Skip to main content

2020 | OriginalPaper | Buchkapitel

An Efficient Trust and Energy Aware Protocol Using TAODV-ACO in MANETs

verfasst von : Ambidi Naveena, Katta Rama Linga Reddy

Erschienen in: Intelligent Communication Technologies and Virtual Mobile Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile Ad-Hoc Network (MANET) is a relationship of the mobile nodes with constrained transmission range and asset with no fixed infrastructure. But, malicious attack of node reduce the trust-level nodes that lead to insecure in delivering data. The increments in attacks cause extreme energy consumption that tends to a decrease in network-lifetime. The security and routing issues are concentrated by introducing trust aware ad-hoc protocols. In this research proposal, Trust-Aware ad-hoc Routing (T2AR) with Ant Colony Optimization (ACO) is used for maximizing the trust level based on trust-rate, energy, mobility based malicious behavior prediction. Ad-hoc On-Demand Distance Vector (AODV) uses two processes to find and maintain routes: the route detection process and the route maintenance. Hence, the T2AR-AODV-ACO methodology precisely transmits data from source to destination (S-D) by executing better throughput, routing overhead, end-to-end delay and energy consumption in trust aware ad-hoc routing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, R., Guo, J., Bao, F., Cho, J.H.: Trust management in mobile ad hoc networks for bias minimization and application performance maximization. Ad Hoc Netw. 19, 59–74 (2014)CrossRef Chen, R., Guo, J., Bao, F., Cho, J.H.: Trust management in mobile ad hoc networks for bias minimization and application performance maximization. Ad Hoc Netw. 19, 59–74 (2014)CrossRef
2.
Zurück zum Zitat Chen, R., Guo, J., Bao, F., Cho, J.H.: Integrated social and quality of service trust management of mobile groups in ad hoc networks. In: Proceedings of IEEE 9th International Conference on Information, Communications & Signal Processing, pp. 1–5 (2013) Chen, R., Guo, J., Bao, F., Cho, J.H.: Integrated social and quality of service trust management of mobile groups in ad hoc networks. In: Proceedings of IEEE 9th International Conference on Information, Communications & Signal Processing, pp. 1–5 (2013)
3.
Zurück zum Zitat Mitchell, R., Chen, I.R.: Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Trans. Reliab. 62, 199–210 (2013)CrossRef Mitchell, R., Chen, I.R.: Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Trans. Reliab. 62, 199–210 (2013)CrossRef
4.
Zurück zum Zitat Jawhar, I., Trabelsi, Z., Al-Jaroodi, J.: Towards more reliable and secure source routing in mobile ad hoc and sensor networks. Telecommun. Syst. 55, 81–91 (2014)CrossRef Jawhar, I., Trabelsi, Z., Al-Jaroodi, J.: Towards more reliable and secure source routing in mobile ad hoc and sensor networks. Telecommun. Syst. 55, 81–91 (2014)CrossRef
5.
Zurück zum Zitat Wen, D., Huai-Min, W., Yan, J., Peng, Z.O.U.: A recommendation-based peer-to-peer trust model. J. Softw. 15, 571–583 (2004)MathSciNetMATH Wen, D., Huai-Min, W., Yan, J., Peng, Z.O.U.: A recommendation-based peer-to-peer trust model. J. Softw. 15, 571–583 (2004)MathSciNetMATH
6.
Zurück zum Zitat Jan, M., Nanda, P., Usman, M., He, X.: PAWN: a payload-based mutual authentication scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29, e3986 (2017)CrossRef Jan, M., Nanda, P., Usman, M., He, X.: PAWN: a payload-based mutual authentication scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29, e3986 (2017)CrossRef
7.
Zurück zum Zitat Jan, M.A., Nanda, P., He, X., Liu, R.P.: A Sybil attack detection scheme for a forest wildfire monitoring application. Future Gener. Comput. Syst. 80, 613–626 (2018)CrossRef Jan, M.A., Nanda, P., He, X., Liu, R.P.: A Sybil attack detection scheme for a forest wildfire monitoring application. Future Gener. Comput. Syst. 80, 613–626 (2018)CrossRef
8.
Zurück zum Zitat Dong, M., Ota, K., Yang, L.T., Chang, S., Zhu, H., Zhou, Z.: Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks. Comput. Netw. 74, 58–70 (2014)CrossRef Dong, M., Ota, K., Yang, L.T., Chang, S., Zhu, H., Zhou, Z.: Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks. Comput. Netw. 74, 58–70 (2014)CrossRef
9.
Zurück zum Zitat Paul, B., Marcombes, S., David, A., Struijk, L.N.A., Le Moullec, Y.: A context-aware user interface for wireless personal-area network assistive environments. Wireless Pers. Commun. 69, 427–447 (2013)CrossRef Paul, B., Marcombes, S., David, A., Struijk, L.N.A., Le Moullec, Y.: A context-aware user interface for wireless personal-area network assistive environments. Wireless Pers. Commun. 69, 427–447 (2013)CrossRef
10.
Zurück zum Zitat Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35, 867–880 (2012)CrossRef Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35, 867–880 (2012)CrossRef
11.
Zurück zum Zitat Yan, Z., Wang, M.: Protect pervasive social networking based on two-dimensional trust levels. IEEE Syst. J. 11, 207–218 (2017)CrossRef Yan, Z., Wang, M.: Protect pervasive social networking based on two-dimensional trust levels. IEEE Syst. J. 11, 207–218 (2017)CrossRef
12.
Zurück zum Zitat Saha, H.N., Mitra, P.: Intelligent energy aware fidelity based on-demand secure RP for MANET. Int. J. Comput. Netw. Inf. Secur. 10, 48–64 (2018) Saha, H.N., Mitra, P.: Intelligent energy aware fidelity based on-demand secure RP for MANET. Int. J. Comput. Netw. Inf. Secur. 10, 48–64 (2018)
13.
Zurück zum Zitat Bijon, K.Z., Haque, M.M., Hasan, R.: A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty. In: Proceedings of IEEE Twelfth Annual International Conference on Privacy, Security and Trust (PST), pp. 347–354 (2014) Bijon, K.Z., Haque, M.M., Hasan, R.: A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty. In: Proceedings of IEEE Twelfth Annual International Conference on Privacy, Security and Trust (PST), pp. 347–354 (2014)
14.
Zurück zum Zitat Shabut, A.M., Kaiser, M.S., Dahal, K.P., Chen, W.: A multidimensional trust evaluation model for MANETs. J. Netw. Comput. Appl. 123, 32–41 (2018)CrossRef Shabut, A.M., Kaiser, M.S., Dahal, K.P., Chen, W.: A multidimensional trust evaluation model for MANETs. J. Netw. Comput. Appl. 123, 32–41 (2018)CrossRef
15.
Zurück zum Zitat Patel, N.J.K., Tripathi, K.: Trust value based algorithm to identify and defense gray-hole and black-hole attack present in MANET using clustering method. Int. J. Sci. Res. Sci. Eng. Technol. 4, 281–287 (2018) Patel, N.J.K., Tripathi, K.: Trust value based algorithm to identify and defense gray-hole and black-hole attack present in MANET using clustering method. Int. J. Sci. Res. Sci. Eng. Technol. 4, 281–287 (2018)
16.
Zurück zum Zitat Sivakumara, D., Jeganb, J., Selvakumarc, K.: Cuckoo search based Reliable Energy and Trust aware Routing Protocol (CRETRP) for wireless sensor network. Int. J. Control Theory Appl. 10, 121–134 (2017) Sivakumara, D., Jeganb, J., Selvakumarc, K.: Cuckoo search based Reliable Energy and Trust aware Routing Protocol (CRETRP) for wireless sensor network. Int. J. Control Theory Appl. 10, 121–134 (2017)
17.
Zurück zum Zitat Patel, V.H., Zaveri, M.A., Rath, H.K.: Trust based routing in mobile ad-hoc networks. Lect. Notes Softw. Eng. 3(4), 318 (2015)CrossRef Patel, V.H., Zaveri, M.A., Rath, H.K.: Trust based routing in mobile ad-hoc networks. Lect. Notes Softw. Eng. 3(4), 318 (2015)CrossRef
Metadaten
Titel
An Efficient Trust and Energy Aware Protocol Using TAODV-ACO in MANETs
verfasst von
Ambidi Naveena
Katta Rama Linga Reddy
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_60