Survey on Distributed Trust Management Schemes for Preventing Malicious Activities in Mobile Ad Hoc Network

International Journal of Electronics and Communication Engineering
© 2015 by SSRG - IJECE Journal
Volume 2 Issue 1
Year of Publication : 2015
Authors : A.Abitha and L. Magthelin Therase
pdf
How to Cite?

A.Abitha and L. Magthelin Therase, "Survey on Distributed Trust Management Schemes for Preventing Malicious Activities in Mobile Ad Hoc Network," SSRG International Journal of Electronics and Communication Engineering, vol. 2,  no. 1, pp. 5-8, 2015. Crossref, https://doi.org/10.14445/23488549/IJECE-V2I1P102

Abstract:

The open air medium and dynamic nature of MANET suffering from various security demands and globally trust management scheme that enhance security in MANETs. The two methods of trust management are the direct observation and the indirect observation by using uncertain reasoning. In this paper, we are going to extend the energy awareness of the nodes which are participating in the network and introduced originating message confirmation from destination node in a route request manner. When source select the route, source will generate one originating message to all neighbours. Neighbour nodes will check the nearby nodes trust value and that value send to destination. Finally, the result shown in the stimulation is destination analyzes all trust patterns of the routes. Then it will be selects the route without hackers

Keywords:

Trust management, REQaccommodation, MANET, OLSR, trust pattern, Trust.

References:

[1] Pushpita Chatterjee School of Information Technology Trust Based Clustering And Secure Routing Scheme For Mobile Ad Hoc Networks International Journal of Computer Networks & Communications (IJCNC), Vol.1, No.2, July 2009.
[2] Mohit Virendra, Murtuza Jadliwala, Madhusudhanan Chandrasekaran, Shambhu Upadhyaya Quantifying Trust in Mobile Ad-Hoc Networks KIMAS 2005 WALTHAM, MA, USA
[3] L. Eschenauer, V.D. Gligor, “A key-management scheme for distributed sensor networks”, Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41-47,Washington D.C., 2002
[4] J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, “Providing robust and ubiquitous security support for mobile ad-hoc networks”, Proceedings of 9th International Conference on Network Protocols (ICNP ’01), pp. 251-260, 2001
[5] Bucheggar, S., Boudec, J.Y.: Performance analysis of the CONFIDANT Protocol: Cooperation of Nodes-Fairness in Dynamic Ad Hoc Networks’. In: Proceedings of the 3rd Symposium Mobile Ad-Hoc Networking and Computing, pp. 226-236 (2000).
[6] Azzedin, F. and Maheswaran, M.: Evolving and Managing Trust in Grid Computing Systems. In: Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (2002).
[7] Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, “Robust Cooperative Trust Establishment for MANETs,” Proc. 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, 30 Oct. 2006, pp. 23-34
[8] L. Capra, “Toward a Human Trust Model for Mobile Ad-hoc Networks,” Proc. 2nd UK-UbiNet Workshop, 5-7 May 2004, Cambridge University, Cambridge, UK
[9] W. J. Adams, N. J. Davis, “Toward a Decentralized Trust-based Access Control System for Dynamic Collaboration,” Proc. 6th Annual IEEE SMC Information Assurance Workshop (IAW’05), 15-17 June, 2005, West Point, NY, pp. 317-324.
[10] J. Golbeck, “Computing with Trust: Definition, Properties, and Algorithms,” Securecomm and Workshops-Security and Privacy for Emerging Areas in Communications Networks, Baltimore, MD, Aug. – 1 Sep. 2006, pp. 1-7. 
[11] Tanapat Anusas-amornkul, “On Detection Mechanisms and Their Performance for Packet Dropping Attack in Ad Hoc Networks”, Submitted to the Graduate Faculty of the School of Information Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2008.
[12] Shukla Banerjee, “Detection/Removal of Cooperative Black and Gray Hole Attack in  Mobile Ad-Hoc Networks,” Proceedings of the World Congress on Engineering and Computer Science 2008, USA.
[13] X. Li, X. Wang, and J. Shen, “Strategy and simulation of trust cluster based key management protocol for ad hoc networks,” 4th Int’l Conf. on Computer Science & Education, pp. 269 - 274, Nanning, China, July 2009.