Analyzing Trust Categories and Generating Trusted Network Path of MANET using Fuzzy Credibility Distribution Function

Authors

  • Bandyopadhyay S Department of Computer Science & Technology, Dr.B.C.Roy Polytechnic, Durgapur, India
  • Karforma S Department of Computer Science, The University of Burdwan, Burdwan, India

Keywords:

fuzzy credibility distribution, inverse credibility distribution, triangular fuzzy number, membership value

Abstract

Mobile ad-hoc network (MANET) is one of the significant approaches with highly decentralized and dynamic configured architecture. For transferring packets from one node to another node in MANET security is a big challenge. Trust between two consecutive nodes is a prime important factor for secure data transmission through a trusted network path. As we all know trust of any particular node observed by other one varies with time for different constrains. Here we try to depict the variation of trust with fuzzy mathematics where trust value for each node is represented with triangular fuzzy number. Using fuzzy credibility distribution function we convert the triangular fuzzy trust value in interval based form and represent the trust variation in much more reliable format. These interval based trust values are used to generate direct, indirect trust value in interval based matrix format and from them we prepare overall communication trust matrix to generate the secure network path to send data from particular source to destination

References

[1] V.B.Reddy, S.Venkataraman, A. Negi, “Communication and Data Trust for Wireless Sensor Networks using D-S Theory”, IEEE Sensors, Vol. 12, Issue.12, pp.3921 –3929, 2017.

[2] S. Subramaniam, , R. Saravanan, P. K Prakash, “Trust Based Routing to Improve Network Lifetime of Mobile Ad Hoc Networks”, Journal of Computing and Information Technology , Vol. 21, Issue.3, pp.149–160, 2013.

[3] G. Dhananjayan, J.Subbiah, “T2AR : trust-aware ad-hoc routing protocol for MANET”, SpringerPlus, Vol. 5, Issue.1,pp.1-6,2016.

[4] R.Akbani, T.Korkmaz, G. Raju, “ Mobile ad-hoc networks security”, In Recent Advances in Computer Science and Information Engineering, Springer Publisher, Berlin, Heidelberg, pp-659–666,2012.

[5] Theodorakopoulos , J.S. Baras, “On Trust Models and Trust Evaluation Metrics for Ad-hoc Networks”, IEEE Journal on selected Areas in Communications, Vol. 24, Issue.2, pp.318-328,2016.

[6] J.Sen, “A Distributed Trust Management Framework For Detecting Malicious Packet dropping Nodes In a Mobile Ad Hoc Network”, International Journal of Network Security & Its Applications (IJNSA), Vol. 2, Issue.4, pp-92-104,2010.

[7] P. M. Nanaware, S. D. Babar, “ Fuzzy Model for Intrusion Detection using Trust System based Bias Minimization & Application Performance Maximization In MANET”, International Journal of Computer Applications,pp.6-8,2016.

[8] I.Dokmanic , R. Parhizkar , J. Ranieri , M. Vetterli , “Euclidean Distance Matrices: Essential theory, algorithms, and applications”, IEEE Signal Processing Magazine, Vol. 32, Issue.6, pp.12-30, 2015.

[9] S. Bandyopadhyay, S.Karforma,“Improving the Performance of Fuzzy Minimum Spanning Tree based Routing Process through P-Node Fuzzy Multicasting Approach in MANET”, International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.6, pp.16-26, 2018.

[10] H. Yang, , H. Luo, F. Ye, S. W. Lu, L. Zhang, “ Security in Mobile Ad Hoc Networks: Challenges and Solutions” , IEEE Wireless Communications, Vol. 11, Issue.1, pp. 38-47,2004.

[11] Y. Ren, A. and Boukerche, “A trust-based security system for ubiquitous and pervasive computing environments”, Elsevier Journal on Computer Communications, Vol. 31, Issue.18, pp.4343–4351, 2008.

[12] [12] T. Camp, J. Boleng, V. Davies , “A survey of mobility models for ad-hoc network research”, Wireless Communications and Mobile Computing (WCMC): Special Issue Mobile Ad Hoc Network, Vol. 2,pp.483–502, 2002.

Downloads

Published

2025-11-24

How to Cite

[1]
S. Bandyopadhyay and S. Karforma, “Analyzing Trust Categories and Generating Trusted Network Path of MANET using Fuzzy Credibility Distribution Function”, Int. J. Comp. Sci. Eng., vol. 7, no. 1, pp. 274–279, Nov. 2025.