Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme for Malicious Adversaries Detection
DOI:
https://doi.org/10.26438/ijcse/v6i10.715721Keywords:
MANETs, Node Taxonomy, Gwet Kappa, Malicious NodesAbstract
There is a growing interest for mobile ad hoc network (MANET) in the recent years for many time-critical applications, such as military applications or during a disaster recovery scenario in a collaborative manner. In this paper, we proposed a Gwet Kappa Trust Factor-Based Repeated Node Taxonomy Scheme (GKRNTS) for malicious adversaries node detection which focuses on the discrimination of mobile nodes into malicious and benevolent nodes. The interactions between the mobile nodes are periodically monitored and the elucidated data are useful for determining the degree of collaboration between the mobile nodes through the computation of Gwet Kappa. The Gwet Kappa parameter used in this Repeated Node Taxonomy Scheme is stored with each node as an adjacency matrix that stores the interaction activity between the nodes of the network. This adjacency matrix quantifies the extent of cooperation existing between the mobile nodes of the network and they are considered as the taxonomy of the mobile nodes during data communication. The proposed GKRNTS is compared against the TPFPPDM and NPDRDS techniques by simulation using NS2 network simulator has led to promising results in terms of reduced packet rate, energy consumption and computational cost
References
[1] Shailja Sharma , “A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network”, International Journal of Scientific Research in Network Security and Communication, Vol.6 , Issue.2 , pp.66-69, Apr-2018.
[2] Jaya, S and X. Deepak, “ An Improved Naïve Bayes classifier for Intrusion DetectionSystem”, International Journal of Innovations & Advancement in Computer Science, vol. 5, no.6, pp-128-134, 2016.
[3] Mitrokotsa, A., and Dimitrakakis, C., Intrusion detection in MANET using classification algorithms: The effects of cost and model selection, Journal of Ad Hoc Networks, 11(1), pp. 226-237, 2013.
[4] Youngseok Lee ; Ilkyu Park ; Yanghee Choi(2002),Improving TCP performance in multipath packet forwarding networks . Journal of Communications and Networks , Vol. 4(2)., pp 148 - 157 .
[5] Rebecca M. Warner,(1992) Dimensions of social interaction tempo: A factor analytic study of time and frequency domain indexes of interaction structure, The Journal of Psycholinguistic Research., Vol 21(3)., pp 173–191.
[6] K. Ravikumar, V. Manikandan , “Detection of Node Capture Attack in Wireless Sensor Networks”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6 , Issue.4 , pp.56-61, Aug-2018 .
[7] M. Natkaniec ; A.R. Pach (2000),An analysis of the influence of the threshold parameter on the IEEE 802.11 network performance , IEEE Wireless Communications and Networking Conference. Vol (3)., pp 23–28.
[8] Albers, P., Camp, O., Percher, J. M., Jouga, B., Me, L., and Puttini, R. S., Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches, Journal of Wireless Information Systems, pp. 1-12, 2002.
[9] Ishay Weissman,(2007), Confidence intervals for the threshold parameter, Journal of communications in statistics , Vol 1, pp 549-557 .
[10] Gopalakrishnan, S., and Kumar, P. M. (2016). Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET. Circuits and Systems, 07(06), pp 748-758.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
