An Enhanced Associativity Based Routing with Fuzzy Based Trust to Mitigate Network Attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
An Enhanced Associativity Based Routing with Fuzzy Based Trust to Mitigate Network Attacks

Authors: K. Geetha, P. Thangaraj

Abstract:

Mobile Ad Hoc Networks (MANETs) is a collection of mobile devices forming a communication network without infrastructure. MANET is vulnerable to security threats due to network’s limited security, dynamic topology, scalability and the lack of central management. The Quality of Service (QoS) routing in such networks is limited by network breakage caused by node mobility or nodes energy depletions. The impact of node mobility on trust establishment is considered and its use to propagate trust through a network is investigated in this paper. This work proposes an enhanced Associativity Based Routing (ABR) with Fuzzy based Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS and to mitigate network attacks.

Keywords: Mobile Ad hoc Networks (MANET), Associativity Based Routing (ABR), Fuzzy based Computed Trust.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1108717

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2512

References:


[1] Bang, A. O., & Ramteke, L. P. (2013). MANET: History, Challenges And Applications. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2(9), 249-251.
[2] Goyal, P., Parmar, V., & Rishi, R. (2011). Manet: Vulnerabilities, challenges, attacks, application. IJCEM International Journal of Computational Engineering & Management, 11(2011), 32-37.
[3] Kumar, M., & Mishra, R. (2012). An Overview of MANET: History, Challenges and Applications. Indian Journal of Computer Science and Engineering (IJCSE), 3(1), 121-125.
[4] Bakshi, A., Sharma, A. K., & Mishra, A. Significance of Mobile ADHOC Networks (MANETS).
[5] Virendra, M., Jadliwala, M., Chandrasekaran, M., & Upadhyaya, S. (2005, April). Quantifying trust in mobile ad-hoc networks. In Proc. IEEE Int’l Conf. Integration of Knowledge Intensive Multi-Agent Systems (KIMAS).
[6] Rajaram, A., & Palaniswami, D. S. (2009). A trust based cross layer security protocol for mobile ad hoc networks. arXiv preprint arXiv:0911.0503.
[7] Subramanian, S., & Ramachandran, B. (2012). Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks. arXiv preprint arXiv:1202.1664.
[8] Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. Communications Surveys & Tutorials, IEEE, 13(4), 562-583.
[9] Wang, C., Yang, X., & Gao, Y. (2005). A routing protocol based on trust for MANETs. In Grid and Cooperative Computing-GCC 2005 (pp. 959-964). Springer Berlin Heidelberg.
[10] Luo, J., Liu, X., Zhang, Y., Ye, D., & Xu, Z. (2008, October). Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks. InLCN (pp. 305-311).
[11] Duraimurugan, A., Karthi, S., & Kirupagaran, D. A Trust Based Secure Source Routing using Fuzzy Logic Rules Prediction in Mobile Ad Hoc Networks.
[12] Singh, Y., & Siwach, M. V. (2012). Quality of Service in MANET. Int. J. Innov. Eng. Technol.
[13] Upadhayaya, S., & Gandhi, C. (2009). Quality of service routing in mobile ad hoc networks Using location and energy parameters. Int. Journal of Wireless & Mobile Networks (IJWMN), 1(2).
[14] Jawhar, I., & Wu, J. (2005). Quality of service routing in mobile ad hoc networks. In Resource Management in Wireless Networking (pp. 365- 400). Springer US.
[15] Zhu, C., & Corson, M. S. (2002). QoS routing for mobile ad hoc networks. InINFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE (Vol. 2, pp. 958-967). IEEE.
[16] Mamatha, T. (2012). Network security for MANETS. In International Journal of Soft Computing and Engineering (IJSCE), Volume-2, Issue-2.
[17] Fujiwara, S., Ohta, T., & Kakuda, Y. (2012, June). An inter-domain routing for heterogeneous mobile ad hoc networks using packet conversion and address sharing. In Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on (pp. 349-355). IEEE.
[18] Othman, N. E., & Weber, S. (2011, October). Towards Tag-based cooperation for mobile ad hoc networks. In Reliable Distributed Systems Workshops (SRDSW), 2011 30th IEEE Symposium on (pp. 20-25). IEEE.
[19] Li-Qing, C., & Rong-lin, H. (2010, July). Group key agreement scheme for mobile ad hoc networks based on threshold secret sharing. In Electronic Commerce and Security (ISECS), 2010 Third International Symposium on (pp. 176-180). IEEE.
[20] Thorat, S. A., & Kulkarni, P. J. (2014, July). Design issues in trust based routing for MANET. In Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on (pp. 1-7). IEEE.
[21] Chze, P. L. R., Yan, W. K. W., & Leong, K. S. (2012, August). A User- Controllable Multi-Layer Secure Algorithm for MANET. In Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International (pp. 1080-1084). IEEE.
[22] Nakahara, S., Ohta, T., & Kakuda, Y. (2013, December). Experimental Evaluation of MANET Based on Autonomous Clustering and P2P Overlay Network. In Computing and Networking (CANDAR), 2013 First International Symposium on (pp. 480-483). IEEE.
[23] Joshi, S., Sheikh, R., & Mishra, D. K. (2010, September). Schematize Trust Overlays and Management for Privacy Preservation in MANET. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2010 Second International Conference on (pp. 106-110). IEEE.
[24] Liao, J., Zhang, H., Jiang, L., & Liu, Y. (2011, April). A clustering algorithm based on subjective trust in MANET. In Electric Information and Control Engineering (ICEICE), 2011 International Conference on (pp. 3817-3820). IEEE.
[25] Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust management for mobile ad hoc networks. Communications Surveys & Tutorials, IEEE, 13(4), 562-583.
[26] Jabbehdari, S., Shamaei, M., & Darehshoorzadeh, A. (2010, October). IQoS-ODMRP: A novel routing protocol considering QoS parameter in MANET. InIndustrial Electronics & Applications (ISIEA), 2010 IEEE Symposium on (pp. 126-130). IEEE.
[27] Lal, C., Laxmi, V., & Gaur, M. S. (2013, August). QoS-aware routing for transmission of H. 264/SVC encoded video traffic over MANETs. In Communications (APCC), 2013 19th Asia-Pacific Conference on (pp. 104-109). IEEE.
[28] Peng, H., Bai, Y., & Liu, X. (2012, March). End-to-End QoS Guaranteed Approach Using Multi-object Genetic Algorithm in Cognitive MANETs. In Advanced Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on (pp. 938-943). IEEE.
[29] Santhi, G., Nachiappan, A., Ibrahime, M. Z., Raghunadhane, R., & Favas, M. K. (2011, June). Q-learning based adaptive QoS routing protocol for MANETs. In Recent Trends in Information Technology (ICRTIT), 2011 International Conference on (pp. 1233-1238). IEEE.
[30] Kulla, E., Spaho, E., Xhafa, F., Barolli, L., & Takizawa, M. (2012, November). Using data replication for improving QoS in MANETS. In Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications (pp. 529-533). IEEE Computer Society.
[31] Shaar, S. A., Masoud, F. A., Murad, A., Shalabi, R. A., & Kanaan, G. (2006). Analysis of enhanced associativity based routing protocol. Journal of Computer Science, 2(12), 853.
[32] Liu, C., & Kaiser, J. (2003). A survey of mobile ad hoc network routing protocols. Universität Ulm, Fakultät für Informatik..
[33] Sharma, S. K., Kumar, R., Gangwar, A., & Pakhre, K. Routing Protocols and Security Issues in MANET: A Survey.
[34] Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. Personal Communications, IEEE, 6(2), 46-55.
[35] Raja, J., & Santosh, S. (2013). Comparative study of reactive routing protocol (AODV, DSR, ABR and TORA) in MANET. IJECS, 2(3).
[36] Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: a survey. Communications Surveys & Tutorials, IEEE, 14(2), 279-298.
[37] Dai, H., Jia, Z., & Qin, Z. (2009). Trust evaluation and dynamic routing decision based on fuzzy theory for manets. Journal of Software, 4(10), 1091-1101.