Open Access Open Access  Restricted Access Subscription or Fee Access

Behaviors Observations Beliefs Model for Security Enhancement Using Cognitive Reasoning

P. Singaravel, B. M. Alaudeen, G. Tholkappia Arasu

Abstract


Abstract A combined trust management scheme that improves the security in MANETs using uncertain reasoning, in the existing scheme, the trust model has two components: trust from direct observation and trust from indirect observation. With direct observation from an observer node, the trust value is derived using Bayesian inference, which is a type of uncertain reasoning when the full probability model can be defined. On the other hand, with indirect observation from neighbor nodes of the observer node, the trust value is derived using the Dumpster-Shafer theory, which is another type of uncertain reasoning when the proposition of interest can be derived by an indirect method projected theme, a replacement trust model supported psychological feature reasoning, that associates the notion of trust with all the member nodes of MANETs employing a novel Behaviors-Observations-Beliefs (BOB) model. These trust values square measure used for detection and bar of malicious and dishonest nodes whereas routing the information. The projected trust model works with the DTM-OLSR protocol, that involves computation of express trust between any two nodes victimization psychological feature data have taken care of trust attenuation over time, rewards, and penalties whereas computing the trustiness of a node and additionally route. Keywords: Security in MANET, trust model, BOB model

Full Text:

PDF

References


Guan Q, Yu FR, Jiang S, et al. Joint Topology Control and Authentication Design in Mobile Ad hoc Networks with Cooperative Communications. IEEE Trans. Veh. Tech. Jul 2012; 61: 2674–85p.

Yu FR, Tang H, Bu S, et al. Security and Quality of Service (QoS) Co-Design in Cooperative Mobile Ad hoc Networks. EURASIP J. Wireless Commun. Networking. Jul 2013; 2013: 188–90p.

Wang Y, Yu FR, Tang H, et al. A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks. IEEE Trans. Wireless Commun. Mar 2014; 13: 1616–27p.

Bu S, Yu FR, Liu P, et al. Distributed Combined Authentication and Intrusion Detection with Data Fusion in High-Security Mobile Ad hoc Networks. IEEE Trans. Veh. Tech. Mar 2011; 60: 1025–36p.

Adjih C, Raffo D, Muhlethaler P. Attacks against OLSR: Distributed Key Management for Security. In Proc. 2nd OLSR Workshop, (Domaine de Voluceau, France). Dec 2005.

Zhang Y, Liu W, Lou W, et al. Securing Mobile Ad hoc Networks with Certificateless Public Keys. IEEE Trans. Dependable and Secure Computing. Oct–Dec 2006; 3: 386–99p.

Fang Y, Zhu X, Zhang Y. Securing Resource-Constrained Wireless Ad hoc Networks. IEEE Wireless Comm. 2009; 16(2): 24–30p.

Yu FR, Tang H, Mason P, et al. A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad hoc Networks. IEEE Trans. Network and Service Management. Dec 2010; 7: 258–67p.

Lou W, Liu W, Zhang Y, et al. SPREAD: Improving Network Security by Multipath Routing in Mobile Ad hoc Networks. ACM Wireless Networks. Mar 2009; 15(3): 279–94p.

Zhang R, Zhang Y, Fang Y. AOS: An Anonymous Overlay System for Mobile Ad hoc Networks. ACM Wireless Networks. May 2011; 17(4): 843–59p.


Refbacks

  • There are currently no refbacks.