Mobile ad hoc networks (MANETs) have a wide range of uses because of their dynamic topologies and simplicity of processing. Inferable from the autonomous and dynamic behavior of mobile nodes, the topology of a MANET frequently changes and is inclined to different attacks. So, we present certificate revocation which is an efficient scheme is for security enhancement in MANET. This certificate revocation scheme is used to revoke the certificate of malicious nodes in the network. However, the accuracy and speed of the certificate revocation are further to be improved. By considering these issues along with the energy efficiency of the network, an energy-efficient clustering scheme is presented for certificate revocation in MANET. For cluster head (CH) selection, an opposition based cat swarm optimization algorithm (OCSOA) is proposed. This selected CH participates in quick certificate revocation and also supports to recover the falsely accused nodes in the network. Simulation results show that the performance of the proposed cluster-based certificate revocation outperforms existing voting and non-voting based certificate revocation in terms of delivery ratio, throughput, energy consumption, and network lifetime.
相似文献The dynamic nature of the nodes on the mobile ad hoc network (MANET) imposes security issues in the network and most of the Intrusion detection methods concentrated on the energy dissipation and obtained better results, whereas the trust remained a hectic factor. This paper proposes a trust-aware scheme to detect the intrusion in the MANET. The proposed Trust-aware fuzzy clustering and fuzzy Naive Bayes (trust-aware FuzzyClus-Fuzzy NB) method of detecting the intrusion is found to be effective. The fuzzy clustering concept determines the cluster-head to form the clusters. The proposed BDE-based trust factors along with the direct trust, indirect trust, and the recent trust, hold the information of the nodes and the fuzzy Naive Bayes determine the intrusion in the nodes using the node trust table. The simulation results convey the effectiveness of the proposed method and the proposed method is analyzed based on the metrics, such as delay, energy, detection rate, and throughput. The delay is in minimum at a rate of 0.00434, with low energy dissipation of 9.933, high detection rate of 0.623, and greater throughput of 0.642.
相似文献There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.
相似文献The state of the art trust management techniques especially designed for wireless sensor network, are not well suited due to less battery power and less memory of sensor nodes. In this work, we propose a fuzzy based hierarchical trust management scheme which includes direct trust calculation on real time past experience and credit based calculation and indirect trust calculation on peer recommendation. In this scheme cluster head and base station maintains constructive knowledge table based on fuzzy logic which reduces memory and communication overhead. As a whole the scheme reduces the communication overhead, computational time and memory utilization because it deals with decision rather than data compare to other existing schemes.
相似文献Moving randomly without any centralized authority, dynamic nodes constitute the Mobile Adhoc Networks on the basis of fully-fledged cooperation and native trustworthiness. Unfortunately, in real scenarios, the malicious nodes take advantage of this inherent trustworthiness to settle in and perform their suspicious activities. In the light of the growing concerns about security attacks in hostile environments, new challenges have emerged to thwart routing attacks including the smart grayhole attack, which adversely affects the availability and accuracy of the network by dropping data packets. This paper addresses this disturbing attack by monitoring the behavior of the participating nodes through a bio-inspired trust management model. The distributed trustworthiness assessment model is based on the beta reputation system combined with the Ant Colony Optimization (ACO) metaheuristic. The main focus of the beta reputation system is rating the nodes according to their successful tasks and their consumed energy, while the ACO metaheuristic maintains this reputation metric during the discovery process and calculates the preference value of each traversed path to select the most secure one. The proposed model improves the traditional Dynamic Source Routing (DSR) protocol by isolating the malicious nodes from participation in data packets transmission. The simulations conducted with the network simulator 2, show that despite the presence of numerous gray holes, the reputation-based ACO DSR (RACODSR) outperforms the standard DSR in terms of packet loss ratio by a decrease of 9.8%, packet delivery ratio by an increase of 0.22%, throughput by an increase of 0.4%, jitter by a decrease of 22.76%, the end to end delay by a decrease of 2.51% and the consumed energy by a decrease of 0.17%.
相似文献Mobile ad hoc network (MANET) is vulnerable to security attacks because of the shared radio medium and lack of centralized coordination. Since most multi-hop routing protocols implicitly assume cooperative routing and are not originally designed for security attacks, MANET has been challenged by diverse denial-of-service attacks that often interfere with the protocol and interrupt on-going communication. In this paper, we propose an explore-based active detection scheme, called EBAD, to efficiently mitigate the routing misbehaviors in MANETs running with dynamic source routing. The basic idea is that a source node broadcasts a route request packet with a fictitious destination node to lure potential malicious nodes to reply a fake route reply packet. If the source node receives the fake route reply packet or an intermediate node cannot decrypt the received route reply packet, the routing misbehavior can be detected. We also propose a route expiry timer based approach to reduce the effect of route cache pollution because of the fake route reply. We present a simple analytical model of the EBAD and its numerical result in terms of detection rate. We also conduct extensive simulation experiments using the OMNeT++ for performance evaluation and comparison with the existing schemes, CBDS and 2ACK. The simulation results show that the proposed countermeasure can not only improve the detection rate and packet delivery ratio but also can reduce the energy consumption and detection latency.
相似文献In Flying Ad hoc Networks (FANETs), coordination and cooperation among nodes are important for efficient data transmission. Cooperation among the nodes hinges on the node behavior and the behavior of the node can be quantified using the concept of trust. Trust helps in segregation of non-cooperative and malicious network nodes, thus increasing the reliability of information exchanged among nodes. In this paper, a Trust Based Clustering Scheme (TBCS) has been proposed for FANETs. TBCS use a multi-criteria fuzzy method for the classification based on the node’s behavior in the fuzzy and complex environment. The proposed scheme makes use of Takagi–Sugeno–Kang fuzzy inference method. The reward and punishment mechanism has been introduced to convert the node’s behavior into trust, and to segregate malicious and misbehaving nodes in the FANET. Furthermore, a secure Cluster Head has been selected based on calculated trust values that is responsible for communication with ground control station and inter-cluster communication. TBCS is compared with existing trust models and the experiment results revealed that the proposed TBCS model has high accuracy, better performance, and adaptability in FANETs.
相似文献This paper proposes a node self-recommendation mechanism which is effective in trust calculation model in wireless sensor networks (WSNs). The mechanism has little practical sense to cable and wireless network among which nodes’ resources, especially energy, are almost unlimited; furthermore it may bring some security risk to networks on the contrary. But as to WSNs where nodes’ resources are strictly limited, a node can express its intension of participating communication to its neighbors by using the mechanism according to its current running state and predefined strategies. This mechanism is useful to save nodes’ energy, balance network load and prolong network lifetime ultimately. The paper focuses on self-recommendation value expression, calculation and synthesis method. Application method of the mechanism is also discussed. Simulation results show that using trust calculation model cooperatively with self-recommendation mechanism can protect low energy nodes effectively and balance energy consumption among adjacent nodes without weakening malicious node identification function of the trust model.
相似文献