• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2022, Volume: 15, Issue: 33, Pages: 1613-1623

Original Article

A Novel Trust Adaptability Approach for Secure Data Transmissions using Enhanced Collaborative Nodes Trustworthiness in Mobile Ad-hoc Networks

Received Date:22 March 2022, Accepted Date:04 August 2022, Published Date:26 August 2022

Abstract

Objectives: To find an efficient security routing model based on trust adaptability by considering various transmission parameters that influence the node’s behavior. Methods: Enhanced Collaborative Trust Based Approach (ECTBA) was applied to isolate the malicious nodes from routing by computing their enhanced collaborative trust value based on the node’s behavior using transmission parameters. Parameters that influence the node’s behavior like the number of data packets and control packets forwarded, dropped, or misrouted by the node are quantified to compute direct trust value and neighbor reputation. Node’s Enhanced Collaborative trust value was generated by the combination of direct and neighbor observations. Findings: The proposed strategy is compared with several cases like the Direct Trust Based Approach (DTBA), where routing involves trustworthy nodes categorized based on only direct trust, existing methods like Belief-dependent trust evolution method(BETM), Novel extended trust-dependent method (NETM) where routing is done with nodes that are categorized as trustworthy depending on direct and indirect observations and simple AODV routing performed with all the possible random nodes without any trust detection. The performance parameters of the proposed ECTBA exhibit a success rate of 10.2% in false positives detection (FPD),network throughput of 438.12 Kbps,and packet delivery ratio (PDR) of 92.3%.This method proves to be a better method when compared with the traditional trust-based security methods(BETM and NETM) in terms of efficiency. Novelty: This research suggested a novel and fine-tuned method for quantifying a node’s trustworthiness and for secure routing that coupled the direct and indirect observations into enhanced collaborative trustbased on the node’s behavior by considering the transmission parameters. The present work highlights the combination of data packets forwarding behavior and control packets forwarding behavior in computing enhanced collaborative trust to decide the involvement of intermediate trustworthy nodes’ which is not tried before but this study does.

Keywords: Dynamic Topology; Direct Trust; Neighbor Trust; Secure Routing; Enhanced Collaborative Trust

References

  1. Zhihan L, Song H. Trust Mechanism of Feedback Trust Weight in Multimedia Network. ACM Transactions on Multimedia Computing, Communications, and Applications. 2021;17(4):1–26. Available from: https://doi.org/10.1145/3391296
  2. Kotteeswaran C, Patra I, Nagaraju R, Sungeetha D, Kommula BN, Algani YMA, et al. Autonomous detection of malevolent nodes using secure heterogeneous cluster protocol. Computers and Electrical Engineering. 2022;100:107902. Available from: https://doi.org/10.1016/j.compeleceng.2022.107902
  3. Mbarek B, Ge M, Pitner T. An adaptive anti-jamming system in HyperLedger-based wireless sensor networks. Wireless Networks. 2022;28(2):691–703. Available from: https://doi.org/10.1007/s11276-022-02886-1
  4. Mohammadi V, Rahmani AM, Darwesh AM, Sahafi A. Trust-based recommendation systems in Internet of Things: a systematic literature review. Human-centric Computing and Information Sciences. 2019;9:1–61. Available from: https://doi.org/10.1186/s13673-019-0183-8
  5. Yang H. A Study on Improving Secure Routing Performance Using Trust Model in MANET. Mobile Information Systems. 2020;2020:1–17. Available from: https://doi.org/10.1155/2020/8819587
  6. Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S. BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future generation computer systems. 2019;96:605–621. Available from: https://doi.org/10.1016/j.future.2019.02.004
  7. Syed SA, Ali S. Enhanced dynamic source routing for verifying trust in mobile ad hoc network for secure routing. International Journal of Electrical and Computer Engineering (IJECE). 2022;12(1):425. Available from: https://doi.org/10.11591/ijece.v12i1.pp425-430
  8. Usha S, Radha S. Detection and avoidance of node misbehavior in MANET based on CLAODV. Indian Journal of Science and Technology. 2011;4(10):1340–1346. Available from: https://doi.org/10.17485/ijst/2011/v4i10.12
  9. Alrahhal H, Jamous R, Ramadan R, Alayba AM, Yadav K. Utilising Acknowledge for the Trust in Wireless Sensor Networks. Applied Sciences. 2022;12(4):2045. Available from: https://doi.org/10.3390/app12042045
  10. Sumathi AC, Akila M, Prado RPD, Wozniak M, Divakarachari P. Dynamic Bargain Game Theory in the Internet of Things for Data Trustworthiness. Sensors. 2021;21(22):7611. Available from: https://doi.org/10.3390/s21227611
  11. Satheesh N, Prasadh K. Improvements in Cluster-Based Routing to Protect Malicious Node Attacks on TAODV Routing Protocol using MANET. Applied Mathematics & Information Sciences. 2019;13(6):899–911. Available from: https://doi.org/10.18576/amis/130603
  12. Alappatt V, M. JPP. Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E. International Journal of Computer Networks and Applications. 2021;8(4):400. Available from: https://doi.org/10.22247/ijcna/2021/209706
  13. Khan T, Singh K, Manjul M, Ahmad MN, Zain AM, Ahmadian A. A Temperature-Aware Trusted Routing Scheme for Sensor Networks: Security Approach. Computers & Electrical Engineering. 2022;98:107735. Available from: https://doi.org/10.1016/j.compeleceng.2022.107735
  14. Du J, Han G, Lin C, Martinez-Garcia M. LTrust: An Adaptive Trust Model Based on LSTM for Underwater Acoustic Sensor Networks. IEEE Transactions on Wireless Communications. 2022;p. 1. Available from: https://doi.org/10.1109/TWC.2022.3157621
  15. Alnumay W, Ghosh U, Chatterjee P. A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things. Sensors. 2019;19(6):1467. Available from: https://doi.org/10.3390/s19061467
  16. Guaya-Delgado L, Pallarès-Segarra E, Mezher AM, Forné J. A novel dynamic reputation-based source routing protocol for mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking. 2019;2019(1):1–6. Available from: https://doi.org/10.1186/s13638-019-1375-7
  17. Krishnan CG, Nishan A, Gomathi S, GAS. Energy and Trust Management Framework for MANET using Clustering Algorithm. Wireless Personal Communications. 2022;122. Available from: https://doi.org/10.1002/dac5138
  18. Dhage MR, Vemuru S. Trust based Secure Routing using Cross layer for Heterogeneous Environment in WSN. International Journal of Emerging Trends in Engineering Research. 2020;8(7):3241–3246. Available from: https://doi.org/10.30534/ijeter/2020/59872020
  19. Mukhedkar MM, Kolekar U. Hybrid PSGWO Algorithm for Trust-Based Secure Routing in MANET. Journal of Networking and Communication Systems (JNACS). 2019;2(3). Available from: https://doi.org/10.46253/jnacs.v2i3.a1
  20. Kumar N. Battery power and trust based routing strategy for MANET. In2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies. 2014;p. 1559–1562. Available from: https://doi.org/10.1109/icimia48430.2020.9074870
  21. Sarbhukan VV, Ragha L. Establishing Secure Routing Path Using Trust to Enhance Security in MANET. Wireless Personal Communications. 2020;110(1):245–255. Available from: https://doi.org/10.1007/s11277-019-06724-0
  22. Wahi C, Chakraverty S, Bhattacherjee V. A trust-based secure AODV routing scheme for MANET. International Journal of Ad Hoc and Ubiquitous Computing. 2021;38(4):231. Available from: https://doi.org/10.1504/ijahuc.2021.119853

Copyright

© 2022 Reddy et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Published By Indian Society for Education and Environment (iSee)

DON'T MISS OUT!

Subscribe now for latest articles and news.