Skip to main content
Top

2020 | OriginalPaper | Chapter

Energy Conscious Packet Transmission in Wireless Networks Using Trust Based Mechanism: A Cognitive Approach

Authors : Anshu Bhasin, Sandeep Singh, Anshul Kalia

Published in: Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The self-motivated nature of wireless ad-hoc networks deters the possibility of a centralized solution. Also, no specific node can act as a centralized point due to energy and processing constraints. Constraint of non-centralization demands efficient and effective transmission of data between nodes by sharing information whenever needed without any disruption. This co-operation is a prodigious challenge due to the presence of covetous and malicious nodes in the network. Hence, an asserted need of some lightweight trust based mechanism in differentiating among reliable and unreliable nodes arises. This mechanism enhances security and improve co-operation in nodes. Energy efficiency remains central to the above segregation. Many trust-based methods are proposed which use packet delivered ratio as the major parameter for direct trust calculation. This work presents investigation of other related parameters like routing overhead, energy level etc. which can increase the effectiveness of trust based mechanisms for early detection of malicious nodes along with packet delivered ratio. Furthermore, an ameliorated energy optimization model is proposed for wireless network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Merlin, R.T., Ravi, R.: Novel trust based energy aware routing mechanism for mitigation of black hole attacks in MANET. Wirel. Pers. Commun. 104, 1599–1636 (2019)CrossRef Merlin, R.T., Ravi, R.: Novel trust based energy aware routing mechanism for mitigation of black hole attacks in MANET. Wirel. Pers. Commun. 104, 1599–1636 (2019)CrossRef
2.
go back to reference Mayti, M., Khatoun, R., Begriche, Y., Khoukhi, L., Gaiti, D.: A stochastic approach for packet dropping attacks detection in mobile ad hoc networks. Comput. Netw. 121, 53–64 (2017)CrossRef Mayti, M., Khatoun, R., Begriche, Y., Khoukhi, L., Gaiti, D.: A stochastic approach for packet dropping attacks detection in mobile ad hoc networks. Comput. Netw. 121, 53–64 (2017)CrossRef
4.
go back to reference Khan, F.A., Imran, M., Abbas, H., Durad, M.H.: A detection and prevention system against collaborative attacks in mobile ad hoc networks. Future Gener. Comput. Syst. 68, 416–427 (2017)CrossRef Khan, F.A., Imran, M., Abbas, H., Durad, M.H.: A detection and prevention system against collaborative attacks in mobile ad hoc networks. Future Gener. Comput. Syst. 68, 416–427 (2017)CrossRef
5.
go back to reference Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, P.: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63, 4647–4658 (2014)CrossRef Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, P.: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63, 4647–4658 (2014)CrossRef
6.
go back to reference Dorri, A., Vaseghi, S., Gharib, O.: DEBH: detecting and eliminating black holes in mobile ad-hoc network. Wirel. Netw. 24, 2943–2955 (2017)CrossRef Dorri, A., Vaseghi, S., Gharib, O.: DEBH: detecting and eliminating black holes in mobile ad-hoc network. Wirel. Netw. 24, 2943–2955 (2017)CrossRef
7.
go back to reference Badiwal, S., Kulshrestha, A., Garg, N.: Analysis of black hole attack in MANET using AODV routing protocol. Int. J. Comput. Appl. 168(8), 27–33 (2017) Badiwal, S., Kulshrestha, A., Garg, N.: Analysis of black hole attack in MANET using AODV routing protocol. Int. J. Comput. Appl. 168(8), 27–33 (2017)
8.
go back to reference Paliwal, G., Taterh, S.: Impact of dense network in MANET routing protocols AODV and DSDV comparative analysis through NS3. Springer, Heidelberg (2018). Chap. 30 Paliwal, G., Taterh, S.: Impact of dense network in MANET routing protocols AODV and DSDV comparative analysis through NS3. Springer, Heidelberg (2018). Chap. 30
9.
go back to reference Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.: Trust based on-demand multipath routing in mobile ad hoc networks. IET Inf. Secur. 4, 212–232 (2010)CrossRef Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.: Trust based on-demand multipath routing in mobile ad hoc networks. IET Inf. Secur. 4, 212–232 (2010)CrossRef
10.
go back to reference Tseng, F.H., Chiang, H.P., Chao, H.C.: Black hole along with other attacks in MANET: a survey. J. Inf. Process Syst. 14, 56–78 (2018) Tseng, F.H., Chiang, H.P., Chao, H.C.: Black hole along with other attacks in MANET: a survey. J. Inf. Process Syst. 14, 56–78 (2018)
11.
go back to reference Yaseen, Q.M., Aldwairi, M.: An enhanced AODV protocol for avoiding black holes in MANET. Procedia Comput. Sci. 134, 371–376 (2018)CrossRef Yaseen, Q.M., Aldwairi, M.: An enhanced AODV protocol for avoiding black holes in MANET. Procedia Comput. Sci. 134, 371–376 (2018)CrossRef
12.
go back to reference Babu, M.R., Usha, G.: A novel honeypot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in MANET. Wirel. Pers. Commun. 90, 831–845 (2016)CrossRef Babu, M.R., Usha, G.: A novel honeypot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in MANET. Wirel. Pers. Commun. 90, 831–845 (2016)CrossRef
13.
go back to reference Nadeem, A., Howarth, M.P.: A survey of manet intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tutor. 15(4), 2027–2045 (2013)CrossRef Nadeem, A., Howarth, M.P.: A survey of manet intrusion detection & prevention approaches for network layer attacks. IEEE Commun. Surv. Tutor. 15(4), 2027–2045 (2013)CrossRef
14.
go back to reference Sood, M., Rani, P.: Removal of black hole attack using AODV protocol in MANET. Int. J. Eng. Manag. Res. (IJEMR) 7(3), 72–75 (2017) Sood, M., Rani, P.: Removal of black hole attack using AODV protocol in MANET. Int. J. Eng. Manag. Res. (IJEMR) 7(3), 72–75 (2017)
15.
go back to reference Khanna, N.: Mitigation of collaborative black hole attack using TRACEROUTE mechanism with enhancement in AODV routing protocol. IJFGCN 9(1), 157–166 (2016)MathSciNetCrossRef Khanna, N.: Mitigation of collaborative black hole attack using TRACEROUTE mechanism with enhancement in AODV routing protocol. IJFGCN 9(1), 157–166 (2016)MathSciNetCrossRef
16.
go back to reference Kaur, P., Kaur, D., Mahajan, R.: Simulation based comparative study of routing protocols under wormhole attack in MANET. Wirel. Pers. Commun. 96(1), 47–63 (2017)CrossRef Kaur, P., Kaur, D., Mahajan, R.: Simulation based comparative study of routing protocols under wormhole attack in MANET. Wirel. Pers. Commun. 96(1), 47–63 (2017)CrossRef
17.
go back to reference Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y.(eds.): Futuristic trends in network and communication technologies, FTNCT 2018. Communications in Computer and Information Science, vol. 958. Springer, Singapore (2018) Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y.(eds.): Futuristic trends in network and communication technologies, FTNCT 2018. Communications in Computer and Information Science, vol. 958. Springer, Singapore (2018)
18.
go back to reference Chander, D., Kumar, R.: Performance analysis of CBR and VBR applications on different multicast routing protocols over MANET. In: FTNCT 2018. Communications in Computer and Information Science, vol. 958, pp. 396–411. Springer, Singapore (2019) Chander, D., Kumar, R.: Performance analysis of CBR and VBR applications on different multicast routing protocols over MANET. In: FTNCT 2018. Communications in Computer and Information Science, vol. 958, pp. 396–411. Springer, Singapore (2019)
30.
go back to reference Shaikh, R.A., Jameel, H., d’Auriol, B.J., Lee, H., Lee, S., Song, Y.-J.: Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20, 1698–1712 (2009)CrossRef Shaikh, R.A., Jameel, H., d’Auriol, B.J., Lee, H., Lee, S., Song, Y.-J.: Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20, 1698–1712 (2009)CrossRef
31.
go back to reference Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42, 120–134 (2014)CrossRef Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42, 120–134 (2014)CrossRef
Metadata
Title
Energy Conscious Packet Transmission in Wireless Networks Using Trust Based Mechanism: A Cognitive Approach
Authors
Anshu Bhasin
Sandeep Singh
Anshul Kalia
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-40305-8_11