University, Cambridge, UK.
[3] Josang and S. LoPresti, “Analyzing the Relationship between Risk and Trust, “Proc.2nd Int’ 1 conf. Trust
Management (I Trust’ 04), LNCS, Springer-Verlag, 2004, pp.135-145
[4] J. Golbeck, “Computing with Trust: Definition, Properties and Algorithm, ”Securecomm and Workshops-
security and Privacy for emerging Areas in Communication Networks, Baltimore, MD, 28 Aug.-1 sep.
2006, pp. 1-7.
[5] Theodorakopoulos and J.S. Baras, “On Trust Models and Trust Evaluation Metrics for Ad-hoc Networks,”
IEEE Journal on selected Areas in Communications, Vol24, No. 2, Feb 2006, pp. 318-328
[6] Boukerche and Y.Ren,”A Security Management Scheme using a novel Computational Reputation Model
for Wireless and Mobile Ad hoc Networks,”proc. Int’l Workshop on Modeling Analysis and Simulation
of wireless and Mobile System, Vancouver, British Columbia, Canada, pp. 88-95, 2008.
[7] Han Yu, Zhiqi Shen, Chunyan Miao, Cyril Leung, and Dusit Niyato,”A Survey of Trust and Reputation
Management System in Wireless Communications,” proc. of the IEEE, 2010.
[8] Marti, S., Giuli, T. J, Lai,k., Baker, M., “Mitigating Routing Misbehavior in Mobile Ad-hoc Networks,” in
ACM MobiCom conference, 2000.
[9] Buchegger, S. Le Boudec J.-Y., 2002”Performance analysis of the confident protocol “(cooperation of
nodes: fairness in dynamic ad-hoc networks)”in MobiHoc’02, IEEE/ACM symposium on Mobile Ad-hoc
Networking and Computing.
[10] Michirardi, P., Molva, R. 2002. “Core: A collaborative reputation mechanism to encode node cooperation
in mobile ad-hoc networks”, in CMS’02 Communication and Multimedia Security Conference.
[11] Bansal, S., Baker, M., 2003. “Observation –based Cooperation Enforcement in Ad-hoc Networks”,
arxiv:cs/0307012v2.
[12] He, Q., Wu, D., Khosla, P., 2004. “SORI: A Secure and Objective Reputation- based Incentive Schemes
for Ad-hoc Networks” IN WCNC’04 IEEE wireless Communications and Networking Conference.
[13] Hu, J., Burnmester, M., 2006.” LARS: a locally aware reputation system for mobile ad-hoc networks”, in
44th annual ACM Southeast Regional Conference.
[14] CHEN Aiguo, XU Guoai, Yang Yixian, “A Cluster Based Trust Model For Mobile Ad-hoc Networks”,
2008 IEEE.
[15] R.Cramp, “Logical foundations of probability”, University of Chicago press, 1950.
[16] R.Cramp, “Replies and systematic expositions”, in P.A. Schilpp (ed.), the philosophy of Rudolf Carnap. La
Salle, Illinois, Illinois: Open court, 1963, pp. 966-998.
[17] Pedro B. Velloso, Rafael P Laufer, Daniel de O. Cunha, Otto Carlos M.B. Duarte, and Guy Pujolle.” Trust
Management In Mobile Ad hoc Networks Using a Scalable Maturity Based Model, IEEE transactions on
networks and Service Management Vol. & No. 3 Sept. 2010. pp172 - 185.
[18]M. Virendra, M. Chanddrasekaran, and S. Upadhyaya, “Quantifying trust in mobile ad-hoc networks,” in
proc. IEEE Iternational conf. Integration Knowledge Intensive Multi-Agent Syst., Waltham, USA, Apr.
2005.
[19] G. Theodorakopouls and J.S Baras, “Trust Evaluation in ad-hoc networks”, in ACM Workshop Wireless
security, Oct. 2004.
[20] N. Saxena, G Tsudik, and J.H. Yi, “Threshold Cryptography in P2P and MANETs: the case of access
control, “Computer Networks, Vol. 51, No.12, pp.3632-3649, 2007.
[21] B. Wu, J. Wu, E.B. Fernadez, M. Ilyas, and S. Magliveras, “Secure and efficient key management in
Mobile ad hoc networks,” Journal of Network Computer Applications, Vol.30, no.3, pp. 937-954, 2007.
[22] D. Joshi, K. Namuduri, and R. Pendse, “Secure, redundant, and fully distributed ket management scheme
in mobile and ad- hoc networks: an analysis,” EURASIP journal on wireless Communications and
networking, Vol. 2005, no. 4, pp.579-589, 2005.
[23] S.Capkun, L Buttyan, and J.P Hubaux, “Self-organized public key management for mobile ad-hoc
networks,” Mobile Computing and Communication Review, vol.6, no. 4, 2002.
[24] P. Caballero-Gill and C. Herandez-Goya, “Efficient Public Key Certificate Management for Mobile Ad-
hoc Networks,” EURASIP journal on wireless Communications and networking, vol. 2011, pp.1-10, 2010.