CFP last date
20 December 2024
Reseach Article

Implementation of Dempster-Shafer Theory for Trust based Communication in MANET

by Geetanjali Batham, Vikas Sejwar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 150 - Number 11
Year of Publication: 2016
Authors: Geetanjali Batham, Vikas Sejwar
10.5120/ijca2016911660

Geetanjali Batham, Vikas Sejwar . Implementation of Dempster-Shafer Theory for Trust based Communication in MANET. International Journal of Computer Applications. 150, 11 ( Sep 2016), 27-32. DOI=10.5120/ijca2016911660

@article{ 10.5120/ijca2016911660,
author = { Geetanjali Batham, Vikas Sejwar },
title = { Implementation of Dempster-Shafer Theory for Trust based Communication in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 150 },
number = { 11 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume150/number11/26139-2016911660/ },
doi = { 10.5120/ijca2016911660 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:55:43.614549+05:30
%A Geetanjali Batham
%A Vikas Sejwar
%T Implementation of Dempster-Shafer Theory for Trust based Communication in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 150
%N 11
%P 27-32
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad-hoc network is growing field of research where lots of work done regarding to security of network. Due its infrastructure and mobility of nodes change their position newly node easily enter or exit from networks and it is highly vulnerable to attacks. In this work we study about MANET and various attacks after that various technique to prevent our network from attacks, but all have some issues so overcome this problem we proposed a trust based technique in which communication occurred only between trusted nodes. Implementation of our work done on ns-2.35 and uniqueness of our work proof by packet delivery ratio, throughput and various results.

References
  1. Karuturi.Satish, K. Ramesh “Intrusion Determent using Dempster-Shafer Theory in MANET Routing” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 37-41
  2. L. Eschenauer, V. D. Gligor, and J. Baras, “On Trust Establishment in Mobile Ad Hoc Networks,” Proc. 10th Int’l Security Protocols Workshop, Cambridge, U.K., Apr. 2002, vol. 2845, pp. 47-66.
  3. Savitasemplay, rajnisobti and veenumangat, “Review:Trust management in MANETs” International Journal of applied Engineering Research,ISSN 0973-4562 Vol.7 No.11(2012)
  4. Subi V S, NishanthN ”Trust Assurance Mechanism against Gray Hole Attack in Mobile Ad Hoc Network” International Journal of Advanced Trends in Computer Science and Engineering(IJATCSE), Vol.4, No.4 Pages:01-05(2015)
  5. C. Park, Y. Lee, H. Yoon, S. Jin and D. Chio, “Cluster based Trust Evaluation in Ad Hoc Networks”, pp. 503-507.
  6. S. Peng, W. Jia and G. Wang, “Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad-Hoc Networks”, IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, (2008), pp. 3-9
  7. P. Annadurai, S. Vijayalakshmi “Identifying Malicious Node Using Trust Value in Cluster Based MANET (IMTVCM)”, 20114 International Conference on Control, Instrumentation, Communication and Computational technologies(ICCICCT).
  8. Maha Abdelhaq, Rosilah Hassan, Mahamod Ismail, Raed Alsaqour, Daud Israf, Detecting Sleep Deprivation Attack over MANET Using a Danger Theory –Based Algorithm, International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(3): 534-541 The Society of Digital Information and Wireless Communications, 2011 (ISSN: 2220-9085).
  9. Pooja Jaiswal, Dr. Rakesh Kumar, “Prevention of Black Hole Attack in MANET” IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501 Vol.2, No5, October 2012
  10. Y. R. Tsai and S. J. Wang, “Two-tier authentication for cluster and individual sets in mobile ad-hoc networks,” Comput. Netw., vol. 51, no. 3, pp. 883–900, 2007.
  11. Pakleppa, M.; Vorstius, J.B.; Keatch, R.; Tapia-Siles, S.C.; Coleman, S.; Cuschieri, A. "Dempster-Shafertheory applied in state estimation of a pressure driven endoscope for Hydro-colonoscopy", Information Fusion
  12. Sun.L, Srivastava.R, and Mock.T, , 2006 “An Information Systems Security Risk Assessment Model under the Dempster-Shafer Theory of Belief Functions,” Management Information Systems, vol. 22, no. 4,pp.109-142.
  13. Zainab Dalaf Katheeth, Prof. K.K. Raman “Performance Evaluation with Throughput and Packet Delivery Ratio for Mobile Ad-hoc Networks” International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 5, May 2014
Index Terms

Computer Science
Information Sciences

Keywords

Dempster-shafer trust attacks.