UNIFIED TRUST MANAGEMENT SCHEME THAT ENHANCES THE SECURITY IN MANET USING UNCERTAIN REASONING

被引:0
作者
Sasirehka, S. [1 ]
Vijayakumar, S. [1 ]
Abinaya, K. [1 ]
机构
[1] Paavai Engn Coll, Dept ECE, Namakkal, Tamil Nadu, India
来源
2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS) | 2015年
关键词
Manet; uncertain reasoning; trust management; security; Bayesian; dempster shafer theory; AD-HOC NETWORKS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The characteristic options of mobile circumstantial networks (MANETs), as well as dynamic topology and open wireless intermediate, could lead MANETs full of several security vulnerabilities. OLSRv2 scheme that uses the shortest path based on hop count. Although OLSRv2 provides extensions for customization there is no specific security mechanism in the protocol. Most of existing approaches do not exploit direct and indirect observation at the same time to evaluate the trust of an observed node. The existing scheme has a very low throughput even if the number of malicious nodes is very small. In the proposed trust management scheme, the trust model has two techniques are trust from direct observation and trust from indirect observation. In direct observation, the trust value of observer node can be derived using Bayesian inference theory. Similarly the dempster-shafer functioned for neighbor node. Intensive simulation results show the effectiveness of the projected theme. Specifically, we can achieve a throughput in a rate of 6kbps for indirect, 5.8kbps for direct observation and packet delivery quantitative relation will be improved with slightly increased average finish to finish delay and overhead of messages.
引用
收藏
页码:1497 / 1505
页数:9
相关论文
共 16 条
[1]  
Albers P., 2002, P 1 INT WORKSH WIR I
[2]  
[Anonymous], P 2 WORKSH EC PEER P
[3]   Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks [J].
Bu, Shengrong ;
Yu, F. Richard ;
Liu, Xiaoping P. ;
Tang, Helen .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (09) :3064-3073
[4]   Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks [J].
Bu, Shengrong ;
Yu, F. Richard ;
Liu, Xiaoping P. ;
Mason, Peter ;
Tang, Helen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (03) :1025-1036
[5]  
Guan Q., IEEE T VEH TECH, V61, P2674
[6]  
Kathiravan R, 2014, 2014 P INT C AD TECH, P694
[7]   SPREAD: Improving network security by multipath routing in mobile ad hoc networks [J].
Lou, Wenjing ;
Liu, Wei ;
Zhang, Yanchao ;
Fang, Yuguang .
WIRELESS NETWORKS, 2009, 15 (03) :279-294
[8]  
Marti S., 2000, P ACM MOBICOM 00 NEW
[9]   Intrusion detection in wireless ad hoc networks [J].
Mishra, A ;
Nadkarni, K ;
Patcha, A .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) :48-60
[10]  
Verma T. S., 1990, Equivalence and Synthesis of Causal Models.