Search or add a thesis

Advanced Search (Beta)
Home > Securing Routing in Mobile Adhoc Networks Manets Form Insider Attackers Through Trust Management

Securing Routing in Mobile Adhoc Networks Manets Form Insider Attackers Through Trust Management

Thesis Info

Access Option

External Link

Author

Zakirullah

Program

PhD

Institute

University of Engineering and Technology

City

Taxila

Province

Punjab

Country

Pakistan

Thesis Completing Year

2019

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/10916/1/Zakirullah%20PhD%20Thesis.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727830689

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Routing, having focal responsibility in MANET’s successful operation, are based on the assumption of nodes’ cooperation. However, this assumption exposes routing to various insider attackers. These attackers are the legal participants having privileged access to network when inducing attacks on routing. Furthermore, these insider attackers are either in the form of selfish nodes or malicious nodes. The motive of selfish node is saving its resources by not cooperating in routing activities whereas the purpose of malcious node is to attack the network. Therefore, providing security in routing against affirmed attackers has emerged a challenging issue in MANETs. In research community, trust management schemes are used to defend routing against insider attackers. The very focus of this research is to develop a trust management scheme for securing routing from insider attackers to launch blackhole and greyhole attacks. We proposed a trust management scheme, named as MT-SECURER (“Multi Factors Trust for Secure and Reliable Routing in MANETs”), for making routing secure against insider attackers (i.e., blackhole and greyhole attackers). This scheme develops trust from multiple factors, i.e., “node’s cooperation” from communication networks and “node’s relationship maturity” and “mutual friends” from social networks. Whereas for trust development, nodes’ personal observations along with neighbours’ recommendations are utilized. Neighbors’ recommendations, having a pivotal role in computation of trust, if hampered may entail in colossal attacks from dishonest trust recommenders such as “bad mouthing”, “ballot stuffing” and “random opinion”. Therefore, mitigation of dishonest trust recommendations has emerged as a stimulating research issue in trust management systems. In order to cater these challenges associated with dishonest trust recommendations, a technique named “intelligently Selection of Trust Recommendations based on Dissimilarity factor (iSTRD)” has been devised. iSTRD exploits observer node’s personal experience in conjunction with majority vote of the recommenders for removing dishonest trust recommendations. For performance analysis, MT-SECURER is used with AODV and DSR routing protocols and detail simulations are performed in order to examine the proposed scheme’s effectiveness in presence of blackhole and greyhole attackers and nodes’ mobility. The experimental results show significant improvement in “detection rate”, “packet delivery ratio”, throughput and “normalized routing load” with slightly increased “average end-to-end delay” when compared to contemporary schemes. Furthermore, iSTRD successfully removes the trust recommendations of “low trustworthyrecommenders” aswellasdishonesttrustrecommendationsof“highlytrustworthy recommenders”. Its efficacy is evident from enhanced accuracy of “recognition rate”, “false rejection” and “false acceptance”. Moreover, experiential results depict that iSTRD has unprecedented performance compared to contemporary techniques in presence of “bad mouthing”, “ballot stuffing” and “random opinion” attacks.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

پروفیسر رائز ڈوڈ

پروفیسر رائزڈوڈ

            اسی ماہ میں عالمِ تاریخ کا سب سے بڑا حادثہ پروفیسر رائزڈوڈ کی موت ہے، پروفیسر مرحوم سنسکرت، تاریخِ ہند قدیم اور عہدِ بودھ کے مستند عالم تھے۔ آپ کی zbogogid خاصی دقتِ نظر سے دیکھی جاتی ہے۔ ۱۸۴۷؁ء میں پیدا ہوئے تھے۔

(فروری ۱۹۲۳ء)

 

بیسویں صدی عیسوی میں تحریک اسلامی کے اہداف و نتائج: ایک تجزیاتی مطالعہ

After new Government in July 2018 in Pakistan term Riyasat e Madina has been surrounded without knowing its spirit. However, it is required to know that this slogan in not new and this dream is much old by revolutionists. Five different revolutionary parties work being examined and depicted that different path is being used by different parties with same slogan. But two parties in sub content chosen path of Muhammad SAW. One of them is already successful named MUJADDAD ALF SANI and another one is still on the way to choose Path of Muhammad SAW, named Dr. ISRAR AHMED. Main target for success is to choose Self-purification, contact with ancestors, target is eternal life and always give importance to internal purification instead of provocation.

شاہ ولی اللہ کی فقہی، معاشرتی اور تصوفانہ افکار: تحقیقی جائزہ

This research project encompasses the entire aspects of Shah Waliullah's thoughts in the domain of Islamic Jurisprudence (FIQHA), Social and Mysticism in a very logical and analytical approach, highlighting their utility in developing of a progressive and harmonious society. The research work has been developed systematically and chronologically in five chapters. Chapter-I discusses the complete biography of Shah Waliullah's with his academic and linguistic career and his pioneering role in renaissances of Islam in the sub continent. In Chapter-II the focus is made on contemporary position and status of Politics, socio-economic and Mysticism of the era of Shah Waliullah of 18th century as a revolutionary changed of period. It was a time of adversaries and general decline of national level. Chapter-III elaborates with detail of the Islamic Jurisprudence (FIQHA) and prominent sources of Islam i.e. QURAN, SUNNAH, IJMA, QIAS and other authentic sources of Sharia. The legal and constitutional uses of these sources have also been highlighted for the well being of the progressive society. Chapter-IV is purely related with the philosophical and developmental stages of the field of socials evaluation in the vision of Shah Waliullah. It has also been concluded that how to provide smooth and social justice to members of various community and nations. Moreover the complete political management system have also been diagnosed. In Chapter-V focus has been made on two different theories of existence i.e. VVAHDAT-UL-VVUJOOD (unity of existence of IBN-ARABI) and (WAHADAT-UL-SHUJOOD (unity of manifestation) which was put forward by Ahmad-Sirhindi. In the back drop of these two doctrines Shah Waliullah's specific theory in this regard introduced. In this chapter irregularities and adversaries in the society have also been discussed and the remedial measures for their satisfaction have been suggested in the field of Sufisim. Moreover, the significance and influences of inner human spiritual power has been explored and considered extremely helpful on satisfying the members of the Muslim society. So, the present comprehensive research reflects the past Islamic cultural heritage as well as the vision for the future. As an eminent scholar Shah Waliullah's thought study resulted in his distinguishness bridging so many gaps and help in solving much of the persisting confusion in relevant disciplines viz Islamic Fiqha, Socials and Mysticsm.