Professional Documents
Culture Documents
Meji Jose
Assistant Professor
Department of Computer Science and Engineering
Nehru College of Engineering and Research Centre Pampady,
Thrissur, India
Abstract
Mobile Ad hoc networks are becoming popular with the advances in wireless technology. In MANET the main issue is the
security management. When it comes to node level a trust scheme is needed for secure transmission of data. We have to ensure
that a minimum trust is guaranteed for each node. In this paper a review is conducted on the basis of a trust model proposed for
MANETs including two methods for trust evaluation, Direct Observation and Indirect Observation. Uncertain reasoning derived
from artificial intelligence used to evaluate the trust values. In direct observation method a node is directly observing the other
node to which it has to send the data. Then calculate the trust value using Bayesian Inference. Indirect observation deals with
observing nodes indirectly from neighbor nodes. Then calculate the trust value using Dempster Shafer Theory. Bayesian
Inference and DST are coming under the field of uncertain reasoning. Values obtained from these two components are combined
to get more accurate trust value. Routing protocol OLSRV2 is used to evaluate the trust model. With this proposed scheme
throughput and packet delivery ratio can be improved.
Keywords: MANET, Trust, Security
_______________________________________________________________________________________________________
I. INTRODUCTION
MANETs are becoming popular with the recent advances in wireless technology. Mainly in military applications MANETs have
become the key communication method. In Mobile Ad hoc networks managing trust is a challenging activity. Especially in this
military environment ensuring security is important. There are many chances for security attacks in MANETs due to its
distinctive features such as infrastructure less nature and distributed pattern. So maintaining a secure communication is an
important research topic.
Basically there are two approaches that can protect MANETs, that are prevention-based and detection-based approaches. For
prevention-based approaches a centralized key infrastructure should be there. The problem arise when this infrastructure is
destroyed then the whole system will become useless. This infrastructure may be the main target of the attackers in military
environment. Even though it can prevent malicious activities there are chances for misbehaviors. Still malicious nodes can
involve in routing activity. Detection-based approaches are the second method of protection. As the name indicates it can detect
malicious activities earlier and resolve it.
In this paper detection-based approach based on the concept of trust is utilized for ensuring the security of mobile ad hoc
networks. Trust can be of two types: a context independent reliability and decision trust. Here trust is considered as a degree of
belief function which says whether a node performs as expected. In a mobile ad hoc network trust of a node can be decide using
two methods: direct observation and indirect observation. Direct observation involves directly observing from an observer node.
With indirect observation a third party is utilized for observation and collection of data and is used in the case in which the
observer node is unable to reach observed node. Then combine the values from these two methods to get more accurate trust
value.
268
Trust Management Scheme in MANET using Uncertain Reasoning and Fuzzy Logic in Trust Model
(IJIRST/ Volume 2 / Issue 02/ 046)
Trust management involves trust establishment, trust update and trust revocation. Establishment is the process of evidence
collection and trust generation. Trust update component updates values according to secure transmission. Revocation component
recall the node with lower trust for the malicious activity.
The difference between this trust model and the existing approaches is the use of uncertain reasoning to calculate the trust
values. Uncertain reasoning coming under the field of artificial intelligence is mainly used in expert systems. Trust value
calculation with direct observation is done using Bayesian Inference. The same in indirect observation is done using Dempster
Shafer Theory. These two methods are coming under uncertain reasoning. The scheme differentiates data packets and control
packets and also prevents dropping packets.
The scheme is then evaluated under the routing protocol OLSRv2. OLSRv2 is a new version of OLSR which inherits some
algorithms from it and has added some new features.
269
Trust Management Scheme in MANET using Uncertain Reasoning and Fuzzy Logic in Trust Model
(IJIRST/ Volume 2 / Issue 02/ 046)
Networking component involves routing schemes responsible for secure routing. It establishes routing paths between the
communicating entities based on the values stored in trust repository. These routing paths are used by the application component
to send the data.
In this equation is the belief function where 0< <1. This formulation is derived from Bayes theorem where x is the
number of packets forwarded successfully and y is the number of packets received successfully. P(x| , y) is the likelihood
function, which is under Binomial distribution.
The method of direct and indirect method in a network is illustrated in fig. 3. If node A has to start a communication session
with node G, then it sends the data to node C. It is then forwarded to node E. At the same time node A overhears the packet send
by node C. Calculation is based on Bayesian Inference. TS is used to denote the trust from direct observation.
270
Trust Management Scheme in MANET using Uncertain Reasoning and Fuzzy Logic in Trust Model
(IJIRST/ Volume 2 / Issue 02/ 046)
Indirect observation deals with collecting information from neighbor nodes. Then applying Dempster Shafer Theory to calculate
the trust value. As illustrated in fig. 3, if node A wants to send data to node E, then it first send data to node C. For this it asks
node B and node D whether the node C can be trusted or not. Then calculates the trust value according too DST.
DST is used to collect the data from several sources and to combine these data. Here also belief function is used.
271
Trust Management Scheme in MANET using Uncertain Reasoning and Fuzzy Logic in Trust Model
(IJIRST/ Volume 2 / Issue 02/ 046)
272
Trust Management Scheme in MANET using Uncertain Reasoning and Fuzzy Logic in Trust Model
(IJIRST/ Volume 2 / Issue 02/ 046)
IX. CONCLUSION
A trust model is introduced to enhance the security in mobile ad hoc networks that includes direct and indirect observation. The
use of uncertain reasoning will provide finest value for the trust variable. Bayesian inference with direct observation and
Dempster Shafer Theory with indirect observation are used to calculate the trust value. Trust assurance using fuzzy logic is
another better method. It registers each node needed for data transmission and sends the data. It ensures a secure transmission.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu Wang, and Peter Mason Security Enhancements for Mobile Ad Hoc networks with Trust Management
Using Uncertain Reasoning, IEEE Trans. On Veh. Tech.,
Y. Sun, W. Yu, Z. Han, and K. J. R. Liu, Information theoretic framework of trust modeling and evaluation for ad hoc networks, IEEE J. Sel. Areas
Commun., vol. 24, no. 2, pp. 305317, 2006.
H. Wu, M. Siegel, R. Stiefelhagen, and J. Yang, Sensor fusion using Dempster-Shafer theory, in Proc. IEEE Instrumentation and
MeasurementTechnology Conf., (Alaska, USA), May 2002.
W. Lou, W. Liu, Y. Zhang, and Y. Fang, SPREAD: improving network security by multipath routing in mobile ad hoc networks, ACM Wireless
Networks, vol. 15, no. 3, pp. 279294, Mar. 2009.
M. J. Probst and S. K. Kasera, Statistical trust establishment in wireless sensor networks, in Proceedings of the 13th International Conference on Parallel
and Distributed Systems, pp. 18, 2007.
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, A quantitative trust establishment framework for reliable data packet delivery in MANETs, in
SASN 05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 110, 2005.
Z. Liu, A. W. Joy, and R. A. Thompson, A dynamic trust model for mobile ad hoc networks, in IEEE International Workshop on Future Trends of
Distributed Computing Systems, FTDCS04, pp. 8085, May 2004.
273