Integration of Multi-Class Service Paradigm With Generic Trust Mechanism for Innovation, Customization and Adaptability in MANETs

Integration of Multi-Class Service Paradigm With Generic Trust Mechanism for Innovation, Customization and Adaptability in MANETs

Nitin Khanna, Sandeep Singh, Anshu Bhasin, Kamal Malik
Copyright: © 2022 |Pages: 15
DOI: 10.4018/IJIRR.300290
Article PDF Download
Open access articles are freely available for download

Abstract

Trust-based mechanisms are widely used in wireless networks of different kinds for providing security against attack. Trust mechanism provides security from various attacks using both detective and preventive manner. This paper presents a quality service paradigm that can be integrated with any underlying trust mechanism. The paradigm includes different flags corresponding to different services incorporated in various routing packets. The paradigm provides flexible customization and adaptability as per the demand of communicating nodes for effective data transfer. Various quality service classes are designed to formulate route as per the requirement to minimize the routing overhead and balancing of load among nodes. This paradigm power is the trust mechanism with proactive action for detection of malicious nodes in the network. The proposed paradigm is incorporated in an established trust mechanism and compared with standard version of that trust mechanism for packet delivery ratio and routing overhead.
Article Preview
Top

1. Introduction

With the invention of new technologies, the adaptation of wireless ad-hoc networks has increased to large extent (Zhang et al., 2012), (Moussaoui et al, 2014). The ad-hoc networks have many important applications like WSN, IOT, MANET, VANET and FANET in different fields that attracts the researchers (Triparty et al., 2020), (Jiang et al., 2020), (Chen et al., 2020). Nodes or devices in these types of networks are capable of self-configuration without any centralized control to operate in the network (Mayti et al., 2017). Some networks involve movement of nodes making the network topology highly dynamic (Khan et al., 2017). The communication among nodes in such networks is achieved in multi hop manner. Intermediate nodes are used to set up a route between sender and receiver (Wei et al., 2014). However, these intermediates nodes may be malicious and can attack the network in many different ways in order to hamper communication in the network. Hence, the ad-hoc networks have more security issues than their counterparts.

Various mechanisms like routing based (Gupta et al., 2019), trust based (Huang et al., 2020), cluster based (Subba et al., 2015), sequence number based (Rajesh Babu & Usha, 2016), overhearing based (Kollati & Somasundaram, (2017), cross-layer based (Usha et al.,2017), cryptography and authentication, etc. are used by researchers to enhance the security of wireless ad-hoc networks. Out of all security mechanisms, trust based mechanisms have attracted the researchers more due to their preventive nature, effectiveness, accuracy and scalability. Trust based systems can deal with simple as well as smart or intelligent attacks like co-operative blackhole (Singh et al., (2021) and grayhole attacks (Khanna & Sachdeva, 2019). One more advantage of trust based frameworks is that they can work in collaboration with other mechanisms and integrate seamlessly with base routing protocols to provide all-inclusive security in smart networks (Alnumay et al., 2019).

Trust based mechanisms support both prevention and detection of malicious nodes in a network (Hammamouche et al., 2018), (Zhang et al., 2019). Prevention is achieved through forming routes that are more trustworthy. For detection, trust based mechanisms periodically update the trust value of all the active nodes to detect the malicious nodes. In trust based system, we can continuously observe the performance and behavioural patterns of neighbouring nodes in the network (Bhasin et al., 2020). If any malicious node is found during this periodic check, that node(s) is marked malicious and information related to it is broadcasted in the network and as a result that node becomes isolated in the network. Trust based frameworks enhances the overall performance of network in terms Quality of Service, robustness, packet delivery ratio, and throughput.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 3 Released, 1 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing