An efficient trust-based secure energy-aware clustering to mitigate trust distortion attack in mobile ad-hoc network

被引:8
作者
Rajeswari, Alagan Ramasamy [1 ]
Ganapathy, Sannasi [2 ,3 ]
Kulothungan, Kanagasabai [4 ]
Kannan, Arputharaj [5 ]
机构
[1] Sethu Inst Technol, Dept Comp Sci & Engn, Virudunagar, Tamil Nadu, India
[2] Vellore Inst Technol, Res Ctr Cyber Phys Syst, Chennai Campus, Chennai, Tamil Nadu, India
[3] Vellore Inst Technol, Sch Comp Sci & Engn SCOPE, Chennai Campus, Chennai, Tamil Nadu, India
[4] Anna Univ, Dept Informat Sci & Technol, CEG Campus, Chennai, Tamil Nadu, India
[5] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore Campus, Vellore, Tamil Nadu, India
关键词
clustering; direct trust; energy; recommendation trust; trust; trust distortion attack; ROUTING ALGORITHM; PROTOCOL;
D O I
10.1002/cpe.6223
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Trust-aware clustering plays a vital role in addressing the security issues faced by mobile ad-hoc networks (MANETs). The trust worthiness of each participated node is to be estimated for ensuring the secure communications in MANETs. In this article, we propose a new trust-based secure energy-aware clustering (TSEAC) model to mitigate the malicious nodes from the network and form secure energy aware clusters with a cluster head which is more stable and trustworthy. Moreover, two novel algorithms namely energy-efficient trust-aware secure clustering algorithm and filtering untrustworthy recommendation (FUR) algorithm are proposed in this work. Here, the trust value of a node is measured by both direct trust estimation and indirect trust estimation methods using the Beta distribution technique. The trust value of the node is estimated in terms of the behavior of the node. The role of the FUR algorithm is to enhance the clustering process by mitigating the trust-distortion attack. Thus, from the simulation results it is observed that the proposed work, TSEAC outperforms in improving the lifetime of the network by 38% than the other existing work such as CBTRP, AOTDV, and CBRP. Furthermore, TSEAC shows an improvement of 20% to 24% when compared to CBTRP, 27% to 31% in contrast to AOTDV and 35% to 42% superior to CBRP in terms of packet delivery ratio. Similarly, TSEAC shows 22% to 26%, 28% to 33%, and 34% to 38% better throughput in contrast to CBTRP, AOTDV, and CBRP, respectively.
引用
收藏
页数:18
相关论文
共 38 条
  • [1] Decentralized trust management
    Blaze, M
    Feigenbaum, J
    Lacy, J
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 164 - 173
  • [2] Buchegger S., 2002, MOBIHOC 2002. Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, P226, DOI 10.1145/513800.513828
  • [3] STACRP: a secure trusted auction oriented clustering based routing protocol for MANET
    Chatterjee, Pushpita
    Sengupta, Indranil
    Ghosh, S. K.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2012, 15 (03): : 303 - 320
  • [4] Chauhan N, 2011, COMM COM INF SC, V142, P147
  • [5] Dealing with dishonest recommendation: The trials in reputation management court
    Chen, Shenlong
    Zhang, Yuqing
    Liu, Qixu
    Feng, Jingyu
    [J]. AD HOC NETWORKS, 2012, 10 (08) : 1603 - 1618
  • [6] Chiang CC, 1997, NETWORKS: THE NEXT MILLENNINUM - THE IEEE SINGAPORE INTERNATIONAL CONFERENCE ON NETWORKS 1997, IEEE SICON'97, P197
  • [7] Chlamtac Imrich., 2003, Ad Hoc Networks, V1, P13, DOI DOI 10.1016/S1570-8705(03)00013-1
  • [8] Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1001 - 1012
  • [9] Choi Wonchang., 2006, Telecommunications, P73, DOI [10.1109/AICT-ICIW.2006.11, DOI 10.1109/AICT-ICIW.2006.11]
  • [10] Dutta N., 2010, INT J COMPUT SCI ENG, V2, P36