CFP last date
01 April 2024
Reseach Article

Attack Resistance Dynamic Detection and Data Trust Routing in MANET

by Syeda Kausar Fatima, Syed Abdul Sattar, D. Srinivasa Rao
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 3
Year of Publication: 2017
Authors: Syeda Kausar Fatima, Syed Abdul Sattar, D. Srinivasa Rao
10.5120/cae2017652618

Syeda Kausar Fatima, Syed Abdul Sattar, D. Srinivasa Rao . Attack Resistance Dynamic Detection and Data Trust Routing in MANET. Communications on Applied Electronics. 7, 3 ( Jun 2017), 19-25. DOI=10.5120/cae2017652618

@article{ 10.5120/cae2017652618,
author = { Syeda Kausar Fatima, Syed Abdul Sattar, D. Srinivasa Rao },
title = { Attack Resistance Dynamic Detection and Data Trust Routing in MANET },
journal = { Communications on Applied Electronics },
issue_date = { Jun 2017 },
volume = { 7 },
number = { 3 },
month = { Jun },
year = { 2017 },
issn = { 2394-4714 },
pages = { 19-25 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume7/number3/743-2017652618/ },
doi = { 10.5120/cae2017652618 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T20:01:22.995479+05:30
%A Syeda Kausar Fatima
%A Syed Abdul Sattar
%A D. Srinivasa Rao
%T Attack Resistance Dynamic Detection and Data Trust Routing in MANET
%J Communications on Applied Electronics
%@ 2394-4714
%V 7
%N 3
%P 19-25
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Organizing trust in Ad Hoc network is a challenging task when environment cooperation is critical to achieving system goals such as reliability and scalability. Ad Hoc networks are easily accessible due to its dynamic nature. The main issue is to assure secure network services. In order to achieve this, a secure organizing trust aware routing is always research challenge in Mobile Adhoc Networks. This paper organizes the trust level to improve trust organization system in MANET by achieving attack resistance. To achieve attack resistance level, we contribute our research by understanding trust factors in MANET. This paper has been prepared keeping in mind that it needs to prove itself to be a valued resource dealing with both the important core and the focused security issues in this area.

References
  1. Heenavarshney and Pradeep Kumar, “Secure Communication Architecture Based On “BBCMS” Clustering Algorithm for Mobile Adhoc Network (MANET)”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-3, Issue-2, July 2013.
  2. Sandeep Kr. Agarwal, Amit Garg and K. V. Arya, “Security Issues & Clustering Based Solutions in Mobile Ad-hoc Networks - A Survey”, Journal of International Academy of Physical Sciences, Vol. 16 No.3 (2012).
  3. Jin-Hee Cho, Ananthram Swami and Ing-Ray Chen. “A Survey on Trust Management for MobileAd Hoc Networks”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 2016.
  4. ErmanAyday and FaramarzFekri. “An Iterative Algorithm for Trust Management and Adversary Detection for Delay Tolerant Networks”, Georgia Institute of Technology, Atlanta, GA, 30332.
  5. Hui Xia1, Zhiping Jia1, Lei Ju1, Xin Li1, Youqin Zhu2. “A Subjective Trust Management Model with Multiple Decision Factors for MANET based on AHP and Fuzzy Logic Rules”, IEEE/ACM International Conference on Green Computing and Communications, 2011.
  6. SînzianaMazilu*, MihaelaTeler*, CiprianDobre. “Securing Vehicular Networks based on Data-Trust Computation”, Communications, 31(18), pp. 4343-4351, 2008.
  7. Poonam Gera, KumkumGarg, and Manoj Misra. “Trust-based Multi-Path Routing for Enhancing Data Security in MANETs”, International Journal of Network Security, Vol.16, No.2, PP.102-111, Mar. 2014.
  8. Kannan Govindan and PrasantMohapatra. “Trust Computations and Trust Dynamics inMobile Adhoc Networks: A Survey”, IEEE, 14(2), 279-298.
  9. Wenjia Li, Anupam Joshi and Tim Finin. “ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine”, Baltimore, MD 21250.
  10. Jin-Hee Cho, Kevin S. Chan and Ing-Ray Chen. “Composite Trust-based Public Key Management in Mobile Ad Hoc Networks”,IEEE 2014.
  11. MoazamBidaki and Mohammad Masdari. “Reputation-Based Clustering Algorithms in Mobile Ad Hoc Networks”, International Journal of Advanced Science and Technology Vol. 54, May, 2013
  12. RaihanaFerdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, “Trust-based Cluster head Selection Algorithm for Mobile Ad hoc Networks”, I Proceedings of IEEE INFOCOM, vol 4, Mar 2014, pp 2393-2403.
  13. J. Li, R. Li and J. Kato, Future Trust Management Framework for Mobile Ad Hoc Networks: Security in Mobile Ad Hoc Networks, IEEE Communications Magazine, vol. 46, no. 4, Apr. 2008, pp. 108-114.
  14. Yuxin Liu, Mianxiong Dong, Member, IEEE, Kaoru Ota, Member, IEEE, Anfeng Liu, “Secure and Trustable Routing in Wireless Sensor Networks”, IEEE Transactions 1556-6013 (c) 2016, pp. 1-14.
  15. Syeda Kausar Fatima, Dr.Syed Abdul Sattar, Dr. D. Srinivasa Rao and Syeda Gauhar Fatima “ Trust Enhanced Dynamic Routing for MANET”, International Journal of Advanced Research in Engineering and Technology Volume 8, Issue 3, May - June 2017, pp. 25–36.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Security Trust Management in MANET