Asian Journal of Engineering and Applied Technology (AJEAT)
Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANETAuthor : M. Lalli and J. Lawanya
Volume 7 No.2 July-December 2018 pp 74-79
MANETs are substantially more defenseless to different attacks due to receptiveness in network topology and being endless of a preferred performance in the network. As a result of that, more malicious nodes are regularly intruding without being recognized from the network topology. MANET needs exceptionally particular security techniques to detach the false passage. Also, no single solution is fit into various sorts of the network. The networks perform admirably if the nodes are trusty and act appropriately helpfully. The goal is to enhance the security of the network. This paper begins the new intriguing way to deal with assessing the trustworthiness of the nodes. Fuzzy Trust-based Secured Routing (FTSR) approach presented to deal with a select the trusted route to meet the necessity of the security of the information transmission. In this, the fuzzy logic rule prediction component is adapted to see the future conduct of the node by refreshing the node’s trust. We have additionally broken down the execution measurements, for example, the packet transmission rate, end-to-end delay and average throughput which can likewise increment in most up to date approach.
Mobile Ad Hoc Network, Fuzzy Logic, Fuzzy Trust based Secured Routing, Ad Hoc On-Demand
 Bansal, Meenakshi, Rachna Rajput and Gaurav Gupta, “Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations”, The Internet Society, 1999.
 NeeteshSaxena andNarendra S. Chaudhari, “Message Security in Wireless Networks: Infrastructure based vs. Infrastructureless Networks”,IEEE, 2012.
 Yu, Shuyao, Youkun Zhang, Chuck Song, and Kai Chen, “A security architecture for mobile ad hoc networks”, In Proceedings of APAN Network Research Workshop, Cairns, Australia, 2003.
 Gandhi, R.Jenish and Rutvij H. Jhaveri, “Addressing packet forwarding misbehavior using a trust-based approach in Ad-hoc networks: A survey.”, In Signal Processing And Communication Engineering Systems (SPACES), International Conference on, IEEE, pp. 391-396, 2015.
 Sethi, Srinivas and Siba K. Udgata, “Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks”, Multi-disciplinary
Trends in Artificial Intelligence, Springer, Berlin Heidelberg, pp. 112-123, 2011.
 Marchang, Ningrinla, and Raja Datta, “Light-weight trust-based routing protocol for mobile ad hoc networks”,IETInformation Security,Vol. 6, No. 2, pp. 77-83, 2012.
 Xia, Hui, ZhipingJia, Xin Li, Lei Ju, and Edwin H-M. Sha, “Trust prediction and trust-based source routing in mobile ad hoc networks”,Ad Hoc Networks, Vol. 11, No. 7, pp. 2096-2114, 2013.
 Bar, Radha Krishna, Jyotsna Kumar Mandal and MoirangthemMarjit Singh, “QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack”,Procedia Technology,Vol. 10, pp. 530-537, 2013.
 Biswas, Suparna, Tanumoy Nag and SarmisthaNeogy, “Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET”,In Applications and Innovations in Mobile Computing (AIMoC), IEEE, pp. 157-164, 2014.
 Xia, Hui, ZhipingJia and Edwin H-M. Sha, “Research of trust model based on fuzzy theory in mobile ad hoc networks”,IET Information Security,Vol. 8, No. 2, pp. 88-103, 2013.
 Gandhi, Jenish and RutvijJhaveri, “Energy Efficient Routing Approaches in Ad hoc Networks: A Survey”, In Information Systems Design and Intelligent Applications, Springer,India, pp. 751-760, 2015.