Trust System Based Intrusion Detection In Mobile Ad-hoc Network (MANET)

被引:0
|
作者
Nanaware, Pradnya M. [1 ,2 ]
Babar, Sachin D. [1 ,2 ]
机构
[1] Sinhgad Inst Technol, Pune, Maharashtra, India
[2] Savitribai Phule Pune Univ, Pune, Maharashtra, India
关键词
MANET; malicious; honest; trust; social parameters;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Mobile Ad-hoc Network (MANET) is a volatile network, the nodes are in the movable state. The node can easily enter and exit from the network. The attacker node can easily enter into the network and affect the performance of the network. The malicious nodes are difficult to detect as any node can enter into the network easily. The detection of the malicious node is very important to secure and improve the performance of the network. The various parameters are considered to differentiate between the malicious and honest nodes of the network The paper gives solution for detection of malicious nodes from the network depending on the trust of the node. In this paper, various parameters are considered to identify the maliciousness. The parameters include the energy of node, the mobility of the nodes and two social parameters. The detection is based on the trust value for the particular node.
引用
收藏
页码:283 / 286
页数:4
相关论文
共 50 条
  • [1] A Review on Intrusion Detection System in Mobile Ad-Hoc Network
    Saxena, Aumreesh Ku.
    Sinha, Sitesh
    Shukla, Piyush
    [J]. 2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 549 - 554
  • [2] An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis
    Bala, K.
    Jothi, S.
    Chandrasekar, A.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 15205 - 15212
  • [3] An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis
    K. Bala
    S. Jothi
    A. Chandrasekar
    [J]. Cluster Computing, 2019, 22 : 15205 - 15212
  • [4] Intrusion Detection System for Wireless Ad-hoc network
    Chandravanshi, Kamlesh
    Tiwari, Akrosh
    Bathre, Mukesh
    [J]. ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 272 - +
  • [5] A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)
    Tahboush, Muhannad
    Agoyi, Mary
    [J]. IEEE ACCESS, 2021, 9 : 11872 - 11883
  • [6] A Study on Intrusion Detection System of Mobile Ad-hoc Networks
    Sindhuja, S.
    Vadivel, R.
    [J]. SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 307 - 316
  • [7] Mobile Ad-Hoc Network (MANET) for Disaster Management
    Jadhav, S. S.
    Kulkarni, A. V.
    Menon, Radhika
    [J]. 2014 ELEVENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2014,
  • [8] Cost Performance Analysis of Intrusion Detection System in Mobile Wireless Ad-Hoc Network
    Pinnaka, Anil Kumar
    Tharashasank, D.
    Reddy, V. S. K.
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 536 - 541
  • [9] Service discovery and delivery system based on trust in mobile ad-hoc network
    Han, In-Sung
    Kim, Jin-Mook
    Ryou, Hwang-Bin
    Ahn, Woo-Hyun
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 171 - +
  • [10] Forming Trust in Mobile Ad-Hoc Network
    Abu Bakar, Asmidar
    Ismail, Roslan
    Jais, Jamilin
    Manan, Jamalul-lail Abdul
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 470 - +