Open Access Open Access  Restricted Access Subscription or Fee Access

Behaviors–Observations–Beliefs Model for Enhancement Using Cognitive Reasoning

p. Singaravel, B. M. Alaudeen

Abstract


A unified trust management scheme that enhances the security in MANETs using uncertain reasoning, in the existing scheme, the trust model has two components: trust from direct observation and trust from indirect observation. With direct observation from an observer node, the trust value is derived using Bayesian inference, which is a type of uncertain reasoning when the full probability model can be defined. On the other hand, with indirect observation from neighbor nodes of the observer node, the trust value is derived using the Dumpster-Shafer theory, which is another type of uncertain reasoning when the proposition of interest can be derived by an indirect method. Proposed scheme a new trust model based on cognitive reasoning, which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations-Beliefs (BOB) model. These trust values are used for detection and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-OLSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route.

Cite this Article
P. Singaravel, B. M. Alaudeen. Behaviors–Observations–Beliefs Model for Enhancement Using Cognitive Reasoning. Journal of Open Source Developments. 2016; 3(1): 10–18p.


Keywords


Security enhancement, cognitive reasoning, trustworthiness, volatile topology

Full Text:

PDF

References


Guan Q, Yu FR, Jiang S and Leung V. Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Trans. Veh. Tech. 2012; 61:2674–2685p.

Yu F.R, Tang H, Bu S and Zheng D. Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks. EURASIP J. Wireless

Communication. Networking. 2013; 2013(June): 188–190p.

Wang Y, Yu FR, Tang H and Huang M. A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Trans. Wireless Common. 2014; 3:1616–1627p.

Bu S, Yu FR, Liu P, Manson P, Tang H. Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Trans. Veh. Tech. 2011; 60: 1025–1036p.

Adjoin C, Raffi D and Muhlethaler P. Attacks against OLSR: distributed key management for security. in Proc. 2nd OLSR Workshop, (Domaine de Voluceau, France), Dec. 2005.

Zhang Y, Liu W, Lou W and Fang Y. Securing mobile ad hoc networks with certificateless public keys. IEEE Trans. Dependable and Secure Computing. 2006; 3: 386–399p.

Fang Y, Zhu X and Zhang Y. Securing resource-constrained wireless ad hoc networks. IEEE Wireless Comm. 2009; 16(2): 24–30p.

Yu FR, Tang H, Mason P and Wang F. A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Trans. on Network and Service Management. 2010; 7: 258–267p.

Lou W, Liu W, Zhang Y and Fang Y. SPREAD: improving network security by multipath routing in mobile ad hoc networks. ACM Wireless Networks. 2009; 15(3): 279–294p.

Zhang R, Zhang Y and Fang Y. AOS: An anonymous overlay system for mobile ad hoc networks. ACM Wireless Networks. 2011; 17(4): 843–859p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/