CFP last date
22 April 2024
Reseach Article

Fuzzy Model for Intrusion Detection using Trust System based Bias Minimization & Application Performance Maximization in MANET

Published on July 2016 by Pradnya M. Nanaware, Sachin D. Babar
International Conference on Internet of Things, Next Generation Networks and Cloud Computing
Foundation of Computer Science USA
ICINC2016 - Number 3
July 2016
Authors: Pradnya M. Nanaware, Sachin D. Babar
dcb539ae-fc45-4aa4-9d5d-67e0f3c6205c

Pradnya M. Nanaware, Sachin D. Babar . Fuzzy Model for Intrusion Detection using Trust System based Bias Minimization & Application Performance Maximization in MANET. International Conference on Internet of Things, Next Generation Networks and Cloud Computing. ICINC2016, 3 (July 2016), 6-8.

@article{
author = { Pradnya M. Nanaware, Sachin D. Babar },
title = { Fuzzy Model for Intrusion Detection using Trust System based Bias Minimization & Application Performance Maximization in MANET },
journal = { International Conference on Internet of Things, Next Generation Networks and Cloud Computing },
issue_date = { July 2016 },
volume = { ICINC2016 },
number = { 3 },
month = { July },
year = { 2016 },
issn = 0975-8887,
pages = { 6-8 },
numpages = 3,
url = { /proceedings/icinc2016/number3/25534-4819/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Internet of Things, Next Generation Networks and Cloud Computing
%A Pradnya M. Nanaware
%A Sachin D. Babar
%T Fuzzy Model for Intrusion Detection using Trust System based Bias Minimization & Application Performance Maximization in MANET
%J International Conference on Internet of Things, Next Generation Networks and Cloud Computing
%@ 0975-8887
%V ICINC2016
%N 3
%P 6-8
%D 2016
%I International Journal of Computer Applications
Abstract

The mobile ad-hoc network (MANET) contains various types of mobile nodes. The Trust of the node is an important issue for deciding the behavior of the node. The behavior of the node is in terms of maliciousness of the node. Trust management for MANETs is an active research area. MANET is a collection of nodes that are self-configuring. There is the absence of any centralized control. In MANET, any node can enter and exit from the communication. This paper addresses the performance issue of trust management. Trust management deals in two important areas :trust bias minimization and application performance maximization The paper helps to implement the best trust protocol settings for minimized trust bias and maximize application performance. This paper helps to minimize the trust under the presence of malicious nodes.

References
  1. Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho, "Trust management in mobile ad hoc networks for bias minimization and application performance maximization", Elsevier 2014.
  2. Rajshree Ambatkar, Purnima Selokar, "A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme", IJSR Volume 3 Issue 12, December 2014.
  3. F. Bao, I. R. Chen, M. Chang, J. H. Cho, "Trust-based intrusion detection in wireless sensor networks", in: IEEE Int'l Conf. on Communication, Kyoto, Japan, June 2011, pp. 1-6
  4. M. Blaze, J. Feigenbaum , J. Lacy, "Decentralized trust management", in: IEEE Symposium on Security and Privacy, May 1996, pp. 164-173.
  5. B. J. Chang, S. L. Kuo, "Markov chain trust model for trust value analysis and key management in distributed multicast MANETs", IEEE Trans. Veh. Technol. 58 (4) (2009) 1846-186
  6. Y. Ren, A. Boukerche, "Modeling and managing the trust for wireless and mobile ad-hoc networks", in: IEEE International Conference on Communications, Beijing, China, May 2008, pp. 2129-2133.
  7. J. H. Cho, A. Swami, I. R. Chen, "A survey on trust management for mobile ad hoc networks", IEEE Commun. Surv. Tutorials 13 (4) (2011) 562-583.
  8. Jin-Hee Cho,"Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks" U. S. Army Research Laboratory.
  9. C. Ashok Baburaj, Dr. K. Alagarsamy, "Repetitive Trust Management and Adversary Detection For Delay Tolerant Networks", JATIT 2014.
  10. E. M. Daly, M. Haahr,"Social network analysis for information flow in disconnected delay-tolerant MANETs", IEEE Trans. Mob. Comput. 8 (2009)606-621.
  11. Younghun Chae, Lisa Cingiser DiPippo,Member, IEEE Computer Society," Trust Management for Defending On-Of Attacks",April 2015.
  12. Xiaoyong Li, Feng Zhou, and Junping Du,LDTS:" A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks",June 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Communication Manet Qos Trust Management Malicious Trust Bias Minimization