As different types of dynamic networks are developed by easy means of devices, people start using them for various means. Such vulnerable networks are easy places to attack and perform malicious activities. This work develops a model that can generate a path from source to destination in a dynamic node environment without prior information. Path generation artificial immune genetic algorithms will be used, as this algorithms find a good path in a short time. In order to detect the malicious activity, such nodes need to be identified. Hence identification of attackers nodes is done by trust model where Adamic Adar trust function finds the mutual trust value of node as epr past performance of nodes.
References
Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inform Forensics Secur 11(9):2013
Wang T, Luo H, Zeng X, Yu Z, Liu A. Sangaiah A. (2020) Mobility based trust evaluation for heterogeneous electric vehicles network in smart cities, IEEE Trans Intell Transp Syst.
Wang T, Cao Z, Wang S, Wang J, Qi l, Liu A, Xie M, Li X. (2020) Privacy-enhanced data collection based on deep learning for internet of vehicles. IEEE Trans Ind Inform 16(10):6663–6672
Wang H, Ma S, Dai H. N, Imran M, Wang T. (2020). Blockchain-based data privacy management with nudge theory in open banking. Futur Gener Comput Syst, 110, 812–823
Li T, Liu W, Wang T, Zhao M, Li X, Ma M (2020) Trust data collections via vehicles joint with unmanned aerial vehicles in the smart internet of things. Trans Emerg Telecommun Technol.
Zhuo C, Luo S, Gan H, Hu J, Shi Z (2019) Noise-Aware DVFS for Efficient Transitions on Battery-Powered IoT Devices. IEEE Trans Comput Aided Des Integr Circuits Syst 2019.
Liu A, Zheng Z, Zhang C, Chen Z, Shen X (2012) Secure and energy-efficient disjoint multi-path routing for WSNs. IEEE Trans Veh Technol 61(7):3255–3265
Xiao B, Yu B, Gao C (2007) CHEMAS: identify suspect nodes in selective forwarding attacks. J Parallel Distributed Comput 67(11):1218–1230
Y. Yu, Z. Jia, W. Tao, B. Xue, and C. Lee, “An efficient trust evaluation scheme for node behavior detection in the internet of things”, Wireless Personal Communications, Vol. 93, No. 2, pp. 571–587, 2017.
H. Hellaoui, A. Bouabdallah, and M. Koudil, “TAS-IoT: Trust-Based Adaptive Security in the IoT”, In: Proc. of the 41st IEEE Conf. on Local Computer Networks, Dubai UAE, pp. 599–602, 2016.
D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X. Wang, “TRM-IoT: A trust management model based on fuzzy reputation for internet of things”, Computer Science and Information Systems, Vol. 8, No. 4, pp. 1207-1228, 2011.
M. Elkhodr and B. Alsinglawi, “Data provenance and trust establishment in the Internet of Things”, Security and Privacy, pp. 1- 11, 2020.
Suryani, S. Sulistyo, and W. Widyawan, “ConTrust: A Trust Model to Enhance the Privacy in Internet of Things”, International Journal of Intelligent Engineering and Systems, Vol. 10, No. 3, pp. 30-37, 2017.
L. M. Carolina and H. K. João “Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme”, International Journal of Distributed Sensor Networks, Vol. No., pp. 1-8, 2015