Unified trust management scheme that enhances the security in MANET using uncertain reasoning

The characteristic options of mobile circumstantial networks (MANETs), as well as dynamic topology and open wireless intermediate, could lead MANETs full of several security vulnerabilities. OLSRv2 scheme that uses the shortest path based on hop count. Although OLSRv2 provides extensions for customization there is no specific security mechanism in the protocol. Most of existing approaches do not exploit direct and indirect observation at the same time to evaluate the trust of an observed node. The existing scheme has a very low throughput even if the number of malicious nodes is very small. In the proposed trust management scheme, the trust model has two techniques are trust from direct observation and trust from indirect observation. In direct observation, the trust value of observer node can be derived using Bayesian inference theory. Similarly the dempster-shafer functioned for neighbor node. Intensive simulation results show the effectiveness of the projected theme. Specifically, we can achieve a throughput in a rate of 6kbps for indirect, 5.8kbps for direct observation and packet delivery quantitative relation will be improved with slightly increased average finish to finish delay and overhead of messages.

[1]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[2]  Irene Macaluso,et al.  Cognitive Radio Mobile Ad Hoc Networks , 2010 .

[3]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[4]  Peter Xiaoping Liu,et al.  Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks , 2010, IEEE Transactions on Vehicular Technology.

[5]  Yuguang Fang,et al.  SPREAD: Improving network security by multipath routing in mobile ad hoc networks , 2007, Wirel. Networks.

[6]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[7]  Victor C. M. Leung,et al.  Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.

[8]  Yuguang Fang,et al.  AOS: an anonymous overlay system for mobile ad hoc networks , 2011, Wirel. Networks.

[9]  Glenn Shafer,et al.  Readings in Uncertain Reasoning , 1990 .

[10]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[11]  Jie Yang,et al.  Sensor Fusion Using Dempster-Shafer Theory , 2002 .

[12]  Peter Xiaoping Liu,et al.  Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.

[13]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[14]  F. Richard Yu,et al.  Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks , 2013, EURASIP J. Wirel. Commun. Netw..