Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network
The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole atta...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2021-08, Vol.119 (4), p.3673-3697 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3697 |
---|---|
container_issue | 4 |
container_start_page | 3673 |
container_title | Wireless personal communications |
container_volume | 119 |
creator | Juneja, Kapil |
description | The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole attacks. A new Trust aware and fuzzy regulated AODV (TFAODV) protocol is investigated in this work as an improvement over the existing AODV protocol. The session-driven evaluation of stability, communication-delay, and failure-ratio parameters are conducted for evaluating the trust of nodes. The fuzzy rules apply to these parameters for computing the degree of trust. This trust vector isolates the attack-suspected and trustful nodes. The proposed TFAODV protocol used the trustful mobile nodes as the intermediate path nodes. The proposed protocol has been experimented with in the NS2 simulation environment. The analytical results are obtained in terms of PDR ratio, Packet Communication, Loss rate parameters. The comparative results are derived against the AODV, Probabilistic AODV, PDS-AODV, PSAODV, and Juneja et al. protocols. The analysis is performed on different scenarios varied in terms of network density, degree of stability, and the number of attackers. The simulation results ensured the proposed TFAODV protocol has improved the PDR ratio and reduced the communication loss significantly against these state-of-art protocols. |
doi_str_mv | 10.1007/s11277-021-08426-y |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2565482772</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2565482772</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-c8791659eea3742b91cd9beddb54e27322f8f0962d0b8925c2dee3c4c0c01d823</originalsourceid><addsrcrecordid>eNp9kEtLAzEURoMoWKt_wFXAdTS588hkWUqrQn0gLbgLM5k7OrVOapJpaX-9U0dw5-puzvkuHEIuBb8WnMsbLwRIyTgIxrMYUrY7IgORSGBZFL8ekwFXoFgKAk7JmfdLzjtNwYAs5q71gY22uUM6bff7HZ1s8lWbh9o29AHDuy1pZR19drjBJtQbpC-2DUhvsUHXY3VH2qJeIX3EsLXu45ycVPnK48XvHZLFdDIf37HZ0-39eDRjBiQPzGRSiTRRiHkkYyiUMKUqsCyLJEaQEUCVVVylUPIiU5AYKBEjExtuuCgziIbkqt9dO_vVog96aVvXdC81JGkSZ12UAwU9ZZz13mGl167-zN1OC64P-XSfT3f59E8-veukqJd8Bzdv6P6m_7G-AWwPc90</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2565482772</pqid></control><display><type>article</type><title>Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network</title><source>SpringerLink Journals</source><creator>Juneja, Kapil</creator><creatorcontrib>Juneja, Kapil</creatorcontrib><description>The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole attacks. A new Trust aware and fuzzy regulated AODV (TFAODV) protocol is investigated in this work as an improvement over the existing AODV protocol. The session-driven evaluation of stability, communication-delay, and failure-ratio parameters are conducted for evaluating the trust of nodes. The fuzzy rules apply to these parameters for computing the degree of trust. This trust vector isolates the attack-suspected and trustful nodes. The proposed TFAODV protocol used the trustful mobile nodes as the intermediate path nodes. The proposed protocol has been experimented with in the NS2 simulation environment. The analytical results are obtained in terms of PDR ratio, Packet Communication, Loss rate parameters. The comparative results are derived against the AODV, Probabilistic AODV, PDS-AODV, PSAODV, and Juneja et al. protocols. The analysis is performed on different scenarios varied in terms of network density, degree of stability, and the number of attackers. The simulation results ensured the proposed TFAODV protocol has improved the PDR ratio and reduced the communication loss significantly against these state-of-art protocols.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-021-08426-y</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communication ; Communications Engineering ; Computer Communication Networks ; Engineering ; Networks ; Nodes ; Parameters ; Performance degradation ; Protocol ; Routing (telecommunications) ; Signal,Image and Speech Processing ; Stability analysis ; Trustworthiness</subject><ispartof>Wireless personal communications, 2021-08, Vol.119 (4), p.3673-3697</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c270t-c8791659eea3742b91cd9beddb54e27322f8f0962d0b8925c2dee3c4c0c01d823</cites><orcidid>0000-0002-6351-3351</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-021-08426-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-021-08426-y$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Juneja, Kapil</creatorcontrib><title>Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole attacks. A new Trust aware and fuzzy regulated AODV (TFAODV) protocol is investigated in this work as an improvement over the existing AODV protocol. The session-driven evaluation of stability, communication-delay, and failure-ratio parameters are conducted for evaluating the trust of nodes. The fuzzy rules apply to these parameters for computing the degree of trust. This trust vector isolates the attack-suspected and trustful nodes. The proposed TFAODV protocol used the trustful mobile nodes as the intermediate path nodes. The proposed protocol has been experimented with in the NS2 simulation environment. The analytical results are obtained in terms of PDR ratio, Packet Communication, Loss rate parameters. The comparative results are derived against the AODV, Probabilistic AODV, PDS-AODV, PSAODV, and Juneja et al. protocols. The analysis is performed on different scenarios varied in terms of network density, degree of stability, and the number of attackers. The simulation results ensured the proposed TFAODV protocol has improved the PDR ratio and reduced the communication loss significantly against these state-of-art protocols.</description><subject>Communication</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Engineering</subject><subject>Networks</subject><subject>Nodes</subject><subject>Parameters</subject><subject>Performance degradation</subject><subject>Protocol</subject><subject>Routing (telecommunications)</subject><subject>Signal,Image and Speech Processing</subject><subject>Stability analysis</subject><subject>Trustworthiness</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kEtLAzEURoMoWKt_wFXAdTS588hkWUqrQn0gLbgLM5k7OrVOapJpaX-9U0dw5-puzvkuHEIuBb8WnMsbLwRIyTgIxrMYUrY7IgORSGBZFL8ekwFXoFgKAk7JmfdLzjtNwYAs5q71gY22uUM6bff7HZ1s8lWbh9o29AHDuy1pZR19drjBJtQbpC-2DUhvsUHXY3VH2qJeIX3EsLXu45ycVPnK48XvHZLFdDIf37HZ0-39eDRjBiQPzGRSiTRRiHkkYyiUMKUqsCyLJEaQEUCVVVylUPIiU5AYKBEjExtuuCgziIbkqt9dO_vVog96aVvXdC81JGkSZ12UAwU9ZZz13mGl167-zN1OC64P-XSfT3f59E8-veukqJd8Bzdv6P6m_7G-AWwPc90</recordid><startdate>20210801</startdate><enddate>20210801</enddate><creator>Juneja, Kapil</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-6351-3351</orcidid></search><sort><creationdate>20210801</creationdate><title>Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network</title><author>Juneja, Kapil</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-c8791659eea3742b91cd9beddb54e27322f8f0962d0b8925c2dee3c4c0c01d823</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Communication</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Engineering</topic><topic>Networks</topic><topic>Nodes</topic><topic>Parameters</topic><topic>Performance degradation</topic><topic>Protocol</topic><topic>Routing (telecommunications)</topic><topic>Signal,Image and Speech Processing</topic><topic>Stability analysis</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Juneja, Kapil</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Juneja, Kapil</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2021-08-01</date><risdate>2021</risdate><volume>119</volume><issue>4</issue><spage>3673</spage><epage>3697</epage><pages>3673-3697</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole attacks. A new Trust aware and fuzzy regulated AODV (TFAODV) protocol is investigated in this work as an improvement over the existing AODV protocol. The session-driven evaluation of stability, communication-delay, and failure-ratio parameters are conducted for evaluating the trust of nodes. The fuzzy rules apply to these parameters for computing the degree of trust. This trust vector isolates the attack-suspected and trustful nodes. The proposed TFAODV protocol used the trustful mobile nodes as the intermediate path nodes. The proposed protocol has been experimented with in the NS2 simulation environment. The analytical results are obtained in terms of PDR ratio, Packet Communication, Loss rate parameters. The comparative results are derived against the AODV, Probabilistic AODV, PDS-AODV, PSAODV, and Juneja et al. protocols. The analysis is performed on different scenarios varied in terms of network density, degree of stability, and the number of attackers. The simulation results ensured the proposed TFAODV protocol has improved the PDR ratio and reduced the communication loss significantly against these state-of-art protocols.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-021-08426-y</doi><tpages>25</tpages><orcidid>https://orcid.org/0000-0002-6351-3351</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0929-6212 |
ispartof | Wireless personal communications, 2021-08, Vol.119 (4), p.3673-3697 |
issn | 0929-6212 1572-834X |
language | eng |
recordid | cdi_proquest_journals_2565482772 |
source | SpringerLink Journals |
subjects | Communication Communications Engineering Computer Communication Networks Engineering Networks Nodes Parameters Performance degradation Protocol Routing (telecommunications) Signal,Image and Speech Processing Stability analysis Trustworthiness |
title | Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T07%3A45%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Trust-Aware%20Fuzzy%20Evaluation%20Method%20for%20Preventive%20Route%20Generation%20in%20Mobile%20Network&rft.jtitle=Wireless%20personal%20communications&rft.au=Juneja,%20Kapil&rft.date=2021-08-01&rft.volume=119&rft.issue=4&rft.spage=3673&rft.epage=3697&rft.pages=3673-3697&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-021-08426-y&rft_dat=%3Cproquest_cross%3E2565482772%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2565482772&rft_id=info:pmid/&rfr_iscdi=true |