An Enhanced Associativity Based Routing with Fuzzy Based Trust to Mitigate Network Attacks

Mobile Ad Hoc Networks (MANETs) is a collection of mobile devices forming a communication network without infrastructure. MANET is vulnerable to security threats due to network’s limited security, dynamic topology, scalability and the lack of central management. The Quality of Service (QoS) routing in such networks is limited by network breakage caused by node mobility or nodes energy depletions. The impact of node mobility on trust establishment is considered and its use to propagate trust through a network is investigated in this paper. This work proposes an enhanced Associativity Based Routing (ABR) with Fuzzy based Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS and to mitigate network attacks.




References:
[1] Bang, A. O., & Ramteke, L. P. (2013). MANET: History, Challenges
And Applications. International Journal of Application or Innovation in
Engineering & Management (IJAIEM), 2(9), 249-251.
[2] Goyal, P., Parmar, V., & Rishi, R. (2011). Manet: Vulnerabilities,
challenges, attacks, application. IJCEM International Journal of
Computational Engineering & Management, 11(2011), 32-37.
[3] Kumar, M., & Mishra, R. (2012). An Overview of MANET: History,
Challenges and Applications. Indian Journal of Computer Science and
Engineering (IJCSE), 3(1), 121-125.
[4] Bakshi, A., Sharma, A. K., & Mishra, A. Significance of Mobile ADHOC
Networks (MANETS).
[5] Virendra, M., Jadliwala, M., Chandrasekaran, M., & Upadhyaya, S.
(2005, April). Quantifying trust in mobile ad-hoc networks. In Proc.
IEEE Int’l Conf. Integration of Knowledge Intensive Multi-Agent
Systems (KIMAS).
[6] Rajaram, A., & Palaniswami, D. S. (2009). A trust based cross layer
security protocol for mobile ad hoc networks. arXiv preprint
arXiv:0911.0503.
[7] Subramanian, S., & Ramachandran, B. (2012). Trust Based Scheme for
QoS Assurance in Mobile Ad-Hoc Networks. arXiv preprint
arXiv:1202.1664.
[8] Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust
management for mobile ad hoc networks. Communications Surveys &
Tutorials, IEEE, 13(4), 562-583.
[9] Wang, C., Yang, X., & Gao, Y. (2005). A routing protocol based on
trust for MANETs. In Grid and Cooperative Computing-GCC 2005 (pp.
959-964). Springer Berlin Heidelberg.
[10] Luo, J., Liu, X., Zhang, Y., Ye, D., & Xu, Z. (2008, October). Fuzzy
trust recommendation based on collaborative filtering for mobile ad-hoc
networks. InLCN (pp. 305-311).
[11] Duraimurugan, A., Karthi, S., & Kirupagaran, D. A Trust Based Secure
Source Routing using Fuzzy Logic Rules Prediction in Mobile Ad Hoc
Networks.
[12] Singh, Y., & Siwach, M. V. (2012). Quality of Service in MANET. Int.
J. Innov. Eng. Technol.
[13] Upadhayaya, S., & Gandhi, C. (2009). Quality of service routing in
mobile ad hoc networks Using location and energy parameters. Int.
Journal of Wireless & Mobile Networks (IJWMN), 1(2).
[14] Jawhar, I., & Wu, J. (2005). Quality of service routing in mobile ad hoc
networks. In Resource Management in Wireless Networking (pp. 365-
400). Springer US.
[15] Zhu, C., & Corson, M. S. (2002). QoS routing for mobile ad hoc
networks. InINFOCOM 2002. Twenty-First Annual Joint Conference of
the IEEE Computer and Communications Societies. Proceedings. IEEE
(Vol. 2, pp. 958-967). IEEE.
[16] Mamatha, T. (2012). Network security for MANETS. In International
Journal of Soft Computing and Engineering (IJSCE), Volume-2, Issue-2.
[17] Fujiwara, S., Ohta, T., & Kakuda, Y. (2012, June). An inter-domain
routing for heterogeneous mobile ad hoc networks using packet
conversion and address sharing. In Distributed Computing Systems
Workshops (ICDCSW), 2012 32nd International Conference on (pp.
349-355). IEEE.
[18] Othman, N. E., & Weber, S. (2011, October). Towards Tag-based
cooperation for mobile ad hoc networks. In Reliable Distributed Systems
Workshops (SRDSW), 2011 30th IEEE Symposium on (pp. 20-25).
IEEE.
[19] Li-Qing, C., & Rong-lin, H. (2010, July). Group key agreement scheme
for mobile ad hoc networks based on threshold secret sharing. In
Electronic Commerce and Security (ISECS), 2010 Third International
Symposium on (pp. 176-180). IEEE.
[20] Thorat, S. A., & Kulkarni, P. J. (2014, July). Design issues in trust based
routing for MANET. In Computing, Communication and Networking
Technologies (ICCCNT), 2014 International Conference on (pp. 1-7).
IEEE.
[21] Chze, P. L. R., Yan, W. K. W., & Leong, K. S. (2012, August). A User-
Controllable Multi-Layer Secure Algorithm for MANET. In Wireless
Communications and Mobile Computing Conference (IWCMC), 2012
8th International (pp. 1080-1084). IEEE.
[22] Nakahara, S., Ohta, T., & Kakuda, Y. (2013, December). Experimental
Evaluation of MANET Based on Autonomous Clustering and P2P
Overlay Network. In Computing and Networking (CANDAR), 2013
First International Symposium on (pp. 480-483). IEEE.
[23] Joshi, S., Sheikh, R., & Mishra, D. K. (2010, September). Schematize
Trust Overlays and Management for Privacy Preservation in MANET.
In Computational Intelligence, Modelling and Simulation (CIMSiM),
2010 Second International Conference on (pp. 106-110). IEEE.
[24] Liao, J., Zhang, H., Jiang, L., & Liu, Y. (2011, April). A clustering
algorithm based on subjective trust in MANET. In Electric Information
and Control Engineering (ICEICE), 2011 International Conference on
(pp. 3817-3820). IEEE.
[25] Cho, J. H., Swami, A., & Chen, R. (2011). A survey on trust
management for mobile ad hoc networks. Communications Surveys &
Tutorials, IEEE, 13(4), 562-583.
[26] Jabbehdari, S., Shamaei, M., & Darehshoorzadeh, A. (2010, October).
IQoS-ODMRP: A novel routing protocol considering QoS parameter in
MANET. InIndustrial Electronics & Applications (ISIEA), 2010 IEEE
Symposium on (pp. 126-130). IEEE.
[27] Lal, C., Laxmi, V., & Gaur, M. S. (2013, August). QoS-aware routing
for transmission of H. 264/SVC encoded video traffic over MANETs. In
Communications (APCC), 2013 19th Asia-Pacific Conference on (pp.
104-109). IEEE.
[28] Peng, H., Bai, Y., & Liu, X. (2012, March). End-to-End QoS
Guaranteed Approach Using Multi-object Genetic Algorithm in
Cognitive MANETs. In Advanced Information Networking and
Applications Workshops (WAINA), 2012 26th International Conference
on (pp. 938-943). IEEE.
[29] Santhi, G., Nachiappan, A., Ibrahime, M. Z., Raghunadhane, R., &
Favas, M. K. (2011, June). Q-learning based adaptive QoS routing
protocol for MANETs. In Recent Trends in Information Technology
(ICRTIT), 2011 International Conference on (pp. 1233-1238). IEEE.
[30] Kulla, E., Spaho, E., Xhafa, F., Barolli, L., & Takizawa, M. (2012,
November). Using data replication for improving QoS in MANETS. In
Proceedings of the 2012 Seventh International Conference on
Broadband, Wireless Computing, Communication and Applications (pp.
529-533). IEEE Computer Society.
[31] Shaar, S. A., Masoud, F. A., Murad, A., Shalabi, R. A., & Kanaan, G.
(2006). Analysis of enhanced associativity based routing protocol.
Journal of Computer Science, 2(12), 853.
[32] Liu, C., & Kaiser, J. (2003). A survey of mobile ad hoc network routing
protocols. Universität Ulm, Fakultät für Informatik..
[33] Sharma, S. K., Kumar, R., Gangwar, A., & Pakhre, K. Routing Protocols
and Security Issues in MANET: A Survey.
[34] Royer, E. M., & Toh, C. K. (1999). A review of current routing
protocols for ad hoc mobile wireless networks. Personal
Communications, IEEE, 6(2), 46-55.
[35] Raja, J., & Santosh, S. (2013). Comparative study of reactive routing
protocol (AODV, DSR, ABR and TORA) in MANET. IJECS, 2(3).
[36] Govindan, K., & Mohapatra, P. (2012). Trust computations and trust
dynamics in mobile adhoc networks: a survey. Communications Surveys
& Tutorials, IEEE, 14(2), 279-298. [37] Dai, H., Jia, Z., & Qin, Z. (2009). Trust evaluation and dynamic routing
decision based on fuzzy theory for manets. Journal of Software, 4(10),
1091-1101.