DocumentCode :
2822140
Title :
Unified trust management scheme that enhances the security in MANET using uncertain reasoning
Author :
Sasirehka, S. ; Vijayakumar, S. ; Abinaya, K.
fYear :
2015
fDate :
26-27 Feb. 2015
Firstpage :
1589
Lastpage :
1595
Abstract :
The characteristic options of mobile circumstantial networks (MANETs), as well as dynamic topology and open wireless intermediate, could lead MANETs full of several security vulnerabilities. OLSRv2 scheme that uses the shortest path based on hop count. Although OLSRv2 provides extensions for customization there is no specific security mechanism in the protocol. Most of existing approaches do not exploit direct and indirect observation at the same time to evaluate the trust of an observed node. The existing scheme has a very low throughput even if the number of malicious nodes is very small. In the proposed trust management scheme, the trust model has two techniques are trust from direct observation and trust from indirect observation. In direct observation, the trust value of observer node can be derived using Bayesian inference theory. Similarly the dempster-shafer functioned for neighbor node. Intensive simulation results show the effectiveness of the projected theme. Specifically, we can achieve a throughput in a rate of 6kbps for indirect, 5.8kbps for direct observation and packet delivery quantitative relation will be improved with slightly increased average finish to finish delay and overhead of messages.
Keywords :
graph theory; inference mechanisms; mobile ad hoc networks; telecommunication network topology; telecommunication security; Bayesian inference theory; Dempster-Shafer; MANET; OLSRv2 scheme; direct observation; dynamic topology; hop count; indirect observation; malicious nodes; mobile circumstantial networks; neighbor node; observer node; open wireless intermediate; packet delivery quantitative relation; security enhancement; security vulnerabilities; shortest path; trust model; uncertain reasonings; unified trust management scheme; Cognition; Mobile ad hoc networks; Mobile computing; Observers; Peer-to-peer computing; Security; Bayesian; Manet; dempster shafer theory; security; trust management; uncertain reasoning;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronics and Communication Systems (ICECS), 2015 2nd International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4799-7224-1
Type :
conf
DOI :
10.1109/ECS.2015.7124855
Filename :
7124855
Link To Document :
بازگشت