Identify And Remove Time And Location Dependent Attack Using Trust Concept for MANETs

Authors

  • Kumari N Dept. of CSE, Radharaman Institute of Technology & science, Bhopal, India
  • Agrawal C Dept. of CSE, Radharaman Institute of Technology & science, Bhopal, India
  • Meena P Dept. of CSE, Radharaman Institute of Technology & science, Bhopal, India

DOI:

https://doi.org/10.26438/ijcse/v6i10.410416

Keywords:

Mobile ad hoc networks, Dishonest recommendation, Trust management, Recommendation Trust Model, , Time and Location Dependent Attack

Abstract

One of the sort of ad-hoc network is Mobile ad hoc networks (MANETs). MANETs are making them arrange and owned formulated network and there is no concentrated base station. In routing forwarding the data packet between nodes is core issue due to badly behaving or untrustworthy nodes present in the network. Recommendation trust model is a framework to find out the untrustworthy nodes and provide routes for packets to destination. A trust demonstrate takes recommendation by nodes transforms into an issue in light of the nearness of deceptive proposition like as ballot-stuffing, bad-mouthing and collusion. Untrustworthy nodes in the existing trust models lead to attacks by using recommendation which is investigated in this paper. Time and Location Dependent Attack Detection (TLDAD) Approach has been proposed in this paper to successfully sift through attacks identified as dishonest recommendation. The fundamental commitment of this work is to identify and remove time and location dependent attack related to recommendation Trust Model in MANETs. The model is tested under a couple of mobile and isolated topologies within which nodes find some changes in neighborhood provoking regular course changes. This paper focuses on a secure communication path across the nodes in the network. The experimental examination shows activeness and accuracy of the proposed method in a dynamic MANET condition.

References

[1] H. Deng, W. Li, and D. Agrawal, “Routing security in wireless ad hoc networks,” IEEE Commun. Mag., vol. 40, no. 10, pp. 70–75, Oct. 200

[2] I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: Imperatives and challenges,” Ad Hoc Netw., vol. 1, no. 1, pp. 13–64, 2003.

[3] G. Sabeena Gnanaselvi, T.V.Ananthan, “An Analysis of Applications, Challenges and Security Attacks in MANET” , International Journal of Computer Sciences and Engineering, Vol.6 , pp. 941-947, 2018.

[4] P. Gupta, P. Bansal, “Different Attacks and their Defense Line in Mobile Ad hoc Networks” , International Journal of Computer Sciences and Engineering, Vol.6 , pp.176-190, 2018.

[5] Z. Yan, P. Zhang, and T. Virtanen, “Trust evaluation based security solution in ad hoc networks,” in Proc. 7th Nordic Workshop Secure IT Syst., 2003, no. 14, pp. 1–10.

[6] R. Li, J. Li, P. Liu, and J. Kato, “A novel hybrid trust management framework for MANETs,” in Proc. 29th IEEE Int. Conf. Distrib. Comput. Syst. Workshops, 2009, pp.251–256.

[7] Y. Yu, K. Li, W. Zhou, and P. Li, “Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures,” J. Netw. Comput.Appl., vol. 35, no. 3pp, 867–880, 2012.

[8] K. Hoffman, D. Zage, and C. Nita-Rotaru, “A survey of attack and defense techniques for reputation systems,” ACM Comput. Surveys, vol. 42, no. 1, p. 1, 2009.

[9] W. Li, J. Parker, and A. Joshi, “Security through collaboration and trust in MANETs,” Mobile Netw. Appl., vol. 17, no. 3, pp. 342–352, 2012.

[10] J. Luo, X. Liu, and M. Fan, “A trust model based on fuzzy recommendation for mobile ad-hoc networks,” Comput. Netw., vol. 53, no. 14, pp. 2396–2407, 2009.

[11] C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, “E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks,” Ad Hoc Netw., vol. 7, no. 6,pp. 1156–1168, 2009.

[12] P.B.Velloso, R.P.Laufer, D.de O Cunha, O.C.M.Duarte, and G.Pu-jolle, ‘’Trust management in mobile ad hoc networks using a scalable maturity-based model,’’Network and Service Management, IEEE Trans-actions on, 7, (3), pp. 172-185, 2010.

[13] H.Yu, S.Liu, A.C.Kot, C.Miao, and C.Leung, ‘’Dynamic witness selection for trustworthy distributed cooperative sensing in cognitive radio networks’’, Communication Technology (ICCT), 2011 IEEE 13th In-ternational Conference on, pp. 1-6, 2011.

[14] T.Issariyakul and E.Hossain,‘‘Introduction to network simulator NS2,’’Springer, 2011.

Downloads

Published

2025-11-17
CITATION
DOI: 10.26438/ijcse/v6i10.410416
Published: 2025-11-17

How to Cite

[1]
N. Kumari, C. Agrawal, and P. Meena, “Identify And Remove Time And Location Dependent Attack Using Trust Concept for MANETs”, Int. J. Comp. Sci. Eng., vol. 6, no. 10, pp. 410–416, Nov. 2025.

Issue

Section

Research Article