Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2185216.2185337acmconferencesArticle/Chapter ViewAbstractPublication PagesacwrConference Proceedingsconference-collections
poster

An approach for detection of malicious node using fuzzy based trust levels in MANET

Published: 18 December 2011 Publication History

Abstract

Wireless Communication is vital during natural calamities, disasters and military operation. In the past few decades, security in the military operations is exposed to vulnerabilities like sniffing the information and modifying the data causing havoc in military camps. Consequently military applications required a secure way to exchange the data and stay away from enemy intrusion. Recent trends in military operations need a portable way of communicating between the units, quality of service and security to be full-fledged. However, in MANET mobile entities are prone to various security attacks due to dynamic changing topology, open medium and inhibited by limited energy, bandwidth and computational power. The paper addresses the security issues by incorporating the concept of Trust and Certification Authority to combat the misbehaving entities. Certificate Authority employs Fuzzy based analyzer to distinguish between trusted and malicious behavior of nodes by distributing the certificates only to the trusted nodes and detecting the misbehaving node. The proposed scheme is more secure, reliable and aids to improve the security in military operations.

References

[1]
Angelo Rossi and Samuel Pierre. 2009. Collusion-resistant reputation-based intrusion detection system for MANETs, IJCSNS International Journal of Computer Science and Network Security, VOL. 9 No.11, Nov 2009.
[2]
V. R. Ghorpade. 2008. Fuzzy Logic based Trust Management Framework for MANET, DSP Journal, Volume 8, Issue 1, Dec, 2008.
[3]
Mareeswari V, Ramakrishna K and Vijayan R. 2011. Energy based Trust solution for Detecting Selfish Nodes in MANET using Fuzzy logic, International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 3, Jun 2011.
[4]
Ahmad Ridha, Ali Rizvi, Farag Azzedin. 2007. Fuzzy Trust for Peer-to-Peer Based Systems, World Academy of Science, Engineering and Technology 2007
[5]
Floriano De Rango, Improving SAODV Protocol with Trust levels management, IDM and Incentive Cooperation in MANET.
[6]
Vijayan. R, Sumitkumar Singh, 2011. A Novel Approach for Providing Security in Vehicular Adhoc Network Through Vehicles Present in the Network, International Journal of Advanced Research in Computer Science. Volume 2, no. 1, Jan-Feb 2011
[7]
A. Rajaram and Dr. S. Palaniswami, 2010. A High Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 5, Jul 2010.
[8]
Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha, 2006. A Study of the Energy Consumption Characteristics of Cryptographic Algorithmsand Security Protocols, Ieee Transactions On Mobile Computing, VOL. 5, NO. 2, Feb 2006.
[9]
G.S. Mamatha and Dr. S. C. Sharma, 2010. A Highly Secured Approach against Attacks in MANETS, International Journal of Computer Theory and Engineering, Vol. 2, No. 5, Oct 2010
[10]
M Rajesh Babu, Selvan S. 2010. A Lightweight and Attack Resisitant Authenticated Routing Protocol For Mobile Adhoc Networks, International Journal of Wireless & Mobile Networks (IJWMN), Vol.2, No.2, May 2010.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ACWR '11: Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
December 2011
517 pages
ISBN:9781450310116
DOI:10.1145/2185216

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 December 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. MANET
  2. fuzzy logic
  3. malicious node detection
  4. security
  5. security in MANETs
  6. security in military application
  7. trust

Qualifiers

  • Poster

Conference

ACWR '11

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 270
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media