Friday, July 5, 2019

AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWORKS USING Q-LEARNING

AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWORKS USING Q-LEARNING
S.Sivagurunathan1, K.Prathapchandran2 and A.Thirumavalavan3
1, 2 Department of Computer Science and Applications Gandhigram Rural Institute-Deemed University, Gandhigram-624 302 Tamilnadu, India
3Department of Computer Science Arignar Anna Government Arts College, Attur Tamilnadu, India

ABSTRACT
Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium, multi-hop and dynamic nature, constrained resources, lack of administration and cooperation. Traditionally routing protocols are designed to cope with routing operation but in practice they may be affected by misbehaving nodes so that they try to disturb the normal routing operations by launching different attacks with the intention to minimize or collapse the overall network performance. Therefore detecting a trusted node means ensuring authentication and securing routing can be expected. In this article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical forwarding and responding behaviour by the way misbehaving nodes can be isolated.

KEYWORDS
Mobile Ad hoc Networks Security, Routing, AODV, Historical, Response, Trust, Authentication & Q-Learning 

ORIGINAL SOURCE URL : http://aircconline.com/ijnsa/V8N3/8316ijnsa04.pdf
http://airccse.org/journal/jnsa16_current.html






No comments:

Post a Comment

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #p...