Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network

The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole atta...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2021-08, Vol.119 (4), p.3673-3697
1. Verfasser: Juneja, Kapil
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3697
container_issue 4
container_start_page 3673
container_title Wireless personal communications
container_volume 119
creator Juneja, Kapil
description The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole attacks. A new Trust aware and fuzzy regulated AODV (TFAODV) protocol is investigated in this work as an improvement over the existing AODV protocol. The session-driven evaluation of stability, communication-delay, and failure-ratio parameters are conducted for evaluating the trust of nodes. The fuzzy rules apply to these parameters for computing the degree of trust. This trust vector isolates the attack-suspected and trustful nodes. The proposed TFAODV protocol used the trustful mobile nodes as the intermediate path nodes. The proposed protocol has been experimented with in the NS2 simulation environment. The analytical results are obtained in terms of PDR ratio, Packet Communication, Loss rate parameters. The comparative results are derived against the AODV, Probabilistic AODV, PDS-AODV, PSAODV, and Juneja et al. protocols. The analysis is performed on different scenarios varied in terms of network density, degree of stability, and the number of attackers. The simulation results ensured the proposed TFAODV protocol has improved the PDR ratio and reduced the communication loss significantly against these state-of-art protocols.
doi_str_mv 10.1007/s11277-021-08426-y
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2565482772</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2565482772</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-c8791659eea3742b91cd9beddb54e27322f8f0962d0b8925c2dee3c4c0c01d823</originalsourceid><addsrcrecordid>eNp9kEtLAzEURoMoWKt_wFXAdTS588hkWUqrQn0gLbgLM5k7OrVOapJpaX-9U0dw5-puzvkuHEIuBb8WnMsbLwRIyTgIxrMYUrY7IgORSGBZFL8ekwFXoFgKAk7JmfdLzjtNwYAs5q71gY22uUM6bff7HZ1s8lWbh9o29AHDuy1pZR19drjBJtQbpC-2DUhvsUHXY3VH2qJeIX3EsLXu45ycVPnK48XvHZLFdDIf37HZ0-39eDRjBiQPzGRSiTRRiHkkYyiUMKUqsCyLJEaQEUCVVVylUPIiU5AYKBEjExtuuCgziIbkqt9dO_vVog96aVvXdC81JGkSZ12UAwU9ZZz13mGl167-zN1OC64P-XSfT3f59E8-veukqJd8Bzdv6P6m_7G-AWwPc90</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2565482772</pqid></control><display><type>article</type><title>Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network</title><source>SpringerLink Journals</source><creator>Juneja, Kapil</creator><creatorcontrib>Juneja, Kapil</creatorcontrib><description>The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole attacks. A new Trust aware and fuzzy regulated AODV (TFAODV) protocol is investigated in this work as an improvement over the existing AODV protocol. The session-driven evaluation of stability, communication-delay, and failure-ratio parameters are conducted for evaluating the trust of nodes. The fuzzy rules apply to these parameters for computing the degree of trust. This trust vector isolates the attack-suspected and trustful nodes. The proposed TFAODV protocol used the trustful mobile nodes as the intermediate path nodes. The proposed protocol has been experimented with in the NS2 simulation environment. The analytical results are obtained in terms of PDR ratio, Packet Communication, Loss rate parameters. The comparative results are derived against the AODV, Probabilistic AODV, PDS-AODV, PSAODV, and Juneja et al. protocols. The analysis is performed on different scenarios varied in terms of network density, degree of stability, and the number of attackers. The simulation results ensured the proposed TFAODV protocol has improved the PDR ratio and reduced the communication loss significantly against these state-of-art protocols.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-021-08426-y</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communication ; Communications Engineering ; Computer Communication Networks ; Engineering ; Networks ; Nodes ; Parameters ; Performance degradation ; Protocol ; Routing (telecommunications) ; Signal,Image and Speech Processing ; Stability analysis ; Trustworthiness</subject><ispartof>Wireless personal communications, 2021-08, Vol.119 (4), p.3673-3697</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c270t-c8791659eea3742b91cd9beddb54e27322f8f0962d0b8925c2dee3c4c0c01d823</cites><orcidid>0000-0002-6351-3351</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-021-08426-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-021-08426-y$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Juneja, Kapil</creatorcontrib><title>Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole attacks. A new Trust aware and fuzzy regulated AODV (TFAODV) protocol is investigated in this work as an improvement over the existing AODV protocol. The session-driven evaluation of stability, communication-delay, and failure-ratio parameters are conducted for evaluating the trust of nodes. The fuzzy rules apply to these parameters for computing the degree of trust. This trust vector isolates the attack-suspected and trustful nodes. The proposed TFAODV protocol used the trustful mobile nodes as the intermediate path nodes. The proposed protocol has been experimented with in the NS2 simulation environment. The analytical results are obtained in terms of PDR ratio, Packet Communication, Loss rate parameters. The comparative results are derived against the AODV, Probabilistic AODV, PDS-AODV, PSAODV, and Juneja et al. protocols. The analysis is performed on different scenarios varied in terms of network density, degree of stability, and the number of attackers. The simulation results ensured the proposed TFAODV protocol has improved the PDR ratio and reduced the communication loss significantly against these state-of-art protocols.</description><subject>Communication</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Engineering</subject><subject>Networks</subject><subject>Nodes</subject><subject>Parameters</subject><subject>Performance degradation</subject><subject>Protocol</subject><subject>Routing (telecommunications)</subject><subject>Signal,Image and Speech Processing</subject><subject>Stability analysis</subject><subject>Trustworthiness</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kEtLAzEURoMoWKt_wFXAdTS588hkWUqrQn0gLbgLM5k7OrVOapJpaX-9U0dw5-puzvkuHEIuBb8WnMsbLwRIyTgIxrMYUrY7IgORSGBZFL8ekwFXoFgKAk7JmfdLzjtNwYAs5q71gY22uUM6bff7HZ1s8lWbh9o29AHDuy1pZR19drjBJtQbpC-2DUhvsUHXY3VH2qJeIX3EsLXu45ycVPnK48XvHZLFdDIf37HZ0-39eDRjBiQPzGRSiTRRiHkkYyiUMKUqsCyLJEaQEUCVVVylUPIiU5AYKBEjExtuuCgziIbkqt9dO_vVog96aVvXdC81JGkSZ12UAwU9ZZz13mGl167-zN1OC64P-XSfT3f59E8-veukqJd8Bzdv6P6m_7G-AWwPc90</recordid><startdate>20210801</startdate><enddate>20210801</enddate><creator>Juneja, Kapil</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-6351-3351</orcidid></search><sort><creationdate>20210801</creationdate><title>Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network</title><author>Juneja, Kapil</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-c8791659eea3742b91cd9beddb54e27322f8f0962d0b8925c2dee3c4c0c01d823</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Communication</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Engineering</topic><topic>Networks</topic><topic>Nodes</topic><topic>Parameters</topic><topic>Performance degradation</topic><topic>Protocol</topic><topic>Routing (telecommunications)</topic><topic>Signal,Image and Speech Processing</topic><topic>Stability analysis</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Juneja, Kapil</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Juneja, Kapil</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2021-08-01</date><risdate>2021</risdate><volume>119</volume><issue>4</issue><spage>3673</spage><epage>3697</epage><pages>3673-3697</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>The existence of a non-cooperative or black hole node as an intermediate node in a mobile network can degrade the performance of the network and affects the trust of neighbor nodes. In this paper, a trust-aware routing protocol is defined for improving the routing reliability against black hole attacks. A new Trust aware and fuzzy regulated AODV (TFAODV) protocol is investigated in this work as an improvement over the existing AODV protocol. The session-driven evaluation of stability, communication-delay, and failure-ratio parameters are conducted for evaluating the trust of nodes. The fuzzy rules apply to these parameters for computing the degree of trust. This trust vector isolates the attack-suspected and trustful nodes. The proposed TFAODV protocol used the trustful mobile nodes as the intermediate path nodes. The proposed protocol has been experimented with in the NS2 simulation environment. The analytical results are obtained in terms of PDR ratio, Packet Communication, Loss rate parameters. The comparative results are derived against the AODV, Probabilistic AODV, PDS-AODV, PSAODV, and Juneja et al. protocols. The analysis is performed on different scenarios varied in terms of network density, degree of stability, and the number of attackers. The simulation results ensured the proposed TFAODV protocol has improved the PDR ratio and reduced the communication loss significantly against these state-of-art protocols.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-021-08426-y</doi><tpages>25</tpages><orcidid>https://orcid.org/0000-0002-6351-3351</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0929-6212
ispartof Wireless personal communications, 2021-08, Vol.119 (4), p.3673-3697
issn 0929-6212
1572-834X
language eng
recordid cdi_proquest_journals_2565482772
source SpringerLink Journals
subjects Communication
Communications Engineering
Computer Communication Networks
Engineering
Networks
Nodes
Parameters
Performance degradation
Protocol
Routing (telecommunications)
Signal,Image and Speech Processing
Stability analysis
Trustworthiness
title Trust-Aware Fuzzy Evaluation Method for Preventive Route Generation in Mobile Network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T07%3A45%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Trust-Aware%20Fuzzy%20Evaluation%20Method%20for%20Preventive%20Route%20Generation%20in%20Mobile%20Network&rft.jtitle=Wireless%20personal%20communications&rft.au=Juneja,%20Kapil&rft.date=2021-08-01&rft.volume=119&rft.issue=4&rft.spage=3673&rft.epage=3697&rft.pages=3673-3697&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-021-08426-y&rft_dat=%3Cproquest_cross%3E2565482772%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2565482772&rft_id=info:pmid/&rfr_iscdi=true