An Integrated Z-Number and DEMATEL-Based Cooperation Enforcement Scheme for Thwarting Malicious Nodes in MANETs

被引:11
|
作者
Sankar, S. M. Udhaya [1 ]
Kumar, N. Jagadish [1 ]
Elangovan, G. [2 ]
Praveen, R. [3 ]
机构
[1] Velammal Inst Technol, Dept Informat Technol, Chennai 601204, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Dept Data Sci & Business Syst, Kattankulathur 603203, Tamil Nadu, India
[3] Anna Univ, Madras Inst Technol Campus, Dept Comp Technol, Chennai 600044, Tamil Nadu, India
关键词
Mobile ad hoc networks (MANETs); Reputation; Z-number; Decision-making trial; Evaluation laboratory (Z-DEMATEL); Reference ideal method (RIM); BLACK-HOLE ATTACKS;
D O I
10.1007/s11277-023-10391-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile ad hoc Networks (MANETs) represent a group of mobile nodes that constitutes the network deprived of any pre-established infrastructure. In MANETs, the mobile nodes play an anchor role of a host and a router, thereby they possess the capability of sending and receiving the packet amid source and destination based on the cooperation rendered by the intermediary nodes of the routing path. However, existence of malicious as well as selfish nodes severally crumbles the performance of the network. The reputation-based cooperation approaches are essential for identifying malevolent and selfish nodes and segregate them from the network. At this juncture, multiple attribute decision making is confirmed to the ideal candidate for determining the reputation rank associated with the nodes during data dissemination. In this paper, An Integrated Z-number, and DEMATEL-based Cooperation Enforcement (IZ-DEMATELCE) scheme is contributed for finding the reputation of the mobile nodes for thwarting the impact of malevolent as well as selfish nodes in the network. This IZ-DEMATELCE-based reputation approach completely concentrates on identifying the weights and mutual influential relationships existing among the attributes that are used for confirming the malicious behaviour of mobile nodes. It adopts the merits of Z number-based reference ideal method for estimating the resilience potential of mobile nodes to incorporate appropriate decision-making strategies essential for isolating malicious nodes. It also uses the benefits of Trapezoidal Fuzzy Numbers to determine the information uncertainty and assesses the reliability/confidence of neighbouring nodes towards the nodes in the routing path that is monitored.
引用
收藏
页码:2531 / 2563
页数:33
相关论文
共 9 条
  • [1] An Integrated Z-Number and DEMATEL-Based Cooperation Enforcement Scheme for Thwarting Malicious Nodes in MANETs
    S. M. Udhaya Sankar
    N. Jagadish Kumar
    G. Elangovan
    R. Praveen
    Wireless Personal Communications, 2023, 130 : 2531 - 2563
  • [2] A New Acknowledgment-based Scheme Against Malicious Nodes and Collusion Attack in MANETs
    Heydari, Vahid
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 784 - 788
  • [3] PPN: Prime Product Number based Malicious Node Detection Scheme for MANETs
    Gambhir, Sapna
    Sharma, Saurabh
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 335 - 340
  • [4] Fire safety assessment for alternative cruise ship design based on BWM and DEMATEL by linguistic Z-number
    Li, Jianing
    Wang, Gaoshuai
    Guo, Yong
    Wu, Siying
    Chen, Gang
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2024, 40 (05) : 2216 - 2234
  • [5] Hybrid Bayesian and modified grey PROMETHEE-AL model-based trust estimation technique for thwarting malicious and selfish nodes in MANETs
    Suresh, J.
    Sahayaraj, J. Martin
    Rajakumar, B.
    Jayapandian, N.
    WIRELESS NETWORKS, 2024, 30 (03) : 1697 - 1718
  • [6] Hybrid Bayesian and modified grey PROMETHEE-AL model-based trust estimation technique for thwarting malicious and selfish nodes in MANETs
    J. Suresh
    J. Martin Sahayaraj
    B. Rajakumar
    N. Jayapandian
    Wireless Networks, 2024, 30 : 1697 - 1718
  • [7] An integrated method for multi-attribute group decision-making based on the linguistic Z-number and MSM operators
    Chen, Bo
    Cai, Qiang
    Wei, Guiwu
    Mo, Zhiwen
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2023, 27 (02) : 167 - 191
  • [8] Z-number integrated weighted VIKOR technique for hazard prioritization and its application in virtual prototype based EOT crane operations
    Das, Souvik
    Dhalmahapatra, Krantiraditya
    Maiti, J.
    APPLIED SOFT COMPUTING, 2020, 94
  • [9] An integrated decision support framework for new energy vehicle evaluation based on regret theory and QUALIFLEX under Z-number environment
    Peng, Honggang
    Xiao, Zhi
    Wang, Mengxian
    Wang, Xiaokang
    Wang, Jianqiang
    INFORMATION SCIENCES, 2023, 647