Identifying Malicious Node Using Trust Value in Cluster Based MANET (IMTVCM)

被引:0
|
作者
Annadurai, P. [1 ]
Vijayalaksmi, S. [2 ]
机构
[1] Arignar Anna Govt Arts & Sci Coll, Dept Comp Sci, Karaikal, Puducherry Stat, India
[2] Hindustan Univ, Dept Comp Applicat, Madras, Tamil Nadu, India
关键词
clustering; trust; authentication; services; malicious node; MANET;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc network is an autonomous collection of mobile nodes communicating over wireless links where the node scan communicate with each other in temporary manner with no centralized administration and in a dynamic topology that changes frequently. A malicious node can constantly report incorrect information to other nodes in the network, which can lead to whole network down. The proposed work identifying malicious node using trust value in cluster based MANET is used to detect the malicious node in cluster. The cluster formation process is realized by grouping nearby nodes to form a cluster. To every cluster, cluster head is assigned based on the energy of the nodes. The trust value calculation is used to find the behavior of the node. It is calculated by Cluster Member (CM), direct and indirect trust value. The trust value of the cluster member is maintained in the counter table. During the data transmission time, the Cluster Head (CH) monitors its cluster member behavior. When any misbehavior is monitored by cluster head means, it sends the request about that misbehaving node to its nearby node (NN) to get the direct trust value (DTV).And also CH sends the request to other cluster members about that misbehaving node. If that cluster members are having value about that misbehaving node means, it sends the indirect trust value to the CH. Otherwise cluster members ignores the request send by CH. The goal of the proposed work is identify the malicious nodes in the cluster using the trust values in effective manner. Simulation result in NS-2 accurately predicts the performance of proposed scheme in terms of cluster energy level analysis, routing performance, system performance under varying network conditions.
引用
收藏
页码:1150 / 1158
页数:9
相关论文
共 50 条
  • [1] Trust Based Malicious Nodes Detection in MANET
    Gong, Wei
    You, Zhiyang
    Chen, Danning
    Zhao, Xibin
    Gu, Ming
    Lam, Kwok-Yan
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 205 - +
  • [2] Trust Based Certificate Revocation of Malicious Nodes in MANET
    Lekha, S. J. Indhu
    Kathiroli, R.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1185 - 1189
  • [3] Exploring Machine Learning Algorithms for Malicious Node Detection Using Cluster-Based Trust Entropy
    Kanthimatih, S.
    IEEE ACCESS, 2024, 12 : 137913 - 137925
  • [4] Trust Value Updation Algorithm for Multicast Routing Algorithm for Cluster Based MANET
    Kulkarni, Sapna B.
    Yuvaraju, B. N.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1246 - 1249
  • [5] Trust Based Certificate Authority for Detection of Malicious Nodes in MANET
    Manoj, V.
    Raghavendiran, N.
    Aaqib, M.
    Vijayan, R.
    GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 392 - 401
  • [6] Malicious node identification using quantitative intrusion detection techniques in MANET
    M. Arul Selvan
    S. Selvakumar
    Cluster Computing, 2019, 22 : 7069 - 7077
  • [7] Malicious node identification using quantitative intrusion detection techniques in MANET
    Selvan, M. Arul
    Selvakumar, S.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7069 - S7077
  • [8] An Efficient Trust-Based Routing Scheme Against Malicious Communication in MANET
    Ankita A. Mahamune
    M. M. Chandane
    International Journal of Wireless Information Networks, 2021, 28 : 344 - 361
  • [9] An Efficient Trust-Based Routing Scheme Against Malicious Communication in MANET
    Mahamune, Ankita A.
    Chandane, M. M.
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2021, 28 (03) : 344 - 361
  • [10] Improving Trusted Routing by Identifying Malicious Nodes in a MANET Using Reinforcement Learning
    Mayadunna, Hansi
    De Silva, Shanen Leen
    Wedage, Iesha
    Pabasara, Sasanka
    Rupasinghe, Lakmal
    Liyanapathirana, Chethena
    Kesavan, Krishnadeva
    Nawarathna, Chamira
    Sampath, Kalpa Kalhara
    2017 17TH INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER) - 2017, 2017, : 263 - 270