A Trust And Energy-Based Efficient Routing Scheme Using Kuder-Richardson Reliability Coefficient For Manets
[Full Text]
AUTHOR(S)
V.Vijayagopal, Dr. K.Prabu
KEYWORDS
KRRFMM, CARFMM, CONTIDANT, RTBD, PCMA.
ABSTRACT
The dissemination of data between the source and destination highly relies on the trustworthy intermediate nodes. But, the presence of root node attackers degrades the network performance and increases the network overhead. Hence, the need arises for innovating trust based reputation mechanisms that could be incorporated in different routing protocols and which could effectively and efficiently mitigate black hole attacks. In this paper, Kuder-Richardson Reliability Factor based Mitigation Mechanism (KRRFMM) are proposed for mitigating rendezvous point misbehavior of core group leader. This proposed KRRFMM algorithm is identified to be excellent compared to existing CARFMM, CONFIDANT, RTBD and PCMA schemes
REFERENCES
[1] Bose, S., Bharathimurugan, S. and A. Kannan, Multi-layer integrated anomalyintrusion detection system for mobile adhoc networks. Proceeding of theInternational Conference on Signal Processing, Communications and Networking, pp: 360-365, 2007.
[2] Paramasiva, B. and K.M. Pitchai, Modeling intrusion detection in mobile adhoc networks as a non cooperative game. Proceeding of the InternationalConference on Pattern Recognition, Informatics and Mobile Engineering(PRIME), pp: 300-306, 2013.
[3] Marchang, N. and R. Tripathi, A game theoretical approach for efficientdeployment of intrusion detection system in mobile ad hoc networks.Proceedings of the International Conference on Advanced Computing andCommunications. Assam, pp. 460-464, , 2007.
[4] T. Anantvalee and J. Wu,. A Survey on Intrusion Detection in Mobile Ad HocNetworks, Wireless Network Security, Xiao, Y., X. Shen and D.Z. Du (Eds.) Springer, New York, pp. 159-180, 2007.
[5] Y. Hu, A. Perrig and D.B. Johnson, SEAD: Secure Efficient Distance VectorRouting for Mobile Ad Hoc Networks. Proceedings of the 4th IEEE Workshopon Mobile Com-puting Systems and Applications (WMCSA 2002),IEEE,Calicoon, NY. June 2002.
[6] Y. Hu, A. Perrig and D.B. Johnson, Ariadne: A Secure On-Demand RoutingProtocol for Ad Hoc Networks. Proceedings of the Eighth Annual InternationalConference on Mobile Computing and Networking (Mobicom 2002), pp. 12-23,ACM, Atlanta, GA, September 2002.
[7] Razak, S. A., Furnell, S., Clarke, N., & Brooke, P. (2006, May). A two-tierintrusion detection system for mobile ad hoc networks–a friend approach.Procceding of the International Conference on Intelligence and SecurityInformatics pp. 590-595, Springer, Berlin, Heidelberg.
[8] Razak, S. A, Two-tier Intrusion Detection System for Mobile Ad HocNetworks, 2007.
[9] Perkins, C., Belding-Royer, E., and Das, S., Ad hoc on-demand distance vector(AODV) routing (No. RFC 3561), 2003.
[10] Trivedi, A. K., Arora, R., Kapoor, R., Sanyal, S., and Sanyal, S. A semidistributedreputation based intrusion detection system for mobile adhocnetworks, Journal of Information Assurance and Security (JIAS), vol. 1, issue 4,pp. 265-274, 2006.
[11] Trivedi, A. K., Kapoor, R., Arora, R., Sanyal, S., &Sanyal, S. RISMReputationBased Intrusion Detection System for Mobile Ad hoc Networks,arXiv preprint arXiv:1307.7833, 2013.
[12] Thakur, M. R., and Sanyal, S, A multi-dimensional approach towards intrusiondetection system. arXiv preprint arXiv:1205.2340, 2012.
[13] Mitrokotsa, A., and Dimitrakakis, C., Intrusion detection in MANET usingclassification algorithms: The effects of cost and model selection, Journal of AdHoc Networks, 11(1), pp. 226-237, 2013.
[14] Anantvalee, T., & Wu, J., A survey on intrusion detection in mobile ad hocnetworks. In Wireless Network Security, pp. 159-180, Springer, Boston, MA, 2007.
[15] S. Bansal and M. Baker. Observation-based cooperation enforcement in adhoc networks.Technical report 072003, Stanford University, 2007.
|