We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Packet Forwarding Misbehaviour Isolation using Fuzzy Trust-based Secure Routing in MANET

by Jenish R.gandhi, Rutvij H. Jhaveri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 3
Year of Publication: 2015
Authors: Jenish R.gandhi, Rutvij H. Jhaveri
10.5120/21684-4786

Jenish R.gandhi, Rutvij H. Jhaveri . Packet Forwarding Misbehaviour Isolation using Fuzzy Trust-based Secure Routing in MANET. International Journal of Computer Applications. 122, 3 ( July 2015), 30-35. DOI=10.5120/21684-4786

@article{ 10.5120/21684-4786,
author = { Jenish R.gandhi, Rutvij H. Jhaveri },
title = { Packet Forwarding Misbehaviour Isolation using Fuzzy Trust-based Secure Routing in MANET },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 3 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 30-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number3/21684-4786/ },
doi = { 10.5120/21684-4786 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:39.312779+05:30
%A Jenish R.gandhi
%A Rutvij H. Jhaveri
%T Packet Forwarding Misbehaviour Isolation using Fuzzy Trust-based Secure Routing in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 3
%P 30-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANETs are much more susceptible to various attacks because of openness in network topology and being away of a centralized administration in management. As an outcome of that, more malicious nodes are often comes in and goes out without being detected from the network topology. Hence, MANET needs very specialized security methods to isolate the false entrance. As well as there is no single solution that fitting in different types of the network where the nodes can be behave like any apparatuses. The networks works well if the nodes are trusty and act rightly cooperatively. In order to improve the security of the network, this paper gets started the new interesting approach to evaluate the trustworthiness of the nodes. Fuzzy Trust-based Secured Routing (FTSR) approach provides a flexible and feasible approach to choose trusted route to meet the requirement of the security of the data transmission. In this, fuzzy logic rule prediction mechanism is adopted to notice the future behavior of node by updating the node's trust. We have also analyzed the performance metrics such as packet delivery ratio, end-to-end delay and average throughput which can also increased accordingly through newest approach.

References
  1. Bansal, Meenakshi, Rachna Rajput, and Gaurav Gupta, "Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations", The Internet Society, 1999.
  2. Neetesh Saxena, Narendra S. Chaudhari, "Message Security in Wireless Networks: Infrastructure based vs. Infrastructureless Networks", IEEE, 2012.
  3. Yu, Shuyao, Youkun Zhang, Chuck Song, and Kai Chen, "A security architecture for mobile ad hoc networks. ", In Proceedings of APAN Network Research Workshop, Cairns, Australia, 2003.
  4. Gandhi, Jenish R. , and Rutvij H. Jhaveri, "Addressing packet forwarding misbehaviour using trust-based approach in Ad-hoc networks: A survey. ", In Signal Processing And Communication Engineering Systems (SPACES), 2015 International Conference on, IEEE, pp. 391-396, 2015.
  5. Sethi, Srinivas, and Siba K. Udgata, "Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks", Multi-disciplinary Trends in Artificial Intelligence, Springer Berlin Heidelberg, Pp. 112-123, 2011.
  6. Marchang, Ningrinla, and Raja Datta, "Light-weight trust-based routing protocol for mobile ad hoc networks", Information Security, IET 6, no. 2, Pp. 77-83, 2012.
  7. Xia, Hui, Zhiping Jia, Xin Li, Lei Ju, and Edwin H-M. Sha, "Trust prediction and trust-based source routing in mobile ad hoc networks", Ad Hoc Networks 11, no. 7, Pp. 2096-2114, 2013.
  8. Bar, Radha Krishna, Jyotsna Kumar Mandal, and Moirangthem Marjit Singh, "QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack", Procedia Technology 10, 530-537, 2013.
  9. Biswas, Suparna, Tanumoy Nag, and Sarmistha Neogy, "Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET", In Applications and Innovations in Mobile Computing (AIMoC), IEEE, Pp. 157-164, 2014.
  10. Xia, Hui, Zhiping Jia, and Edwin H-M. Sha, "Research of trust model based on fuzzy theory in mobile ad hoc networks", IET Information Security 8, no. 2, Pp. 88-103, 2013.
  11. Gandhi, Jenish, and Rutvij Jhaveri, "Energy Efficient Routing Approaches in Ad hoc Networks: A Survey. ", In Information Systems Design and Intelligent Applications, Springer India, pp. 751-760, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Trust MANET Security AODV Fuzzy Logic FTSR