Design and Development of CTSR with Direct & Indirect Observations of MANET Applications

Prominent applications scenarios like military and commercial platforms mostly rely on wireless communications such as Wireless Sensor Networks (WSN), Mobile Ad-hoc Networks (MANET) and Vehicular Ad-hoc Networks (VANET). Based on the application scenario, the reliability of the nodes deployed has become more important for trust management evaluation. At the same time, trust management system should not be power killing, complex in terms of computation and processing capability. To convey a noticeable framework, we propose Collaborative Trust based Secure Routing protocol (CTSR) for observing direct and indirect trust values. Here we utilize two-way acknowledgement-based trust framework (2-ACKT) which requires lesser memory resources and minimizes the communication overhead. Our simulation setup for Mobile Adhoc Networks with 2-ACKT framework calculates trust value with both direct and indirect observations based on Bayesian inference and Dempster-Shafer Theory (DST) of uncertain reasoning approach respectively. Since the inception of DST for indirect observation in wireless networks trust values are effectively derived with data packets and control packets. The capability of DST to solve the problems with different reliability has flaws in certain areas where the nodes were subjected to disclose critical information like residual energy level and available bandwidth. And also common results derived from DST may lead to uncertain decisions. Considering all these factors we make few notable modifications in DST to enhance the security feature in 2-ACT.

[1]  Peter C. Mason,et al.  Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.

[2]  Kalyani Handal,et al.  Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning , 2018 .

[3]  Yuguang Fang,et al.  SPREAD: Improving network security by multipath routing in mobile ad hoc networks , 2007, Wirel. Networks.

[4]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[5]  Bu-Sung Lee,et al.  Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.

[6]  Roch H. Glitho,et al.  A Novel Overlay-Based Failure Detection Architecture for MANET Applications , 2007, 2007 15th IEEE International Conference on Networks.

[7]  Hirozumi Yamaguchi,et al.  MobiREAL simulator-evaluating MANET applications in real environments , 2005, 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[8]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Lotfi A. Zadeh,et al.  Review of A Mathematical Theory of Evidence , 1984 .

[10]  Qi Shi,et al.  Collaborative Intrusion Detection in Federated Cloud Environments , 2015 .

[11]  William Johnson,et al.  A distributed framework for detecting selfish nodes in MANET using Record- and Trust-Based Detection (RTBD) technique , 2014, EURASIP J. Wirel. Commun. Netw..

[12]  J. Martin Leo Manickam,et al.  Two-Way Acknowledgment-Based Trust Framework for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[13]  Peter Xiaoping Liu,et al.  Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.

[14]  Luiz A. DaSilva,et al.  Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks , 2010, IEEE Transactions on Computers.

[15]  R. Yager On the dempster-shafer framework and new combination rules , 1987, Inf. Sci..

[16]  F. Richard Yu,et al.  Security enhancement for mobile ad hoc networks routing with OLSRv2 , 2013, Defense, Security, and Sensing.

[17]  Ioannis Lambadaris,et al.  Trust establishment in cooperative wireless relaying networks , 2014, Wirel. Commun. Mob. Comput..

[18]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..