Filters








990 Hits in 5.2 sec

T2AR: trust-aware ad-hoc routing protocol for MANET

Gayathri Dhananjayan, Janakiraman Subbiah
2016 SpringerPlus  
Mobile ad hoc network (MANET), a dynamic configured and infrastructure less architecture that contains operating nodes responsible for data transfer.  ...  Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery.  ...  Then, the trust value of the node is updated based on energy model calculation, packet sequence ID matching rate and mobility estimation.  ... 
doi:10.1186/s40064-016-2667-6 pmid:27441127 pmcid:PMC4937011 fatcat:4cturmpodjh6ffifiidbdb63xm

A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions

Burhan Ul Islam, Rashidah Funke Olanrewaju, Farhat Anwar, Athaur Rahman Najeeb, Mashkuri Yaacob
2018 Indonesian Journal of Electrical Engineering and Computer Science  
Such topical evolutions infuse a new and rising interest in MANET research and development. This paper provides an overview of the dynamic domain of MANETs.  ...  It begins with the discussion on the evolution of MANETs followed by its significance in various fields.  ...  Mobile ad hoc network or MANET is an infrastructure-less network, where each node functions as a router allowing the network to possess a dynamic topology where individual nodes have the freedom to move  ... 
doi:10.11591/ijeecs.v12.i2.pp832-842 fatcat:jafevbiwvje2ziof5xxpcihkuq

Trusted Sensing Model for Mobile Ad HoC Network Using Differential Evolution Algorithm

P Elamparithi, Dr. K. Ruba Soundar
2020 Information Technology and Control  
To overcome the problem of black hole attack in MANETs, a trust model using Differential Evolution (DE) algorithm has been proposed.  ...  Mobile Ad Hoc Network (MANET) has set of mobile nodes that are allowed to communicate with each other through wireless links.  ...  The proposed trusted sensing model using the differential evolution algorithm helps to identify the malicious node causing the black hole attack.  ... 
doi:10.5755/j01.itc.49.4.25438 fatcat:2ymg4pcfy5cinbtuo2u7wo44sq

Trusted and Secured Clustered Protocol in MANET

Syeda Kausar, Syed Abdul, D. Srinivasa
2016 International Journal of Computer Applications  
A trusted and secured clustered protocol in MANET, where clusters are formed based on highly-trusted nodes having sufficient energy is proposed.  ...  Secured communication with public key authentication service based on trust model and network model to prevent nodes from obtaining false public keys of the others when there are malicious nodes in the  ...  Exiting models are based on one or more trust or security parameters for WSN or MANETS, while our trust metric consists of five crucial trust parameters for direct and indirect communication in pervasive  ... 
doi:10.5120/ijca2016911999 fatcat:ctfuu3yrajdyfbelnjzge773jq

Insights on Security Improvements and Implications of Artificial Intelligence in MANET

Shivashankar T.M., S.B. Shivakumar
2019 Communications on Applied Electronics  
offer a better flexibility to tailor the security scheme based on demand of the environment, where the mobile nodes are operating.  ...  For a MANET system to be integrated with upcoming technologies it is required that their routing system should offer higher level of resistance against all potential threats as well as they should also  ...  analysis emphasizes Fuzzy logic on security strength Xia et al. [51] Trust management Trust-based fuzzy rules Can be used for Accuracy on trust comprehensive attack over dynamic attacks identification  ... 
doi:10.5120/cae2019652813 fatcat:dgremnu2vbexbedbzikb2c7hju

Cooperation between Trust and Routing Mechanisms for Relay Node Selection in Hybrid MANET-DTN

Jan Papaj, Lubomir Dobos
2016 Mobile Information Systems  
Two algorithms for a relay node selection based on trust are introduced. These algorithms are activated if the connections are disrupted.  ...  The hybrid MANET-DTN is an evolution of the Mobile Ad Hoc Networks (MANET) and Delay/Disruption Tolerant Network (DTN) and it gives the possibilities of data transport between the disconnected islands  ...  Conclusion Hybrid MANET-DTN is an evolution of mobile networks that integrate MANET and DTN into one complex network.  ... 
doi:10.1155/2016/7353691 fatcat:566ohw5vvjeq5mrmq3gbin4pra

Trust And Reputation Mechanism With Path Optimization In Multipath Routing

Ramya Dorai, M. Rajaram
2015 Zenodo  
Differential Evolution (DE) is used for optimization.  ...  A Mobile Adhoc Network (MANET) is a collection of mobile nodes that communicate with each other with wireless links and without pre-existing communication infrastructure.  ...  A trust based collaborative approach to lessen blackhole nodes in AODV protocol for MANET was presented by [21] where every node monitors neighbouring nodes to calculate trust value on them dynamically  ... 
doi:10.5281/zenodo.1109131 fatcat:j25uwodfbzaebkoq23fjdl7rhm

Trust correlation of mobile agent nodes with a regular node in a Adhoc network using decision-making strategy

Chethan B. K., M. Siddappa, Jayanna H. S.
2020 International Journal of Electrical and Computer Engineering (IJECE)  
Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness.  ...  Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they  ...  [18] has adopted trust based scheme along with reputation in order to model a mobile agent focusing on social network.  ... 
doi:10.11591/ijece.v10i2.pp1561-1569 fatcat:fwz4bm2osre6rd7u5ecxv5gkwi

A Survey on Trust Management for Mobile Ad Hoc Networks

Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen
2011 IEEE Communications Surveys and Tutorials  
Finally, we discuss future research areas on trust management in MANETs based on the concept of social and cognitive networks.  ...  We provide a survey of trust management schemes developed for MANETs and discuss generally accepted classifications, potential attacks, performance metrics, and trust metrics in MANETs.  ...  Watson Research Center for their valuable comments.  ... 
doi:10.1109/surv.2011.092110.00088 fatcat:nyo4a33trjh35ajvqlwlovomt4

An associative processing module for a heterogeneous vision architecture

R. Storer, M.R. Pout, A.R. Thomson, E.L. Dagless, A.W.G. Duller, A.P. Marriott, P.J. Hicks
1992 IEEE Micro  
Finally, we discuss future research areas on trust management in MANETs based on the concept of social and cognitive networks.  ...  We provide a survey of trust management schemes developed for MANETs and discuss generally accepted classifications, potential attacks, performance metrics, and trust metrics in MANETs.  ...  Watson Research Center for their valuable comments.  ... 
doi:10.1109/40.141602 fatcat:gk6w4la6zrb4jhaqtbieoytnzi

Impact of Mobility Models on Social Structure Formation in Opportunistic Networks

Halikul Lenando, Mohamad Nazim Jambli, Kartinah Zen, Johari Abdullah
2013 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  
Based on our experimental results, the Gauss Markov model provides better social structure compared to others because it creates more opportunities for a node to interact with different nodes.  ...  The study shows that different mobility models have different impact on the social structures formation.  ...  The impact of mobility model on MANET routing protocol has been studied in [5] .  ... 
doi:10.1109/trustcom.2013.270 dblp:conf/trustcom/LenandoJZA13 fatcat:bnf6qcjpjnda5fjxoucft2ti5u

Research issues and overview of economic models in Mobile-P2P networks

Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa
2007 18th International Conference on Database and Expert Systems Applications (DEXA 2007)  
We also present our perspectives on building 'real' mobile-P2P applications using economic models.  ...  Existing mobile-P2P solutions largely do not consider economic incentive models for enticing peer participation without eliminating free-riders and for effectively handling mobile resource constraints  ...  The work in [16] proposes a system model for service allocation in MANETs. It uses a distributed algorithmic mechanism design and a Vickrey auction mechanism for service allocation in MANETs.  ... 
doi:10.1109/dexa.2007.128 dblp:conf/dexaw/MondalMK07 fatcat:hflfatw74bazbi2ookatmi65de

Research issues and overview of economic models in Mobile-P2P networks

Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa
2007 Database and Expert Systems Applications  
We also present our perspectives on building 'real' mobile-P2P applications using economic models.  ...  Existing mobile-P2P solutions largely do not consider economic incentive models for enticing peer participation without eliminating free-riders and for effectively handling mobile resource constraints  ...  The work in [16] proposes a system model for service allocation in MANETs. It uses a distributed algorithmic mechanism design and a Vickrey auction mechanism for service allocation in MANETs.  ... 
doi:10.1109/dexa.2007.4313006 fatcat:v2zt44q6wjgzhlppekdp23zgi4

Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach

Wenjia Li, Anupam Joshi, Tim Finin
2010 2010 Eleventh International Conference on Mobile Data Management  
Most of existing schemes model a node's trustworthiness along a single dimension, combining all of the available evidence to calculate a single, scalar trust metric.  ...  Nodes in Mobile Ad hoc Networks (MANETs) are required to relay data packets to enable communication between other nodes that are not in radio range with each other.  ...  Therefore, security is one of the most important challenges for MANET. Node misbehavior is such a category of security threat for Mobile Ad hoc Networks (MANETs).  ... 
doi:10.1109/mdm.2010.57 dblp:conf/mdm/LiJF10 fatcat:txxo7xjapzdl7jfnatgmnyclni

A game theoretic trust model for on-line distributed evolution of cooperation inMANETs

Marcela Mejia, Néstor Peña, Jose L. Muñoz, Oscar Esparza, Marco A. Alzate
2011 Journal of Network and Computer Applications  
Thus, a cooperation enforcement mechanism is necessary. Trust models have been proposed as mechanisms to incentive cooperation in MANETs and some of them are based on game theory concepts.  ...  In this article, we propose a trust model based on a non-cooperative game that uses a bacterial-like algorithm to let the nodes quickly learn the appropriate cooperation behavior.  ...  On the other hand, models in which trust is the base for cooperation are envisioned as the most promising solutions for MANETs because these models do not have the restrictions of credit-based models.  ... 
doi:10.1016/j.jnca.2010.09.007 fatcat:h27b6uv64naf5ip57z6lqltjni
« Previous Showing results 1 — 15 out of 990 results