Trust-oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks

被引:4
|
作者
Buksh, Waqas [1 ]
Guo, Ying [1 ]
Iqbal, Saleem [2 ]
Qureshi, Kashif Naseer [3 ]
Lloret, Jaime [4 ,5 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha, Peoples R China
[2] Allama Iqbal Open Univ, Dept Comp Sci, Islamabad, Pakistan
[3] Bahria Univ, Ctr Excellence Artificial Intelligence, Dept Comp Sci, Islamabad, Pakistan
[4] Univ Politecn Valencia, Inst Invest Gest Integrada Zonas Costeras, Valencia, Spain
[5] Staffordshire Univ, Sch Comp & Digital Technol, Stoke, England
关键词
D O I
10.1002/ett.4489
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Flying Ad Hoc Networks (FANETs) are gaining popularity due to its extra-ordinary features in avionics and electronics domain. FANETs are also considered as most powerful weapon in military assets as well as in civil security applications. Due to its infrastructureless design and wireless nature network, some security challenges are overhead that should be overcome before the whole network performance degradation. Malicious nodes are capable of degrading the network throughput and credibility by including false and malicious data. Securing the dynamic network from malicious nodes is a critical issue in infrastructureless environment. In this paper we have purely focused on identification and isolation of malicious node in order to make enhancement in packet delivery rate and maintain the network reliability. To accomplish all these tasks, we have introduced Trust-Oriented Peered Customized Mechanism (TOPCM) to estimate the trust value among flying ad hoc nodes. In this research, we have also eliminated the malicious nodes presence that causes misbehavior and interruption in the network. To demonstrate the effectiveness of our proposed approach we have used Network Simulator NS2 to demonstrate the entire process into simulated environment. Simulated results showed that proposed TOPCM works more effectively and meets our desired expectation. The main contribution of this research is to establish trust among nodes that will be helpful to isolate the malicious nodes and make enhancement in packet delivery rate.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Recommendation Trust for Improved Malicious Node Detection in Ad hoc Networks
    Ahmed, Saneeha
    Tepe, Kemal
    [J]. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [22] Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks
    Singh, Yuvraj
    Jena, Sanjay Kumar
    [J]. ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 410 - 419
  • [23] A distributed trust mechanism for mobile ad hoc networks
    Sen, Jaydip
    Chowdhury, Piyah Roy
    Sengupta, Indranil
    [J]. 2006 INTERNATIONAL SYMPOSIUM ON AD HOC AND UBIQUITOUS COMPUTING, 2007, : 60 - +
  • [24] Critical nodes selection based on trust evaluation in Ad Hoc networks
    Liu, Zhuo-Chao
    Yang, Li
    Jiang, Qi
    Wang, Wei
    Cao, Chun-Jie
    [J]. Tongxin Xuebao/Journal on Communications, 2014, 35 : 213 - 219
  • [25] An accurate and precise malicious node exclusion mechanism for ad hoc networks
    Ferraz, Lyno Henrique G.
    Velloso, Pedro B.
    Duarte, Otto Carlos M. B.
    [J]. AD HOC NETWORKS, 2014, 19 : 142 - 155
  • [26] Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks
    Ghosh, T
    Pissinou, N
    Makki, K
    [J]. LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 224 - 231
  • [27] A fuzzy-based trust model for flying ad hoc networks (FANETs)
    Singh, Kuldeep
    Verma, Anil Kumar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (06)
  • [28] Utilizing behaviour history to right malicious nodes in wireless Ad-hoc networks
    Hallani, Houssein
    Shahrestani, Seyed A.
    [J]. INFORMATION MANAGEMENT IN THE NETWORKED ECONOMY: ISSUES & SOLUTIONS, 2007, : 81 - 87
  • [29] Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks
    Nasser, Nidal
    Chen, Yunfeng
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1154 - 1159
  • [30] A Trust based Auction oriented Routing Model for Ad Hoc Networks
    Chatterjee, Pushpita
    Sengupta, Indranil
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 874 - 877