Trust-oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks

被引:4
|
作者
Buksh, Waqas [1 ]
Guo, Ying [1 ]
Iqbal, Saleem [2 ]
Qureshi, Kashif Naseer [3 ]
Lloret, Jaime [4 ,5 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha, Peoples R China
[2] Allama Iqbal Open Univ, Dept Comp Sci, Islamabad, Pakistan
[3] Bahria Univ, Ctr Excellence Artificial Intelligence, Dept Comp Sci, Islamabad, Pakistan
[4] Univ Politecn Valencia, Inst Invest Gest Integrada Zonas Costeras, Valencia, Spain
[5] Staffordshire Univ, Sch Comp & Digital Technol, Stoke, England
关键词
D O I
10.1002/ett.4489
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Flying Ad Hoc Networks (FANETs) are gaining popularity due to its extra-ordinary features in avionics and electronics domain. FANETs are also considered as most powerful weapon in military assets as well as in civil security applications. Due to its infrastructureless design and wireless nature network, some security challenges are overhead that should be overcome before the whole network performance degradation. Malicious nodes are capable of degrading the network throughput and credibility by including false and malicious data. Securing the dynamic network from malicious nodes is a critical issue in infrastructureless environment. In this paper we have purely focused on identification and isolation of malicious node in order to make enhancement in packet delivery rate and maintain the network reliability. To accomplish all these tasks, we have introduced Trust-Oriented Peered Customized Mechanism (TOPCM) to estimate the trust value among flying ad hoc nodes. In this research, we have also eliminated the malicious nodes presence that causes misbehavior and interruption in the network. To demonstrate the effectiveness of our proposed approach we have used Network Simulator NS2 to demonstrate the entire process into simulated environment. Simulated results showed that proposed TOPCM works more effectively and meets our desired expectation. The main contribution of this research is to establish trust among nodes that will be helpful to isolate the malicious nodes and make enhancement in packet delivery rate.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Ahmed, Adnan
    Abu Bakar, Kamalrulnizam
    Channa, Muhammad Ibrahim
    Haseeb, Khalid
    Khan, Abdul Waheed
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) : 280 - 296
  • [2] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan Ahmed
    Kamalrulnizam Abu Bakar
    Muhammad Ibrahim Channa
    Khalid Haseeb
    Abdul Waheed Khan
    [J]. Frontiers of Computer Science, 2015, 9 : 280 - 296
  • [3] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan AHMED
    Kamalrulnizam ABU BAKAR
    Muhammad Ibrahim CHANNA
    Khalid HASEEB
    Abdul Waheed KHAN
    [J]. Frontiers of Computer Science., 2015, 9 (02) - 296
  • [4] Crosscheck mechanism to identify malicious nodes in ad hoc networks
    Su, Xu
    Boppana, Rajendra V.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (01) : 45 - 54
  • [5] Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks
    Qureshi, Kashif Naseer
    Nafea, Hanaa
    Tariq Javed, Ibrahim
    Zrar Ghafoor, Kayhan
    [J]. IEEE ACCESS, 2024, 12 : 95390 - 95401
  • [6] Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks
    Rikli, Nasser-Eddine
    Alnasser, Aljawharah
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (07): : 1 - 16
  • [7] Detecting and isolating malicious nodes in wireless ad hoc networks
    Li, Fanzhi
    Jassim, Sabah
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [8] Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks
    Rizvi, Syed S.
    Edla, Varsha
    Poudyal, Saroj
    Nepal, Ravi
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 526 - 531
  • [9] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
  • [10] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks
    Rahman, Mohsin Ur
    Abbas, Sohail
    Latif, Seemab
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194