Open Access Open Access  Restricted Access Subscription Access

Secure Data Transmission in Integrated Internet MANETs Based on Effective Trusted Knowledge Algorithm


Affiliations
1 B. S. Abdur Rahman University, Seethakathi Estate, Vandalur, Chennai – 600048, Tamil Nadu, India
 

The communication between mobile node and fixed node is achieved through the Integrated Internet MANET (IIM) with the help of the gateway by increasing the application domain of mobile ad hoc network. The wireless channel and dynamic nature of Mobile Ad hoc Networks (MANETs) experiences integrated MANETs to suffer from security susceptibility. Methods/Analysis: An untrustworthy mobile node can harm the data and adversely affect the communication between a mobile node and a fixed node in IIM. In this manner, examining the trust level impacts the certainty with which an element may decide for information transmission. In order to provide a secure data transmission we are proposing an Effective Trusted Knowledge Algorithm (ETKA) that calculates the nodes trust. Findings: The proposed algorithm has two phases for finding the trusted node. In the first phase, observing the nodes in promiscuous mode, in the second phase, the effective trust value is calculated by hybrid method. Improvement: Through extensive simulation analysis, we can come to an end that the developed mechanism leads to a successful methodology towards security and protection of data from untrusted nodes in integrated internet and MANET.

Keywords

Integrated Internet MANET, Promiscuous Mode, Trusted Table, Trust Value.
User

Abstract Views: 225

PDF Views: 0




  • Secure Data Transmission in Integrated Internet MANETs Based on Effective Trusted Knowledge Algorithm

Abstract Views: 225  |  PDF Views: 0

Authors

C. Atheeq
B. S. Abdur Rahman University, Seethakathi Estate, Vandalur, Chennai – 600048, Tamil Nadu, India
M. Munir Ahamed Rabbani
B. S. Abdur Rahman University, Seethakathi Estate, Vandalur, Chennai – 600048, Tamil Nadu, India

Abstract


The communication between mobile node and fixed node is achieved through the Integrated Internet MANET (IIM) with the help of the gateway by increasing the application domain of mobile ad hoc network. The wireless channel and dynamic nature of Mobile Ad hoc Networks (MANETs) experiences integrated MANETs to suffer from security susceptibility. Methods/Analysis: An untrustworthy mobile node can harm the data and adversely affect the communication between a mobile node and a fixed node in IIM. In this manner, examining the trust level impacts the certainty with which an element may decide for information transmission. In order to provide a secure data transmission we are proposing an Effective Trusted Knowledge Algorithm (ETKA) that calculates the nodes trust. Findings: The proposed algorithm has two phases for finding the trusted node. In the first phase, observing the nodes in promiscuous mode, in the second phase, the effective trust value is calculated by hybrid method. Improvement: Through extensive simulation analysis, we can come to an end that the developed mechanism leads to a successful methodology towards security and protection of data from untrusted nodes in integrated internet and MANET.

Keywords


Integrated Internet MANET, Promiscuous Mode, Trusted Table, Trust Value.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i47%2F132469