Optimized Fuzzy System Dependent Trust Score for Mobile AdHoc Network

  • PDF / 1,319,484 Bytes
  • 15 Pages / 439.37 x 666.142 pts Page_size
  • 71 Downloads / 238 Views

DOWNLOAD

REPORT


Optimized Fuzzy System Dependent Trust Score for Mobile AdHoc Network Kavitha Thangaraj1 · Dejey Dharma1 Accepted: 11 November 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Mobile Ad-Hoc Network (MANET) consist a numerous nodes and these nodes are structured with remote transceivers. These nodes forward the message with one another by getting to the typical channel. In MANET, security is the principle challenge to be analyzed. Due to the behaviour of malevolent nodes, the network security is weakened. Along these lines, the significant goal of this research is to enhance the network security by detecting the malevolent nodes. So, for the detection of malevolent node, an effective trust management method is presented in this paper. Improving the trust score the optimized fuzzy framework is proposed. For enhancing the execution of the fuzzy framework, the triangular membership function of the input parameters is improved with the Cat Swarm Optimization. After estimating the trust score for every node in the network, threshold depend decision module is processed for detecting the activity of malevolent nodes. Implementation results illustrate that the execution of the proposed model achieves maximum network lifetime and minimum energy consumption. Keywords  MANET · Detection of malevolent node · Trust management · Optimized fuzzy system and cat swarm optimization (CSO)

1 Introduction MANET is a sort of remote mobile communication network made out of intelligent identicalness mobile nodes with remote transceiver [1]. It doesn’t depend on any default infrastructure, yet through the coordinated effort among the mobile nodes with constrained communication degree to keep up the system availability and understand the data transform [2–4]. Its attributes are as per the following: self-organizing, mobility, distributed control, multi-hop, wireless, limited calculation ability, dynamic topology and limited link bandwidth. Since MANET has the attributes of adaptable utilizing, fast systems administration and solid power, and so on. It very well may be broadly utilized in the field of non * Kavitha Thangaraj [email protected] Dejey Dharma [email protected] 1



Department of CSE, Anna University Regional Campus, Tirunelveli, Tamil Nadu, India

13

Vol.:(0123456789)



K. Thangaraj, D. Dharma

military personnel crisis salvage; therapeutic wellbeing observing and military battlefield rescue [5–7], and so forth. Be that as it may, the attributes of MANET make the system progressively defenseless against malevolent attacks. So it is imperative to guarantee the information security of MANET. Such malevolent attacks in the MANET [8] are for the most part because of the poor physical security efforts. Since the MANET is immensely helpless against simple insertion of cooperative node and malevolent nodes by attackers, a routing table is sustained in the system. On account of the distributed architecture in MANET with none of the controlling gear, similar to access points or routers, it is