scholarly journals A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things

Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1467 ◽  
Author(s):  
Waleed Alnumay ◽  
Uttam Ghosh ◽  
Pushpita Chatterjee

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. A Beta probabilistic distribution is used to combine different trust evidences and direct trust has been calculated. The theory of ARMA/GARCH has been used to combine the recommendation trust evidences and predict the resultant trust value of each node in multi-step ahead. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.

2021 ◽  
Vol 11 (03) ◽  
pp. 13-23
Author(s):  
K. Divya ◽  
B. Srinivasan

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3257
Author(s):  
Arne Bochem ◽  
Benjamin Leiding

Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker’s goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.


2012 ◽  
Vol 424-425 ◽  
pp. 1053-1056
Author(s):  
Li Guo Qu ◽  
You Rui Huang ◽  
Chao Li Tang ◽  
Liu Yi Ling

Sensing Mine is the specific application of internet of things in mine. Through a variety of techniques of sensing, information transmission and processing, Sensing Mine realizes digital, visualization, and intelligent of true mine. Because mine is in the dynamic mining process, only WSN (wireless sensor network) with the characteristics of distributed, mobile, ad hoc network can be employed to realize mine information sensing. In this paper, low power Wi-Fi(IEEE 802.11)is adopted to constitute WSN, and the node of WSN is mainly consist of GS1010 which is WSN solutions of GainSpan company and other external sensor for mobile sensing of the mine information. Experiment results show that WSN based on Wi-Fi enhances the sensing ability of mine safety information, and provides real-time, reliable data for the mine disasters prediction


Mobile Ad hoc Network is an assortment of free hubs that can convey one another. These hubs are self-composed hub, which doesn't have any fixed framework like base station, radio wires, and so forth. The hubs with in its range can have an immediate correspondence if not it utilizes a moderate hub for transmitting the information. Each node will act as both host and router. The nodes can join or leave the network anytime and makes the network topology. Network topology is dynamic in nature. Because of the dynamic behavior the detection of trust value is difficult for intermediary node. Trust should be managed in the network ie., the network has different behaviors like malicious, selfishness, unhealthiness, etc., due to these behaviors the trust of an intermediary node is difficult to calculate. Right now safe routing is performed by the improvement of convention which yields the minimization of trust inclination and boosts the application execution. This study compares different trust management framework and compare the trust level based on the metrics and outlines the issues and future ideas.


Author(s):  
Ji Guo ◽  
Alan Marshall ◽  
Bosheng Zhou

This chapter presents a novel trust model called Multi-Parameter Trust Framework for Mobile ad hoc networks (MTFM). A key feature of this proposed framework is its use of multiple rather than a single parameter to decide the resulting trust value, applying Grey theory. Results presented here demonstrate that the new framework can maintain consistent trust values in the presence of various types of mobility. Simulations conducted in an 802.11-based mobile ad hoc network also show that this framework offers good robustness in misbehaviour detection by employing multiple parameters. The detection capability of the new framework is examined for a range of misbehaviours and its performance is compared to existing single-parameter approaches, such as the Beta distribution method.


2020 ◽  
Vol 2020 ◽  
pp. 1-21
Author(s):  
Muhammad Haleem Junejo ◽  
Ab Al-Hadi Ab Rahman ◽  
Riaz Ahmed Shaikh ◽  
Kamaludin Mohamad Yusof ◽  
Imran Memon ◽  
...  

The Internet of things (IoT) and advancements of wireless technology have evolved intelligent transport systems to integrate billion of smart objects ready to connect to the Internet. The modern era of the Internet of things (IoT) has brought significant development in vehicular ad hoc networks (VANETs) which transformed the conventional VANET into the Internet of Vehicle (IoV) to improve road safety and diminished road congestion. However, security threats are increasing due to dependency on infrastructure, computing, dynamic nature, and control technologies of VANET. The security threats of VANETs could be addressed comprehensively by increasing trustworthiness on the message received and transmitting node. Conversely, the presence of dishonest vehicles, for instance, Man in the Middle (MiTM) attackers, in the network sharing malicious content could be posed as a severe threat to VANET. Thus, increasing trustworthiness among nodes can lead to increased authenticity, privacy, accuracy, security, and trusted information sharing in the VANET. In this paper, a lightweight trust model is proposed, presented model identifying dishonest nodes and revoking its credential in the MiTM attack scenario. Furthermore, addressing the privacy and security requirement, the pseudonym scheme is used. All nodes in the VANET established trust provided by initially RSU, which is a trusted source in the network. Extensive experiments are conducted based on a variety of network scenarios to evaluate the accuracy and performance of the presented lightweight trust model. In terms of recall, precision, and F-score, our presented model significantly outperformed compared to MARINE. The simulation results have validated that the proposed lightweight model realized a high trust level with 40% of MiTM attackers and in terms of F-score 95%, whereas the MARINE model has 90%, which leads to the model to attain high detection accuracy.


2021 ◽  
Vol 6 (4) ◽  
Author(s):  
Stephen A. Mogaji ◽  
Olaniyi A. Ayeni ◽  
Oluwaseun G. Fadare

Internet of Things (IoT) is a theory that embraces various objects and methods of communication to exchange information. Today, IoT is more a descriptive term of a vision that everything should be linked to the internet. As many as the advantages of IoT, its uniqueness poses a new problem in establishing a trustworthy environment amid some of the items due to the lack of appropriate implementation machineries. However, some common network security measures are not adequate to preserve the integrity of information and services exchanged over the internet. As a result, they remain vulnerable to threats ranging from cyber-physical layer and social layer data management risks. IoT in smart environments interrelates with mobile ad hoc network (MANET), becoming even more attractive and economically successful. This research proposes two different metrics approaches namely Social trust metrics and Quality of Service to evaluate the trustworthiness of IoT Applications using MANET nodes and designing trust metrics that are computed using multiple properties of trust and quality of service.  A model would be designed and simulated in NS-2.  The findings of the investigation into the evaluation of trustworthiness and network performance are presented. The proposed system model has 99.31% accuracy when there were 10%malicious nodes in the network. When the number of misbehaving nodes was increased to 50%, the accuracy level dropped to 98.75 percent, a difference of only 0.56%. The results show that the security and trustworthiness of the proposed system is an improvement over the existing models like Collaborative Reputation (CORE) trust model and Ant Based Evidence Distribution (trust) model. The proposed model can be used to address security challenges in a network environment. Keywords— Confidence, Honesty, IoT, MANET, QoS, Trustworthiness.


2020 ◽  
Vol 8 (5) ◽  
pp. 2945-2947

Mobile Ad hoc Network (MANET) is a particularly disputed network because of its particular features, for example, active topography, decentralization, as well as neighbor depend routing. In MANET, any mobile nodes can connect or disappear arbitrarily; thus, mobile nodes cannot awake which node is it joined with, and this creates resources been dealt between unknown nodes that can be trusted or not. As a result, without any trustworthiness makes the main susceptibility in security concerned aspects of the MANET. In this situation, trust value employs a vital function in all network performance. This paper introduces DempsterShafer theory and Encounter based Trust Routing (DETR) in a MANET. In this scheme, the direct trust and indirect trust is used to compute the mobile node trust. The node cooperation and encounter rate parameters measure the node direct trust in the network. The node indirect trust is computed based on the neighbour node opinion using DempsterShafer theory. Simulation results demonstrate that DETR detecting untrustable nodes in the network.


2017 ◽  
Vol 2 (7) ◽  
pp. 5-8
Author(s):  
Neeraj Verma ◽  
Kuber Mohan

Energy is a critical issue in Mobile Ad-hoc Network. Nodes in Network are working in presence of limited or less energy due to dynamic nature of nodes or infrastructure less network. MANET has no infrastructure so nodes in MANET work on dynamic routing. In this way, energy proficient routing is required for reducing energy utilization. Energy proficient routing plans can extraordinarily reduce energy utilization and augments the lifetime of the networks. Scalability of Ad Hoc Networks can be enhanced by using land data, for example, in LAR, GPSR etc. They utilize physical area data; regularly from GPS (Global Positioning System).GPS empowers a gadget to decide their position as in longitude, Latitude and Altitude by getting this data from the satellites. There has been significant effort in proposing energy efficient routing protocols with the help of GAGAN (GPS Aided GEO Augmented Navigation) which have accuracy to approx One meter in India or its neighbor countries. GAGAN is a route framework which is helped by both GPS and nearby telemetry information to possibly give quicker and more exact situating and navigational information.


Sign in / Sign up

Export Citation Format

Share Document