This document discusses evaluating trust and reputation using uncertain reasoning in mobile ad hoc networks (MANETs). It first defines trust, reputation, and uncertain reasoning. It then discusses different routing protocols used in MANETs like AODV, OLSR, and DSR. It also discusses security attacks in MANETs and how trust and reputation models can be used to address these issues. Finally, it discusses probabilistic reasoning and Dempster-Shafer theory as ways to handle uncertainty in evaluating trust and reputation.
This document provides an introduction and overview of a dissertation submitted by Rachna to partially fulfill the requirements for a Master of Technology degree in Computer Science and Engineering. The dissertation focuses on improving the route discovery phase in multi-path Dynamic Source Routing (DSR) for mobile ad-hoc networks using a hybrid ant colony optimization approach. Key topics covered in the introductory chapters include an introduction to mobile ad-hoc networks, categories of ad-hoc routing protocols including DSR and AODV, characteristics and design challenges of MANETs, and concepts related to route discovery and maintenance in DSR.
This document discusses secure routing in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and wireless sensor networks, and some of the key issues in designing them including routing and security. The document then discusses several routing protocols for MANETs, including DSDV and WRP. It also analyzes security threats to routing like black hole attacks, wormhole attacks, and selfish node behavior. The document proposes analyzing routing protocols like OLSR to understand their security vulnerabilities. Finally, it discusses future research directions like generalizing the security threat analysis methodology to other routing protocols and types.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for
wireless mesh networks has focused on metrics that estimate link quality to maximize throughput
andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and
forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless
mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow
attackers to attract a large amount of traffic These attacks are very effective b a s e d on high
throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput,
it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism
means combines Measurement-based detection and accusation-based reaction techniques.The attacks
and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and
SPP, an adaptation of the well-known ETX unicast metric to the multicast setting
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
This document discusses security issues in ad-hoc networks. It begins by outlining some key problems in ad-hoc network routing including lack of infrastructure, dynamic topology changes, wireless communication vulnerabilities, and implicit trust between nodes. It then analyzes specific attacks like modifying routing protocol messages. Several solutions are proposed, including concealing network topology using security agents or zone routing, and using watchdog and pathrater mechanisms to identify and isolate misbehaving nodes to improve throughput. The watchdog detects nodes that fail to forward packets by listening to transmissions, while pathrater avoids routing through misbehaving nodes to choose more reliable paths.
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
Wireless mesh network has recently received a great deal of attention as a promising technology to provideubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
A mobile network is a dynamic reconfigurable network with heavy traffic over the network. As the network is available widely, there are more chances of inclusion of external nodes that behave as the attack node. One of the problems in mobile network is the cooperative selfish node attack. In which more than one node cooperatively perform the attack. In such attack, the malicious nodes communicate effectively between them but as they get the packet from some other node, they do not forward the packets. The presented work is about the table driven cross check performed over each node to identify the trustfulness of a node.
This document provides an introduction and overview of a dissertation submitted by Rachna to partially fulfill the requirements for a Master of Technology degree in Computer Science and Engineering. The dissertation focuses on improving the route discovery phase in multi-path Dynamic Source Routing (DSR) for mobile ad-hoc networks using a hybrid ant colony optimization approach. Key topics covered in the introductory chapters include an introduction to mobile ad-hoc networks, categories of ad-hoc routing protocols including DSR and AODV, characteristics and design challenges of MANETs, and concepts related to route discovery and maintenance in DSR.
This document discusses secure routing in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and wireless sensor networks, and some of the key issues in designing them including routing and security. The document then discusses several routing protocols for MANETs, including DSDV and WRP. It also analyzes security threats to routing like black hole attacks, wormhole attacks, and selfish node behavior. The document proposes analyzing routing protocols like OLSR to understand their security vulnerabilities. Finally, it discusses future research directions like generalizing the security threat analysis methodology to other routing protocols and types.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for
wireless mesh networks has focused on metrics that estimate link quality to maximize throughput
andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and
forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless
mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow
attackers to attract a large amount of traffic These attacks are very effective b a s e d on high
throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput,
it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism
means combines Measurement-based detection and accusation-based reaction techniques.The attacks
and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and
SPP, an adaptation of the well-known ETX unicast metric to the multicast setting
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
This document discusses security issues in ad-hoc networks. It begins by outlining some key problems in ad-hoc network routing including lack of infrastructure, dynamic topology changes, wireless communication vulnerabilities, and implicit trust between nodes. It then analyzes specific attacks like modifying routing protocol messages. Several solutions are proposed, including concealing network topology using security agents or zone routing, and using watchdog and pathrater mechanisms to identify and isolate misbehaving nodes to improve throughput. The watchdog detects nodes that fail to forward packets by listening to transmissions, while pathrater avoids routing through misbehaving nodes to choose more reliable paths.
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
Wireless mesh network has recently received a great deal of attention as a promising technology to provideubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
A mobile network is a dynamic reconfigurable network with heavy traffic over the network. As the network is available widely, there are more chances of inclusion of external nodes that behave as the attack node. One of the problems in mobile network is the cooperative selfish node attack. In which more than one node cooperatively perform the attack. In such attack, the malicious nodes communicate effectively between them but as they get the packet from some other node, they do not forward the packets. The presented work is about the table driven cross check performed over each node to identify the trustfulness of a node.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
Abstract Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants (PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study on UDP and TCP. Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability;
Enhancing msf for mobile ad hoc network security though active handshaking &a...ijctet
This document summarizes a research paper that proposes a new security framework called Multipath Security Framework (MSF) to enhance security in mobile ad hoc networks. MSF divides messages into encrypted shares that are transmitted across multiple network paths to increase confidentiality and robustness. Even if an attacker obtains some shares, it is difficult for them to reconstruct the original message. The framework includes multipath routing, node authentication through handshaking, and encryption of message shares. The goal is to improve security against eavesdropping, active and passive attacks, and jamming in mobile ad hoc networks.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
This document summarizes a research paper that surveyed detection and prevention mechanisms for flooding attacks in mobile ad hoc networks (MANETs). It began with an abstract that described how MANETs are increasingly being used but also face security threats like flooding attacks. It then provided definitions and characteristics of MANETs and described two common routing protocols: AODV and OLSR. The paper discussed flooding attacks and different detection and prevention schemes that have been proposed. It concluded with a survey of these mechanisms to detect and mitigate flooding attacks in MANETs.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
This document summarizes a research paper that proposes using a hotspot algorithm to improve node stability in mobile ad hoc networks (MANETs). The paper first provides background on MANETs and challenges with routing in dynamic network topologies. It then discusses the importance of node stability and proposes using a hotspot algorithm to identify stable nodes. The algorithm calculates stability factors for nodes based on their mobility and neighbors' mobility. Routing is done through stable nodes to improve efficiency. The paper models this approach in a network simulator and analyzes results on parameters like packet loss and throughput. Future work involves further optimizing the network using this routing method.
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
This document discusses the detection of black hole attacks in mobile ad hoc networks (MANETs) that use the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It proposes using authentication techniques including authenticated nodes, authentication on paths, authentication key packets, and a data routing information table on each node to detect black hole nodes. An example network is presented to demonstrate how the proposed techniques would detect a black hole node by analyzing authentication packet responses. The goal is to securely route data packets by detecting malicious nodes using these authentication methods.
This document discusses implementing trust-based route selection in mobile ad hoc networks. It proposes a system to store and update trust values for nodes based on their behavior. Different strategies are designed to evaluate routes based on the trust values of their constituent nodes. The performance of applying trust-based route selection to DSR, AODV and DYMO routing protocols is evaluated using the QualNet simulator in terms of metrics like throughput, packet delivery ratio and average jitter. The evaluation aims to improve routing performance and security in the presence of malicious nodes.
This document outlines probabilistic inference in Bayes networks. It begins with a review of probability theory concepts like joint probability, marginal probability, conditional probability, and Bayes' rule. It then discusses probabilistic inference in Bayes networks, including causal/top-down inference using evidence to determine probabilities, diagnostic/bottom-up inference using effects to determine causes, and "explaining away" where additional evidence makes other probabilities less certain. The document also covers uncertain evidence, D-separation to determine conditional independence, and inference techniques in polytrees.
1. The document provides a gentle introduction to artificial intelligence (AI), explaining what AI is, its relationship to computers, and the tasks it aims to automate like human sensory and cognitive functions.
2. It discusses different types of knowledge and techniques used in AI, including reasoning, learning methods, heuristics, and applications like expert systems.
3. The document outlines some milestones in AI and challenges like understanding human thinking, behavior, and unpredictability in order to truly create intelligent machines.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
Abstract Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants (PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study on UDP and TCP. Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability;
Enhancing msf for mobile ad hoc network security though active handshaking &a...ijctet
This document summarizes a research paper that proposes a new security framework called Multipath Security Framework (MSF) to enhance security in mobile ad hoc networks. MSF divides messages into encrypted shares that are transmitted across multiple network paths to increase confidentiality and robustness. Even if an attacker obtains some shares, it is difficult for them to reconstruct the original message. The framework includes multipath routing, node authentication through handshaking, and encryption of message shares. The goal is to improve security against eavesdropping, active and passive attacks, and jamming in mobile ad hoc networks.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
This document summarizes a research paper that surveyed detection and prevention mechanisms for flooding attacks in mobile ad hoc networks (MANETs). It began with an abstract that described how MANETs are increasingly being used but also face security threats like flooding attacks. It then provided definitions and characteristics of MANETs and described two common routing protocols: AODV and OLSR. The paper discussed flooding attacks and different detection and prevention schemes that have been proposed. It concluded with a survey of these mechanisms to detect and mitigate flooding attacks in MANETs.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
This document summarizes a research paper that proposes using a hotspot algorithm to improve node stability in mobile ad hoc networks (MANETs). The paper first provides background on MANETs and challenges with routing in dynamic network topologies. It then discusses the importance of node stability and proposes using a hotspot algorithm to identify stable nodes. The algorithm calculates stability factors for nodes based on their mobility and neighbors' mobility. Routing is done through stable nodes to improve efficiency. The paper models this approach in a network simulator and analyzes results on parameters like packet loss and throughput. Future work involves further optimizing the network using this routing method.
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
MANET is a dynamic network with large number of mobile nodes .As the traffic increases over the manet it will leads to number of problems i.e congestion and packet loss .This congestion and packet loss problems occurs due to the attack in manet .one of attack is black hole attack .As a result some packet loss over the network and slows the communication process.In this paper we are providing the solution against black hole attack which is based on fuzzy rule .fuzzy rule based solution identify the infected node as well as provide the solution to reduce data loss over network.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
This document discusses the detection of black hole attacks in mobile ad hoc networks (MANETs) that use the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It proposes using authentication techniques including authenticated nodes, authentication on paths, authentication key packets, and a data routing information table on each node to detect black hole nodes. An example network is presented to demonstrate how the proposed techniques would detect a black hole node by analyzing authentication packet responses. The goal is to securely route data packets by detecting malicious nodes using these authentication methods.
This document discusses implementing trust-based route selection in mobile ad hoc networks. It proposes a system to store and update trust values for nodes based on their behavior. Different strategies are designed to evaluate routes based on the trust values of their constituent nodes. The performance of applying trust-based route selection to DSR, AODV and DYMO routing protocols is evaluated using the QualNet simulator in terms of metrics like throughput, packet delivery ratio and average jitter. The evaluation aims to improve routing performance and security in the presence of malicious nodes.
This document outlines probabilistic inference in Bayes networks. It begins with a review of probability theory concepts like joint probability, marginal probability, conditional probability, and Bayes' rule. It then discusses probabilistic inference in Bayes networks, including causal/top-down inference using evidence to determine probabilities, diagnostic/bottom-up inference using effects to determine causes, and "explaining away" where additional evidence makes other probabilities less certain. The document also covers uncertain evidence, D-separation to determine conditional independence, and inference techniques in polytrees.
1. The document provides a gentle introduction to artificial intelligence (AI), explaining what AI is, its relationship to computers, and the tasks it aims to automate like human sensory and cognitive functions.
2. It discusses different types of knowledge and techniques used in AI, including reasoning, learning methods, heuristics, and applications like expert systems.
3. The document outlines some milestones in AI and challenges like understanding human thinking, behavior, and unpredictability in order to truly create intelligent machines.
Probabilistic Abductive Logic Programming using Possible WorldsFulvio Rotella
Reasoning in very complex contexts often requires purely deductive reasoning to be supported by a variety of techniques that can cope with incomplete data. Abductive inference allows to guess information that has not been explicitly observed. Since there are many explanations for such guesses, there is the need for assigning a probability to each one. This work exploits logical abduction to produce multiple explanations consistent with a given background knowledge and defines a strategy to prioritize them using their chance of being true. Another novelty is the introduction of probabilistic integrity constraints rather than hard ones. Then we propose a strategy that learns model and parameters from data and exploits our Probabilistic Abductive Proof Procedure to classify never-seen instances. This approach has been tested on some standard datasets showing that it improves accuracy in presence of corruptions and missing data.
The document provides an introduction to non-monotonic reasoning and knowledge representation. It discusses key concepts like representational adequacy, inferential adequacy, and defeasible reasoning. Defeasible reasoning allows drawing reasonable conclusions from inconsistent or incomplete information. It discusses different approaches to defeasible reasoning like skeptical vs credulous, ambiguity blocking vs propagation, and team defeat vs no team defeat. The document also introduces modal defeasible logic, which extends defeasible logic to represent different modalities like beliefs, intentions and obligations. It defines different types of conclusions that can be derived in modal defeasible logic.
Introduction to Expert Systems {Artificial Intelligence}FellowBuddy.com
The document provides an introduction to expert systems. It defines an expert system as a computer system that emulates the decision-making abilities of a human expert. The key components of an expert system are a knowledge base containing the expertise knowledge and an inference engine that draws conclusions from the knowledge base. Expert systems offer advantages like increased availability, reduced costs, reliability, and the ability to explain their reasoning. However, they also have limitations like dealing with uncertainty and an inability to generalize knowledge like humans.
This document outlines techniques for representing uncertainty in expert systems, including Bayesian reasoning and certainty factors theory. It discusses sources of uncertain knowledge, probabilistic reasoning using Bayes' rule, and an example of computing posterior probabilities of hypotheses given observed evidence. Certainty factors theory is presented as an alternative to Bayesian reasoning that uses numerical factors between -1 and 1 to represent degrees of belief.
This document discusses reasoning in artificial intelligence. It defines reasoning as deriving a conclusion from given premises using a methodology. Reasoning allows a system to determine what it needs to know based on what it already knows. The document outlines different types of reasoning including deductive, inductive, abductive, and non-monotonic reasoning. It also discusses symbolic reasoning approaches like default reasoning and truth maintenance systems, as well as statistical reasoning using probability, Bayes' theorem, and Bayesian networks.
The document discusses expert systems, which are computer programs that use knowledge and reasoning to solve complex problems like human experts. It describes key components of expert systems like the knowledge base, reasoning engine, and user interface. Examples of early medical expert systems MYCIN and Internist are provided that demonstrated how expert systems can model human diagnostic reasoning strategies. While expert systems have been effective in some domains, full integration into fields like medicine has proven challenging.
An expert system is a computer program that contains knowledge about a specific domain that allows it to solve problems or provide advice like a human expert. Expert systems are made up of a knowledge base, inference engine, and user interface. They are developed through knowledge engineering, which involves knowledge engineers working with domain experts to gather knowledge about a problem domain and represent it in a way that a computer can understand. Some key applications of expert systems include medical diagnosis, mineral prospecting, and configuring computer systems.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
This document summarizes research on detecting blackhole attacks in mobile ad hoc networks (MANETs). It first defines MANETs and describes blackhole attacks, where malicious nodes drop packets to disrupt routing. The document then reviews several approaches for detecting single or cooperative blackhole attacks and compares their assumptions and effectiveness. It finds that while various methods have been proposed, consistently detecting multiple cooperative blackhole nodes remains a challenge, as detection requires cooperation between non-malicious nodes. Future work could involve further simulation-based comparison of detection method performances.
Security Enhancement using Trust Management in MANETsIJTET Journal
Abstract— The distinctive options of mobile ad hoc networks (MANETs), victimization recent advances in unsure reasoning originated from AI community, we tend to projected a unified trust management schemes Mobile Ad-hoc networks area unit self-organizing and self re-configuring multi hop wireless networks wherever, the structure of the network changes dynamically the safety of the OLSR protocol is rib by a selected variety of attack known as ‗Black Hole‘ attack. During this attack a malicious node advertises itself as having the shortest path to the destination node. To combat with region attack, it\'s projected to attend and check the replies from all the neighboring nodes to search out a secure route with protection to our data, however this approach suffers from high delay. Associate in Nursing approach is projected to combat the region attack by victimization Trust management schemes with neighbors WHO claim to possess a route to destination. during this project we tend to area unit victimization NS2.34 software system for our projected model testing. and that we got the simplest result against the safety attack.
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open
nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of
decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide
their security and also has become an indivisible part for communication for mobile device. In this phase of
dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from
Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing
algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route
Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks.
This type of attacker comes in the network and they start creating multiple identities. From that multiple
identities they are disrupting the network by participating in communication with line breaking nodes. This
cause’s huge loss in network resources. These networks can be protected using network failure and firewall
detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure
TORA through the implementation. Performance factor of network would be taken into consideration in order
to verify the efficiency of modified TORA in MANET environment.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
This document discusses security challenges in mobile ad hoc networks (MANETs) and provides an overview of several secure routing protocols proposed to address these challenges. It begins by introducing MANETs and explaining that routing in MANETs is difficult due to their dynamic topology. It then discusses common security goals for routing protocols, such as confidentiality, integrity, and availability. Several attacks on MANET routing protocols are described, including passive attacks like eavesdropping and active attacks like wormhole and blackhole attacks. The document proceeds to summarize several existing secure routing protocols for MANETs, such as DSDV, SAODV, SRP, and TORA, focusing on how each protocol aims to provide routing security. It concludes
This document discusses security challenges in mobile ad hoc networks (MANETs) and reviews several secure routing protocols proposed to address these challenges. It begins by introducing MANETs and explaining that routing in MANETs is difficult due to the dynamic topology. It then discusses common security goals for routing protocols like confidentiality, integrity, and availability. Several attacks on MANET routing protocols are described, including passive attacks like eavesdropping and active attacks like wormhole and blackhole attacks. The document proceeds to review six secure routing protocols for MANETs - DSDV, SAR, SAODV, SRP, Secure AODV using RSA signatures, and TORA - and describes their approaches to providing routing security. It concludes
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionIOSR Journals
This document summarizes a proposed behavioral model to detect anomalous attacks in packet transmission in wireless networks. The model aims to identify packet droppers and modifiers by having nodes monitor their neighbors' forwarding behaviors over time. A tree-based routing structure is used, where each packet is marked as it travels toward the sink node. The marks provide information to help the sink node determine which nodes are misbehaving. The proposed scheme aims to gradually identify bad nodes through statistical analysis of their behaviors across different network topologies over time, with low false positives. It aims to catch both packet droppers and modifiers within a single detection module.
The document proposes a behavioral model called PFMDA to detect anomalous packet dropping and modification attacks in wireless ad hoc networks. The PFMDA scheme establishes a routing tree with the sink node at the root. As data packets are transmitted along the tree, each sender or forwarder adds a small number of "packet marks" to the packet. This allows the sink to determine the dropping ratio for each node and identify nodes that are definitely dropping/modifying packets or are suspicious of such behavior. The scheme uses node categorization and heuristic ranking algorithms to gradually identify misbehaving nodes with few false positives. The goal is to detect packet droppers and modifiers within the network.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attackijcncs
This document evaluates the performance of the AODV and DSR routing protocols under wormhole attacks in a mobile ad hoc network (MANET) simulation. The simulation analyzed packet delivery ratio, end-to-end delay, and throughput with and without wormhole attacks. Without attacks, AODV performed better than DSR for packet delivery ratio and end-to-end delay, while DSR had higher throughput due to using multiple paths. Under wormhole attacks, both protocols saw degraded performance, with DSR being more severely impacted due to its vulnerability to the attacks. The study aims to compare how the two reactive routing protocols are affected by wormhole attacks in MANETs.
1) The document analyzes the performance of the OLSR routing protocol in MANETs in terms of throughput and delay. It implements RSA encryption at the protocol level to detect and prevent black hole attacks.
2) The simulation results show that OLSR with the RSA-based security mechanism is effective at improving security against black hole attacks. It analyzes throughput and delay under different network conditions using the OLSR protocol.
3) Common routing protocols for MANETs like DSDV, DSR, AODV, and OLSR are discussed. Security is a major challenge for MANETs due to the open wireless medium and lack of centralized monitoring. The paper aims to enhance OLSR
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
Various Security Attacks in mobile ad hoc networksKishan Patel
The document outlines various security attacks in mobile ad-hoc networks. It discusses the different types of routing protocols used in MANETs including proactive, reactive, and hybrid protocols. It then classifies security attacks into two categories: data traffic attacks and control traffic attacks. Specific attacks described include black hole, gray hole, jellyfish, worm hole, hello flood, bogus registration, man in middle, rushing, cache poisoning, and Sybil attacks. The document provides details on how each attack is carried out and its impact on the network.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
The document analyzes the impact of an eavesdropper on the energy consumption of the AODV routing protocol in mobile ad hoc networks (MANETs). Simulations were conducted using the QualNet simulator for 20, 40, 60, 80, and 100 nodes. The results show that the presence of an eavesdropper degrades network performance and increases energy consumption compared to the standard AODV protocol. Specifically, throughput was lower, delay and jitter were higher, and transmit energy usage increased in scenarios with an eavesdropper node. The eavesdropper attracts network traffic, forcing nodes to transmit more and reducing overall efficiency.
This document summarizes a research paper that proposes a hybrid routing protocol for mobile ad hoc networks (MANETs) that combines proactive and reactive routing approaches. The goal is to provide fast and secure routing in MANETs. The key aspects are:
1) A traffic monitor node manages network traffic and checks if new nodes are malicious. Reactive routing finds paths through new nodes, while proactive routing is used otherwise.
2) The traffic monitor periodically checks node responses to identify malicious nodes and informs the network.
3) Nodes maintain a trust list from the traffic monitor to identify paths that avoid malicious nodes during route discovery.
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Surveyijsrd.com
A Mobile Ad Hoc Network (MANET) is a self organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. It does not require any cryptographic primitives. This attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. The entire routing system in MANET can even be brought down using the wormhole attack.
Similar to Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in MANET (20)
This document describes the establishment of a fibroblast cell line from frozen embryos of Arbor Acre broiler chickens. Key findings include:
1) Fibroblast cells were successfully isolated from fresh and frozen embryos and exhibited typical fibroblast morphology.
2) Cell viability was over 80% after thawing frozen embryos and fibroblasts showed a population doubling time of around 42 hours.
3) Karyotyping showed the cells had a normal diploid chromosome number of 78 for chickens and a high percentage of cells were diploid.
4) Transfection of cells with a fluorescent protein vector showed protein expression and formation of fluorescent colonies over time, indicating the cells could be genetically modified.
This document provides a literature review on work stress of employees. It discusses how stress has been defined and the sources and types of stress. It reviews signs and symptoms of stress and strategies for coping with stress such as undertaking a stress audit, using scientific inputs, and spreading messages about stress management. The literature review section summarizes 12 previous research studies on topics like occupational stress among different professions, the relationship between emotional intelligence and occupational stress, and the impact of supportive leadership in moderating job stress and performance. The conclusion emphasizes the importance of managing stress and having a positive attitude and lifestyle to deal with distress and improve organizational well-being.
This document describes the design and manufacturing of an autonomous cart capable of following a user. The cart uses a Microsoft Kinect sensor to recognize and track users through voice and gesture recognition. An Arduino microcontroller controls the cart's motors to follow the user while avoiding obstacles. Two prototypes were created, with the second using stronger aluminum wheels, an acrylic base, and improved Kinect mounting. The cart aims to autonomously follow a single identified user based on their commands, maintaining distance and navigating obstacles. The document evaluates the cart's stress resistance and ability to meet the objectives of autonomous user following.
This document analyzes India's import demand for petroleum during a period of liberalization from 1981 to 2006. It estimates import demand functions using cointegration and error correction modeling approaches. The empirical results suggest there is a long-run equilibrium relationship between petroleum imports, import prices, income, wholesale prices, import duties, and foreign exchange reserves. The study aims to determine if liberalization policies in India impacted the country's petroleum import demand function.
This document summarizes the design and standardization of a scissor jack to avoid failures in the field. It presents the objectives of modifying the current jack design to improve reliability and reduce costs. It also describes developing a mathematical model for scissor jack design using inputs like vehicle weight and ground clearance. The design process involves modeling the jack in CATIA and developing equations in MATLAB to size components like the power screw, links, and nuts based on applied loads and stresses. Testing procedures are outlined to validate the jack's performance under different load conditions.
This document summarizes several studies on human resource management (HRM) and employee performance in the banking sector in India. It discusses the main challenges faced by banks, including adapting to changing economic conditions and regulations. Several literature reviews are also summarized that examine topics like HRM best practices, leadership styles, job descriptions, quality of worklife, and organizational effectiveness in banks. Case studies are presented on innovative HRM practices at State Bank of India, including performance appraisal, training programs, and organization development initiatives.
This document describes a proposed system for an automatic energy meter reading system using an ARM7 microcontroller and GSM technology. The system would automatically send meter readings and load information daily to the electricity provider via SMS. It would also allow the provider to remotely control load disconnection if payment is not made. This would make the meter reading process more efficient and accurate compared to manual readings, while also preventing electricity theft.
This document discusses processing private K-nearest neighbor (KNN) queries over untrusted cloud data. It proposes a framework that uses privacy homomorphism to securely process queries while preserving the privacy of both the data owner and the client submitting queries. The framework divides query processing into node traversal and distance computation steps. It encrypts the data index and uses the cloud to decrypt distances during computation, while preventing any party from accessing the actual query or result distances. The framework allows private querying without revealing sensitive information to the cloud or data owner.
This document reviews techniques for emotion recognition from facial expressions. It begins by outlining the general steps of emotion recognition systems as face detection, feature extraction, and classification. Popular techniques discussed include principal component analysis (PCA), local binary patterns (LBP), active appearance models, and Haar classifiers. PCA and LBP were found to provide higher recognition rates. The paper also reviews the Facial Action Coding System and compares the performance of different techniques based on recognition rate. In conclusion, PCA is identified as having the highest recognition rate and performance for emotion recognition.
- The document describes a proposed zigbee-based electronic menu ordering system using an ARM7 microcontroller.
- The system has two sections - a handheld customer section and a main section. The customer section allows selecting menu items via touchscreen and sends the order wirelessly to the main section using zigbee.
- The main section receives orders from multiple customer sections via zigbee, displays orders on an LCD, and sends the data to a PC for billing purposes. The goal is to develop a low-cost wireless ordering system for small restaurants.
This document summarizes a numerical study of microchannels with internal fins for cooling electronic equipment. Three types of microchannels were studied: square channels with conventional and cross fins, and rectangular channels with conventional fins. Constant heat flux boundary conditions and laminar flow were assumed. Results for average local Nusselt number distribution along the channel length were obtained as a function of fin height ratio. An optimum fin height ratio that maximized heat transfer was found for each microchannel type. Grid independence testing was performed to select the appropriate mesh for the numerical simulations.
This document summarizes a research paper on using k-means clustering to analyze big data. It begins with an introduction to big data and its characteristics. It then discusses related work on big data storage, mining, and analytics. The HACE theorem for defining big data is presented. The k-means clustering algorithm is explained as an efficient method for partitioning big data into groups. The proposed system uses k-means clustering followed by data mining and classification modules. Experimental results on two datasets show that the recursive k-means approach finds clusters closer to the actual number than the iterative approach. In conclusion, clustering is effective for handling big data attributes like heterogeneity and complexity, and k-means distribution helps distribute data into appropriate clusters.
The document discusses video streaming and content sharing between Android mobile devices and PCs using a peer-to-peer approach without servers. It presents an application that allows live video captured on a mobile device to be streamed and viewed on a nearby PC in real-time over WiFi. Content like images and text can also be shared between devices. The application has uses for social sharing, cooperative work, and assisting elderly/impaired users. It analyzes related works on mobile video streaming and discusses the system design.
Carbon fiber is an important material used to make lightweight and strong composite materials. It has high strength and stiffness but is also very lightweight. Carbon fiber composites are used in applications like aerospace structures, wind turbines, sports equipment, and transportation. The manufacturing process of carbon fiber involves spinning a precursor material like polyacrylonitrile (PAN) or pitch into fibers, then stabilizing and carbonizing the fibers at high temperatures to form carbon crystals within tightly bonded atomic structures. The carbon fibers are also treated and coated to improve adhesion with matrix resins and handleability. The resulting carbon fiber composites have advantages like high strength-to-weight ratio, corrosion resistance, fatigue resistance, and design flexibility.
This document summarizes a study on the effect of weld angles on butt weld joint strength. Specimens were made with V-groove weld geometries at included angles of 450, 500, 550, and 600 degrees. Tensile and fatigue tests were conducted on the specimens. The results showed that tensile strength and fatigue life increased with increasing included angle, with 600 degrees performing best. Tensile strength increased up to 76.64% and fatigue life up to 46.15% for the 600 degree angle compared to 450 degrees. Ultrasonic and magnetic testing found no defects in the welds. Therefore, the 600 degree angle provided better strength performance than the 450 degree commonly used.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
1) This document discusses several research papers related to continuous data acquisition algorithms for smart grids using cloud-based technologies and smart meters.
2) It summarizes papers on cloud-based smart metering systems that use standardized communication between smart meters and servers stored in the cloud to optimize energy consumption. Another paper proposes a data collection algorithm that uses energy maps and clustering to reduce energy consumption and increase network lifetime.
3) A third paper discusses utilities using satellites to remotely collect meter data in real-time for accuracy. A final paper presents an algorithm for smart building power consumption scheduling that uses smart meters and dynamic pricing to incentivize shifting usage to low-cost time periods.
This document discusses failure analysis of bearing cups in drive shaft assemblies. It aims to find a cost-effective solution to eliminate bearing cup cracking during assembly of universal joints. Various heat treatment processes are considered and carbonitriding is identified as the optimal process. It reduces bearing cup failure and manufacturing costs compared to other options like case hardening. A systematic methodology is applied, including understanding the current problem, analysis using wear testing and FEA, and implementing and confirming the effects of carbonitriding as a corrective measure.
This document describes the design of a test bench to test the performance of a gearbox. The test bench will allow testing of shift performance, leakage, noise, and shift force in driving and dragging conditions. The test bench design includes a fixture to hold the gearbox, a clamping arrangement, a gear shifting mechanism, and an oil dispensing, extraction and filtration unit. The main components are designed, including motors, shafts, couplings, bearings, timing belts, and the gearbox fixture. The fixture design includes resting blocks, pads and plates to support the gearbox at an angle. A pneumatic clamping cylinder is selected to fix the gearbox. A pneumatic tandem cylinder is used for the gear shifting mechanism
This study aimed to correlate knee height with body height and develop regression equations to estimate body height from knee height measurements in subjects from North India. The study measured the body height and knee height of 1000 healthy subjects aged 18 and older. Knee height was found to be positively correlated with body height. Regression analyses were used to generate equations to estimate body height based on knee height, with separate equations for males and females that also included age as a predictor variable. The equations were intended to provide a more accurate estimation of body height that is less affected by age-related changes.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in MANET
1. Vol-1 Issue-1 2015 IJARIIE-ISSN(O)-2395-4396
1111 www.ijariie.com 1
Survey paper on Evaluating Trust and Reputation
Using Uncertain Reasoning in MANET
Bhumika R. Shah1
, Juhi Kaneria2
1
Student, I.T Department, Gujarat Technical University, PIET, India
2
Professor, CSE Department, Gujarat Technical University, PIET, India
Abstract
Towards wide-spread activity, security issues become a central concern. Whereas plenty of research has targeted on making these
networks doable and useful, security has received little or no attention. we've got a bent to gift a collection of security protocols
optimized for Mobile impromptu Networks: victimization Trust and name metric along with unsure reasoning. unsure Reasoning
includes two quite observation: Direct observation and Indirect observation. to boost positive parameters like Packet Delivery
relation, Throughput, Overhead and finish to finish Delay.
Keywords: — Trust, Reputation, Uncertain Reasoning, Packet Delivery quantitative relation, Throughput, Overhead and
finish to finish Delay
1.Introduction
MANETs square measure a sort of temporal and self-
organized networks, that square measure applicable for field
of study environments and disaster recovery things. as a
result of its distinctive characteristics, e.g., no wants of
infrastructure, MANETs square measure attracting many
attention. throughout this form of networks, nodes can blood
type distributed network as well as communicate with each
other via wireless medium. each node has to affix forces
with totally different nodes thus on deliver traffic from
provide nodes to destination nodes. Security has become a
primary concern thus on turn out protected communication
between mobile nodes throughout a hostile surroundings.
not just like the wireline networks, the distinctive
characteristics of mobile unplanned networks cause form of
nontrivial challenges to security vogue, like open peer-to-
peer specification, shared wireless medium, tight resource
constraints, and very dynamic constellation. These
challenges clearly produce a case for building multifence
security solutions that win every broad protection and
engaging network performance.
A mobile unplanned network (MANET) is Associate in
Nursing autonomous system of mobile hosts (MHs) that
transmit data across a wireless communication medium.
MHs act as routers collectively. thus the functioning of
Manet depends on the trust [1] and cooperation among
nodes. trustworthy MHs ar selected for routing as a results
of it will guarantee successful routing whereas not inflicting
any injury to the data to be routed. trustworthy routing
collectively identifies region node and avoids it so as that
packet is not forwarded through it otherwise packets might
even be born. together with this, resource utilization of
mobile hosts in routing is to boot taken into thought.
Traditional security mechanisms will usually defend
resources from malicious users, by proscribing access to
exclusively approved users. However, information suppliers
can as an example act deceitfully by providing false or
dishonest information, and ancient security mechanisms ar
unable to protect against form of threat. Trust and name
systems on the other hand can offer protection against such
threats.
1.1 kinds of Security Attacks
1)Routing loop attacks: A malicious node might modify
routing packets in such however that packets traverse a
cycle thus do not reach the supposed destination .
2) hollow attacks: a group of cooperating spiteful nodes can
pretend to join 2 distant points at intervals the network
connection among a low-latency communication between
two link remarked as a hollow link, inflicting disruptions in
ancient traffic load and flow.
3) Blackhole attacks: A malicious node, the so remarked as
half node, might forever respond fully to route requests even
once it does not have correct routing information. The half
can drop all packets forwarded to it.
2. Vol-1 Issue-1 2015 IJARIIE-ISSN(O)-2395-4396
1111 www.ijariie.com 2
4) Grayhole attacks: A malicious node might selectively
drop packets.For example, the malicious node might
forward routing packets but not data packets. Similarly, a
depression bad person attracts nodes to route through it thus
selectively routes packets.
5) DoS attacks: A malicious node might block the standard
use or management of communications facilities, as AN
example, by inflicting excessive resource consumption.
6) False information otherwise false recommendation: A
mischievous node might conspire and provide false
recommendations/information to isolate sensible nodes
whereas keeping malicious nodes connected. at intervals the
stacking attack, a malicious node keeps grumbling many
peer node and creates the peer’s negative name.
7) Incomplete info: A malicious node won't collaborate in
providing correct or complete data. usually compromised
nodes conspire to perform this attack. However, node
quality or link failure, prevailing in painter.
8) Packet modification/insertion: A malicious node might
modify packets or insert malicious packets like packets with
incorrect routing information.
9) Newcomer attacks: A malicious node might discard its
dangerous name or distrust by registering as a replacement
user. The malicious node just leaves the system and joins all
over again for trust revocation, flushing out its previous
dangerous history and obtaining right down to accumulate
new trust.
10) Sybil attacks: A malicious node can use multiple
network identities which could have an impression on
topology maintenance and fault tolerant schemes like multi-
path routing.
11) Blackmailing: A mischievous node can blackmail a
different node by spreading false information that an
additional node is malicious otherwise misbehaving. this
could generate important amount of traffic and ultimately
disrupt the usefulness of the whole network. This attack
square measure usually seen as false accusation and DoS
attacks at intervals the sense that false information is
disseminated leading to a significant amount of resource
consumption.
12) Replay attacks: A malicious node might replay earlier
transmitted packets. If the packets embody data, this might
not cause trouble, and conjointly the receiving node merely
discards incorrect packets. However, if the resister replays
route requests, routing table information would become
incorrect, and up to date locations and routing information
might build nodes unapproachable.
13) Selective misbehaving attacks: A malicious node
behaves badly but selectively to various nodes.
14) On-off attacks: A malicious node might instead behave
well and badly to stay unobserved whereas disrupting
services.
15) Conflicting behaviour attacks: A malicious node
might behave otherwise to nodes in many groups to make
the opinions from the assorted sensible groups conflicting,
and ultimately end in non-trusted relationships.
1.2 Routing Protocols in painter
This section discuss relating to different types of protocols
utilized in mobile unintentional network. collectively
comparison between fully totally different routing protocols
with connectedness specific parameters.
1.2.1 impromptu On Demand Distance Vector (AODV)
AODV could also be a reactive protocol, i.e., thus the routes
area unit created and maintained on condition that they are
needed. The routing table stores the information relating to
following hop to the destination and a sequence selection
that's received from the destination and indicating the
freshness of the received packets . collectively the
information relating to the active neighbours is received
throughout the routing of the destination host.
Advantages
1)Because the AODV protocol could also be a flat routing
protocol it does not wish any centrosome system to handle
the routing technique.
2) The overhead of the messages little. If host has the route
information at intervals the Routing Table relating to active
routes at intervals the network, then the overhead of the
routing technique square measure getting to be minimal[16].
3) The AODV protocol could also be a loop free and avoids
the count to infinity disadvantage, that were typical to the
classical distance vector routing protocols, by the usage of
the sequence numbers.
1.2.2 Optimized Link State Routing Protocol
Optimized link state routing [10] could also be a proactive
protocol in this, every node intermittently broadcasts details
through routing table, allowing every node to make
associate inclusive check of the network topology with
3. Vol-1 Issue-1 2015 IJARIIE-ISSN(O)-2395-4396
1111 www.ijariie.com 3
different techniques. The episodic character of this protocol
creates AN oversized amount of overhead along with then
on cut back overhead, it confines the number of mobile
nodes which is capable to forward network huge traffic
along with for this reason it use multipurpose relays
(MPRs), that area unit declarable for forwarding routing
messages as well as optimization for flooding operation.
Mobile nodes, that area unit selected as MPRs can forward
management traffic and decrease the size of management
messages. MPRs area unit chosen by a node, such that, it
ought to reach each two hop neighbor via a minimum of 1
MPR, then it'll forward packets.Mobility causes, route
modification and topology changes really usually and
topology management (TC) messages area component
broadcasted throughout the set of connection network.
Every one mobile devices node maintains the routing table
that includes routes to all otherwise accessible destination
nodes.
Advantages
1) OLSR is to boot a flat routing protocol, it does not wish
centrosome system to handle its routing technique. The
proactive characteristic of the protocol provides that the
protocol has all the routing information to all or any or any
participated hosts at intervals the network.
2) The reactiveness to the topological changes is adjusted by
propelling the number for broadcasting the howdy
messages.
3) as a result of the OLSR routing protocol simplicity in
exploitation interfaces, it's easy to integrate the routing
protocol at intervals the prevailing operational systems,
whereas not propelling the format of the header of the field
messages.
4) OLSR protocol is compatible for the appliance that does
not modify the long delays at intervals the transmission of
the knowledge packets. the foremost effective in operation
atmosphere for OLSR protocol could also be a dense
network, where the foremost communication is concentrated
between AN oversized form of nodes[15].
5)OLSR has collectively extensions to allow for hosts to
possess multiple OLSR interface addresses and provide the
external routing information giving the prospect for routing
to the external addresses.
1.2.3 Dynamic provide Routing protocol (DSR)
The dynamic provide routing protocol (DSR) is associate on
demand routing protocol. DSR is straightforward and
economical routing protocol designed specifically to be
utilized in multi-hop wireless unintentional networks of
mobile nodes. The DSR protocol consists of two main
mechanisms that job on to allow the invention and
maintenance of route at intervals the unintentional network.
Route discovery is that the mechanism by that a node S
would like to send a packet to a destination node D obtains a
route to D .Route discovery is utilized on condition that S
tries to sent a packet to D and does not already grasp a route
to D. Route maintenance is that the mechanism by that node
S is in an exceedingly position to watch .while using a route
to D if the constellation has changed such it'll not use it
route to D as a results of a link on the route not works. once
route maintenance indicates a route is broken. S can tries to
use the opposite route it happens to know to D or it'll invoke
route discovery all over again to hunt out a replacement
route for resultant packets to D. route maintenance for this
route is utilized on condition that S is de facto deed packets
to D.
2. Two name and Trust theme in painter
In multihop networks like mobile impromptu networks
stingy or misbehaving nodes will disrupt the full network
and severely degrade network performance. Reputation, or
trust primarily based models square measure one in every of
the foremost promising approaches to enforce cooperation
and discourage node actus reus. name is calculated through
direct interactions with the nodes and/or indirect data
collected from neighbours.
2.1 Shaping Trust
Trust (Reliability trust):- Trust is that the subjective
likelihood by that a personal, A, expects that another
individual, B, performs a given action on that its welfare
depends.
2.2 Sort of Trust
There square measure 2 kinds of trust :-
Evaluation Trust:-Subjective likelihood by that a personal,
A, expects that another individual, B, performs a given
action on that its welfare depends
Decision Trust:-Willingness to rely on one thing or
someone in an exceedingly given scenario with a sense of
relative security, despite the fact that negative consequences
square measure doable.
2.3 Side of Trust
This section describes totally different side associated with
trust.
4. Vol-1 Issue-1 2015 IJARIIE-ISSN(O)-2395-4396
1111 www.ijariie.com 4
Trust Scope:-A perform that the relying party depends on
and trusts
Functional Trust:-Trusted party performs the perform
Referral Trust:-Trusted party recommends a celebration
which will perform the perform
Direct Trust:-Result of direct expertise
Indirect Trust:-Derived from recommendations
2.4 Shaping name
Reputation is formed and updated on time through direct
observations and via information provided by totally
different members of the community. name is formed and
updated on time through direct observations and via
information provided by totally different members of the
community.
There square measure 3 styles of reputation:-
1) Subjective Reputation:-
The term subjective name to talk regarding the name
calculated directly from a subject's observation. A subjective
name at time t from subject si purpose of scan is calculated
using a weighted mean of the observations' rating factors.
2) Indirect Reputation:-
The subjective name is evaluated exclusively considering
the direct interaction between a topic matter and its
neighbours. With the introduction of the indirect name live
we've got a bent to feature the prospect to duplicate in our
model a characteristic of advanced societies: the final word
price given to the name of a topic matter is influenced to
boot by information provided by totally different members
of the community.
3) Purposeful Reputation:-
The term helpful name to talk regarding the subjective and
indirect name calculated. the prospect to calculate a world
price of a subject's name that takes into thought whole
totally different observation/evaluation criteria.
Reputation could also be thought of as a collective live of
trait supported the referrals or ratings from members
terribly} very community. Associate in Nursing individual’s
subjective trust could also be derived from a mixture of
received referrals and personal experience. thus on avoid
dependence and loops it's required that referrals be
supported first hand experience exclusively, and not on
totally different referrals.
3 Unsure Reasoning
Most tasks requiring intelligent behavior have some extent
of uncertainty related to them. the sort of uncertainty which
will occur in knowledge-based systems could also be caused
by issues with the information. For example: knowledge can
be missing or inaccessible,Data can be gift however
unreliable or ambiguous because of measure errors.The
illustration of the information could also be general or
inconsistent.
Three ways of handling uncertainty:
• Probabilistic reasoning.
• Certainty issues
• Dempster-Shafer Theory
3.1 Probabilistic reasoning
3.1.1 Classical Probability:
The oldest and best printed technique for managing
uncertainty depends on classical math. enable USA to start
to analysis it by introducing a few terms.
Sample space: take under consideration Associate in
Nursing experiment whose outcome is not positive with
certainty before. However, although the results of the
experiment will not be noted before, all possible outcomes is
believed. This set of all possible outcomes of Associate in
Nursing experiment is believed as a result of the sample
house of the experiment and denoted by S.
Event: any set E of the sample home is thought as an
incident. That is, an incident may be a collection consisting
of feasible outcomes of the experiment. If the results of the
testing are contained in E, then we have a tendency to
square measure spoken communication that E has occurred.
Mutually exclusive events: a gaggle of events E1, E2, ...,
nut terribly} very sample house S, unit remarked as
reciprocally selected events if Ei Ej = , i j,1 i, j n.
A formal theory of likelihood square measure usually
created exploitation three axioms:
1) 0≤ P(E) ≤ one.
2) ∑P(Ei) = one (or P(S) = one
5. Vol-1 Issue-1 2015 IJARIIE-ISSN(O)-2395-4396
1111 www.ijariie.com 5
This axiom states that the whole of all events that do not
have an impression on each other, remarked as reciprocally
exclusive events, is 1.
3) P(E1U E2) = P(E1) + P(E2),
where E1 and E2 unit reciprocally exclusive events. In
general, this may be collectively true.
3.1.2 Bayes’ Theorem
Conditional probability is made public as
P(H U E)
P(H | E) = ------------------, for P(E) zero.
P(E)
i.e., the prospect of H given E.
In real-life apply, the prospect P(H | E) cannot invariably be
found at intervals the literature or obtained from maths
analysis. The conditional prospects
P(E | H)
however usually unit easier to come back by;
Thus
P(E | H) P(H)
P(H | E) = ---------------------
P(E)
Hypothetical reasoning as well as backward induction
1) Bayes’ Theorem is sometimes applied for decision tree
analysis of big business and conjointly the social sciences.
2) the strategy of theorem higher operation is to boot
utilized in knowledgeable system labourer.
3.1.3 Theorem logical thinking
Is a technique of statistical inference in which Bayes' rules is
wont to update the likelihood estimate for a hypothesis as
additional evidence is non inheritable. theorem change is a
crucial technique throughout statistics, and particularly in
mathematical statistics. for a few cases, exhibiting a theorem
derivation for a {statistical technique|statistical
procedure|method} mechanically ensures that the strategy
works still as any competitive method.[5]Bayesian change
is particularly necessary within the dynamic analysis of a
sequence of information. theorem logical thinking has found
application in an exceedingly vary of fields as well as
science, engineering, philosophy, medicine and law.
In the philosophy of decision theory, theorem logical
thinking is closely associated with discussions of subjective
likelihood, usually referred to as "Bayesian probability"
theorem probability provides a rational method for change
beliefs
Advantages and drawbacks of theorem ways
The theorem ways have variety of benefits that indicates
their quality in uncertainty management. most vital is their
sound theoretical foundation in applied math. Thus, they're
presently the foremost mature of all of the uncertainty
reasoning ways.
While theorem ways square measure additional developed
than the opposite uncertainty ways, they're not while not
faults.
3.1.4 Certainty issue
Certainty factor
Certainty issue is another methodology of handling
uncertainty. This technique was firstly develop for the
MYCIN system. One of the complexities with theorem
methodology is that there unit too many possibilities
required. Most of them could also be unknown. The problem
gets really unhealthy once there unit many things of proof.
Besides the matter of amassing all the conditional
possibilities for the concept methodology, another major
draw back that appeared with doctors was the association of
belief and disbelief. ab initio sight, this might appear trivial
since clearly disbelief is simply the choice of belief. In fact,
the speculation of chance state
P(H) + P(H’) = one
and so P(H) = one - P(H’)
For the case of a posterior assumption that depends on
proof,
P(H | E) = one - P(H’ | E)
However, once the MYCIN knowledge engineers began
interviewing doctors, they found that physicians were
terribly reluctant to state their knowledge at intervals the
sort.
6. Vol-1 Issue-1 2015 IJARIIE-ISSN(O)-2395-4396
1111 www.ijariie.com 6
The CF formalism has been quite trendy skilled system
developers since its creation as a results of
1. it's a straightforward method model that permits
specialists to estimate their confidence finally being drawn.
2. It permits the expression of belief and disbelief in each
hypothesis, allowing the expression of the results of multiple
sources of proof.
3. It permits knowledge to be captured terribly} very rule
illustration whereas allowing the quantification of
uncertainty.
4. The gathering of the CF values is significantly easier than
the gathering of values for the other ways that. No math
base is required - you just have to be compelled to raise the
skilled for the values.
Other criticisms of this uncertainty reasoning methodology
embody among others:
1. The CF lack theoretical foundation. Basically, the CF
were part sudden. it's academic degree approximation of
math.
2. Non-independent proof is expressed and combined
exclusively by ―chunking‖ it on among constant rule. once
big quantities of non-independent proof ought to be
expressed, this proves to be failing
3. The CF values could also be the choice of conditional
possibilities.
3.1.5 Dempster-Shafer Theory
Here we've got a bent to debate another methodology for
handling uncertainty. it's referred to as Dempster-Shafer
theory. it's evolved throughout the Sixties and Nineteen
Seventies through the efforts of Arthur Dempster and one in
all his students, traveler Shafer.
1) This theory was designed as a mathematical theory of
proof.
2) the event of the concept has been driven by the
observation that math is not able to distinguish between
uncertainty and knowledge as a results of incomplete
information.
Frames of discernment: Given a set of potential parts,
referred to as atmosphere,
= {1, 2, ..., n}
that unit reciprocally exclusive and complete. The
atmosphere is that the set of objects that unit of interest to
U.S. The subsets of the atmosphere unit all potential valid
answers throughout this universe of discourse. Associate in
nursing atmosphere is to boot referred to as a frame of
discernment. The term understands means that it's potential
to differentiate the one correct answer from all the other
potential answers to a problem. the flexibility set of the
atmosphere (with 2N subsets for a set of size N) has as its
parts all answers to the potential queries of the frame of 2
discernment.
Mass Functions and Ignorance: In theorem theory, the
posterior chance changes as proof is acquired . Likewise in
Dempster-Shafer theory, the idea conspicuous would
possibly vary.It is customary in Dempster-Shafer theory to
believe the degree of belief conspicuous as analogous to the
mass of a object. That is, the mass of proof supports a belief.
the principle for the Associate in Nursingalogy with AN
object of mass is to place confidence in belief as a quantity
which is able to move around, be go other ways, and
combined. A basic distinction between Dempster-Shafer
theory and math is that the treatment of knowledge. If you
have no previous knowledge, then you wish to assume the
chance P of each risk is
P=1/N
where N is that the variability of potentialities.The
Dempster-Shafer theory does not force belief to be assigned
to knowledge or refutation of a hypothesis. The mass is
assigned exclusively to those subsets of the atmosphere
thereto you'd wish to assign belief. Any belief that is not
assigned to a specific set is taken under consideration no
belief or nonbelief and easily associated with atmosphere .
Belief that refutes a hypothesis is disbelief, that may not
nonbelief.
Difficulty with the Dempster-Shafer theory
1) One downside with the Dempster-Shafer theory happens
with standardisation and will cause results that unit contrary
to our expectation.
2) the matter is that it ignores the idea that the factor being
thought of does not exist.
4. Experimental Parameters
Throughput
It defines as a result of the whole vary of packets delivered
over the whole simulation time.it is one in each of the
dimensional parameters of the network that provides the
7. Vol-1 Issue-1 2015 IJARIIE-ISSN(O)-2395-4396
1111 www.ijariie.com 7
fraction of the information rate used for useful transmission
selects a destination at the beginning of the simulation i.e
knowledge wheather or not data packet properly delivered to
the destination[3].
Packet Delivery relation
Packet delivery relation is made public as a result of the
relation of information packet received by the destination to
those generation by the. Mathematically, it square measure
usually printed as:
PDR=S1/S2
Where S1is the whole of information packet received by the
each destination and S2 is that the whole of information
packet generated by the each source[3].
End to complete delay
The average end to complete delay of information packet is
that the interval between the knowledge packet generation
time and thus the time once the last bit arrives at the
destination.
The average time it takes a data packet to attain the
destination[5].This includes all potential delays caused by
buffering throughout route discovery latency, queuing at the
interface queue. This metric is calculated by subtracting
time at that initial packet was transmitted by provide from
time at that initial data packet arrived to destination.
Mathematically, it square measure usually printed as:
Avg EED=S/N
Where S is that the whole of the time spent to deliver
packets for each destination , and N is that the vary of
packet received by the all destination nodes.
Overhead
The amount of routing traffic increase as a result of the
network grows. a vital of the quality of the protocol, and
thus the network, is its routing overhead. it's printed as a
result of the whole vary of routing packets transmitted over
the network, expressed in bit per seconds or packets per
second.
Some supplys of routing overhead throughout a network
unit cited at intervals the vary of neighbors to the node and
thus the vary of hops from the supply to the destination.
various causes of overhead unit network congestion and
route error packet.
5. CONCLUSION
MANETs include many little devices communication
spontaneously over the air (wireless).The topology of the
network is changing frequently as a result of the mobile
nature of its nodes. specific finally induces that there don't
seem to be any such things as mounted routers, thus every
node should act as a router for its neighbors. Trust-based
schemes area unit thought-about as effective mechanisms
associated with cryptologic techniques for thwarting a
spread of attacks. as a result of the properties of MANETs,
trust establishment needs Associate in Nursing intelligent
approach to identify attackers’ misconduct.
A routing protocol for MANETs have to be compelled to
offer incentives for acting properly and it have to be
compelled to be able to realize misbehaving nodes and
punish them. In MANETS no priori trust relationships and
no central trustworthy authorities exist. The goal is to see
trust relationships by using a reputation-based trust
management theme. this could be done by getting name for
a node and mixture this with personal observations
regarding its behavior. theorem interface is utilized for
direct observation and Dempster-shafer theory is utilized to
calculate trust value supported indirect observation. to
calculate trust price supported indirect observation.
6. References
[1] Y. Wang, F. Yu, H. Tang, and M. Huang, ―A mean field
game theoretic approach for security enhancements in
mobile ad hoc networks,‖ IEEE Trans. Wireless Commun.,
vol. 13, no. 3, pp. 1616–1627, 2014.
[2] Z. Wei, H. Tang, F. R. Yu, and M. Wang, ―Security
enhancement for mobile ad hoc networks routing with
OLSRv2,‖ in Proc. SPIE Defence, Security, and Sensing
2013, (Baltimore, MD, USA), Apr. 2013.
[3] Q. Guan, F. Yu, S. Jiang, and V. Leung, ―Joint topology
control and security in mobile ad hoc networks with
cooperative communications,‖ IEEE Trans. Veh. Tech., vol.
61, no. 6, pp. 2674–2685, 2012.
[4] J. Loo, J. Lloret, and J. H. Ortiz, Mobile Ad Hoc
Networks:Current Status and Future Trends. CRC Press,
2011.
[5] B. Elizabeth, R. Aaishwarya, P. Kiruthika, M. Shrada, A.
Prakash, and V. Uthariaraj, ―Bayesian based confidence
model for trust inference in manets,‖ in Proc. IEEE
ICRTIT’11, (Chennai, Tamil Nadu, India), Jun. 2011.
8. Vol-1 Issue-1 2015 IJARIIE-ISSN(O)-2395-4396
1111 www.ijariie.com 8
[6] J. H. Cho, A. Swami, and I. R. Chen, ―A survey on trust
management for mobile ad hoc networks,‖ IEEE Commun.
Surveys & Tutorials, vol. 13, no. 4, pp. 562–583, 2011.
[7] Han Yu, Zhiqi Shen, Chunyan Miao, Cyril Leung, and
Dusit Niyato,‖A Survey of Trust and Reputation
Management System in Wireless Communications,‖ proc. of
the IEEE, 2010.
[8] Velloso, Daniel de O. Pedro B. Cunha, Rafael P Laufer,
Otto Carlos M.B. Duarte, Guy Pujolle.‖ Trust Management
In Mobile Ad hoc Networks Using a Scalable Maturity
Based Model, IEEE transactions on networks and Service
Management Vol. & No. 3 Sept. 2010. pp172 - 185.
[9] A. Darwiche, Modeling and reasoning with Bayesian
Networks. Cambridge University Press, 2009.
[10] M. Momani, S. Challa, and R. Alhmouz, ―BNWSN:
Bayesian network trust model for wireless sensor networks,‖
in Proc. MIC-CCA 2008, (Amman), Aug. 2008.
[11] CHEN Aiguo, XU Guoai, Yang Yixian, ―A Cluster
Based Trust Model For Mobile Ad-hoc Networks‖, 2008
IEEE.
[12] Y. Beghriche, V. Toubiana, and H. Labiod, ―A
bayesian filter to detect misbehaving nodes in manets,‖ in
Proc. NTMS’08, (Tangier, Morocco), Nov. 2008.
[13] C. T. Nguyen, O. Camp, and S. Loiseau, ―A Bayesian
network based trust model for improving collaboration in
mobile ad hoc networks,‖ in Proc. IEEE Research,
Innovation and Vision for the Future, (Hanoi, Vietnam),
Mar. 2007.
[14] Theodorakopoulos and J.S. Baras, ―On Trust Models
and Trust Evaluation Metrics for Ad-hoc Networks,‖ IEEE
Journal on selected Areas in Communications, Vol24, No. 2,
Feb 2006, pp. 318-328