RETRACTED: Optimized Fuzzy System Dependent Trust Score for Mobile AdHoc Network (Retracted article. See vol. 128, pg. 729, 2023)

被引:4
作者
Thangaraj, Kavitha [1 ]
Dharma, Dejey [1 ]
机构
[1] Anna Univ, Dept CSE, Reg Campus, Tirunelveli, Tamil Nadu, India
关键词
MANET; Detection of malevolent node; Trust management; Optimized fuzzy system and cat swarm optimization (CSO);
D O I
10.1007/s11277-020-07984-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile Ad-Hoc Network (MANET) consist a numerous nodes and these nodes are structured with remote transceivers. These nodes forward the message with one another by getting to the typical channel. In MANET, security is the principle challenge to be analyzed. Due to the behaviour of malevolent nodes, the network security is weakened. Along these lines, the significant goal of this research is to enhance the network security by detecting the malevolent nodes. So, for the detection of malevolent node, an effective trust management method is presented in this paper. Improving the trust score the optimized fuzzy framework is proposed. For enhancing the execution of the fuzzy framework, the triangular membership function of the input parameters is improved with the Cat Swarm Optimization. After estimating the trust score for every node in the network, threshold depend decision module is processed for detecting the activity of malevolent nodes. Implementation results illustrate that the execution of the proposed model achieves maximum network lifetime and minimum energy consumption.
引用
收藏
页码:3255 / 3269
页数:15
相关论文
共 20 条
[1]  
Appiah M, 2016, 2016 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND ENGINEERING (ICACCE 2016), P208, DOI 10.1109/ICACCE.2016.8073749
[2]  
Appiah M, 2017, 2017 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING APPLICATIONS (NEXTCOMP), P47, DOI 10.1109/NEXTCOMP.2017.8016175
[3]   Fuzzy Based Detection of Malicious Activity for Security Assessment of MANET [J].
Bisen, Dhananjay ;
Sharma, Sanjeev .
NATIONAL ACADEMY SCIENCE LETTERS-INDIA, 2018, 41 (01) :23-28
[4]   DEBH: detecting and eliminating black holes in mobile ad hoc network [J].
Dorri, Ali ;
Vaseghi, Soroush ;
Gharib, Omid .
WIRELESS NETWORKS, 2018, 24 (08) :2943-2955
[5]   Two novel trust evaluation algorithms [J].
Durad, Muhammad Hanif ;
Cao, Yuanda ;
Liehuang, Zhu .
2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, :1641-+
[6]  
Hoebeke J, 2004, J COMMUN NETW-UK, V3, P60
[7]  
Hui Xia, 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications, P124, DOI 10.1109/GreenCom.2011.30
[8]  
Kalpana Devi M., 2020, INT J INTELLIGENT NE, V1, P67, DOI [10.1016/j.ijin.2020.07.002, DOI 10.1016/J.IJIN.2020.07.002]
[9]   A survey of routing attacks in mobile Ad Hoc networks [J].
Kannhavong, Bounpadith ;
Nakayama, Hidehisa ;
Nemoto, Yoshiaki ;
Kato, Nei ;
Jamalipour, Abbas .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) :85-91
[10]   Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack [J].
Kukreja, Deepika ;
Dhurandher, S. K. ;
Reddy, B. V. R. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :941-956