36
Views
10
CrossRef citations to date
0
Altmetric
Articles

Trust framework for attack resilience in MANET using AODV

, &

References

  • G. Arulkumaran and R. K. Gnanamurthy. Fuzzy trust approach for detecting black hole attack in mobile adhoc network. International conference on Mobile Networks and Applications, Amsterdam, Netherland, pages 1-8, (2017).
  • M.Z. A. Bhuiyan, G. Wang, J. Wu, J. Cao, X. Liu, and T. Wang. Dependable structural health monitoring using wireless sensor networks. IEEE Trans. Depend. Sec. Comput., 14(4): 363-376, (2017). doi: 10.1109/TDSC.2015.2469655
  • R. H. Jhaveri and N. M. Patel. Mobile ad-hoc networking with AODV: A review, Int. J. Next-Generat. Comput., 6(3):165-191, (2015).
  • S. Peng, A. Yang, L. Cao, S. Yu, and D. Xie. Social influence modeling using information theory in mobile social networks . Information science, 379, pages 146-159, (2017). doi: 10.1016/j.ins.2016.08.023
  • T. A. Ramrekha, O. Adigun, A. Ladas, N. Weerasinghe, and C. Politis. Towards a scalable routing approach for mobile ad-hoc networks. In Proc. IEEE 20th Int.Workshop Comput. Aided Modeling, Design Commun. Links Netw. (CAMAD), Guildford, UK, pages 261-266, (2015).
  • W. Yang, G. Wang, M. Z. A. Bhuiyand and K. R. Choo. Hypergraph partitioning for social networks based on information entropy modularity. J. Netw. Comput. Appl, 85, pages 59-71, (2017). [Online].Available: http://doi.org/10.1016/j.jnca.2016.10.002
  • W. Jiang, G. Wang, M. Z. A. Bhuiyan, and J. Wu. Understanding graph based trust evaluation in online social networks: Methodologies and challenges. ACM Comput. Surv., 49(1),pages 10, (2016). doi: 10.1145/2906151
  • E. Luo, Q. Liu, and G. Wang. Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), pages 1772-1775, (2016). doi: 10.1109/LCOMM.2016.2584614
  • M. S. Khan, M. I. Khan, S.U.R. Malik, O. Khalid, M. Azim, and N. Javaid. MATF: A multi-attribute trust framework for MANETs. EURA-SIP J. Wireless Commun. Netw., 2016(1):197-213, (2016). doi: 10.1186/s13638-016-0691-4
  • N. Marchang, R. Datta. Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security, 6(2):77-83, (2012). doi: 10.1049/iet-ifs.2010.0160
  • S. A. Thorat and P. J. Kulkarni. Uncertainty analysis framework for trust based routing in MANET. Peer-to-Peer Netw. Appl., 10(4):1101–1111, (2017). doi: 10.1007/s12083-016-0510-z
  • A.M. Pushpa. Trust based secure routing in AODV routing protocol, IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA), Bangalore, India, pages1-6, (2009).
  • Yan Sun, Wei Yu, Zhu Han and Liu K.J.R. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on selected areas in communications, 24(2):305-317, (2006). doi: 10.1109/JSAC.2005.861389
  • R.J. Cai, X.J. Li and P.H.J. Choong. An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE transactions on Mobile Computing, 18(2): 42-55, (2019). doi: 10.1109/TMC.2018.2828814
  • G. Vaseer, G. Ghai, D. Ghai and P.S. Patheja. A neighbor trust-based mechanism to protect mobile networks. IEEE potentials, 38(1): 20-25, (2019). doi: 10.1109/MPOT.2018.2850599
  • T. Noguchi and M. Hayakawa. Blackhole attack prevention method using multiple RREPs in Mobile Ad hoc Network. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, New York, USA, pages 539-544, (2018).
  • M.B.M. Kamel, I. Alameri, A. N. Onaizah. A secure and trust based approach to mitigate blackhole attack on OADV based MANET. IEEE conference on Advance Information Technology, Electronic and Automation control, chongqing, China, pages 1278-1282, (2017).
  • Perkins CE, Royer EM. Ad-hoc on-demand distance vector routing. In Mobile Computing Systems and Applications, Proceedings, WMC-SA’99, LA, USA, pages 90-100, (1999).
  • G. M. Félix, M. P. Gregorio, and G.M.B Javier. Meta-tacs: A trust model demonstration of robustness through a genetic algorithm. Intelligent Automation & Soft Computing, 17, pages 41–59, (2011). doi: 10.1080/10798587.2011.10643132
  • K. Anusha and E. Sathiyamoorthy. A new trust-based mechanism for detecting intrusions in MANET. Information Security Journal:A global Perspective, 26(4):153-165, (2017).
  • J. M. Anoranjini, A. Chandrasekar and S. jothi. Improved QoS and avoidance of black hole attacks in MANET using trust detection framework. Journal for control, Measurement, Electronics, Computing and Communications, 60(3):274-284, (2019).
  • S. S. Verma, A. Kumar and R. B. Patel. QoS oriented dynamic flow preemption (DFP) in MANET. Journal of Information and Optimization Sciences, 39(1):183:193, (2017).
  • R. C. Poonia. Integration of traffic and network simulators for vehicular ad-hoc networks. Journal of Information and Optimization Sciences, 39(7):1583-1589, (2018). doi: 10.1080/02522667.2017.1406580

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.