Redirigiendo al acceso original de articulo en 20 segundos...
ARTÍCULO
TITULO

Security Improvisation through Node Trust Prediction Approach in Mobile Ad Hoc Networks

L Raghavendar Raju    
C R K Reddy    

Resumen

 Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node compromises a service and leads to uncertainty in node behaviour. Computing the node trust and node management will enhance the security aspect in MANETs. This paper proposes a security improvisation based on a Node Trust Prediction Approach (NTPA).  NTPA aims to prevent the interference of an  anomalous node in a MANET. There by  improving the security and data delivery output. The NTPA calculates the node trust prediction by evaluating the four most frequent actions that are performed by a node in the communication process. Node authorization is a key aspect in the evaluation of an ad hoc network?s security. In the proposed method, we monitor the valid and Invalid Authorization of a node. Data delivery reliability is measured with Success of Packet delivery and Loss or Drop of packets. In this paper, NTPA is compared with SAR(Security-Aware Routing) and AODV (Adhoc on-Demand Distance Vector), to evaluate the efficiency in an adhoc networks. The empirical results shows that there is an increase of 25% packet delivery and  a 40% reduction in  routing overhead. ? 

 Artículos similares

       
 
S. Pradeep, Yogesh Kumar Sharma, Chaman Verma, Surjeet Dalal and Cvpr Prasad    
Wireless sensor networks (WSNs) are a comparatively new revolutionary technology that has the potential to revolutionize how we live together with the present system. To enhance data archiving, WSNs are frequently used in scientific studies. Many applica... ver más

 
Bambang Soelistijanto and Vittalis Ayu    
Mobile social networks suffer from an unbalanced traffic load distribution due to the heterogeneity in mobility of nodes (humans) in the network. A few nodes in these networks are highly mobile, and the proposed social-based routing algorithms are likely... ver más
Revista: Algorithms

 
Hamza Zradgui and Khalil Ibrahimi    
There exist numerous applications for deploying Underwater Wireless Sensor Networks (UWSNs), including submarine detection, disaster prevention, oil and gas monitoring, off-shore exploration, and military target tracking. The acoustic sensor nodes are de... ver más
Revista: Acoustics

 
Burhan Ul Islam Khan, Farhat Anwar, Farah Diyana Bt. Abdul Rahman, Rashidah Funke Olanrewaju, Khang Wen Goh, Zuriati Janin and Md Arafatur Rahman    
This paper introduces a computational strategic game model capable of mitigating the adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model?s central concept is to preclude the participation of mi... ver más
Revista: Information

 
Rakib Hossen, Md Whaiduzzaman, Mohammed Nasir Uddin, Md. Jahidul Islam, Nuruzzaman Faruqui, Alistair Barros, Mehdi Sookhak and Md. Julkar Nayeen Mahi    
The Internet of Things (IoT) has seen a surge in mobile devices with the market and technical expansion. IoT networks provide end-to-end connectivity while keeping minimal latency. To reduce delays, efficient data delivery schemes are required for disper... ver más
Revista: Information