Design of a Compact Circular Microstrip Patch Antenna for WLAN Applications
Authors/Creators
Description
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
Files
11321ijans02.pdf
Files
(639.5 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:d2267b61bdd24d9735a188b772ee383c
|
639.5 kB | Preview Download |
Additional details
Identifiers
Related works
- Documents
- Journal article: https://aircconline.com/ijans/V11N3/11321ijans02.pdf (URL)
Dates
- Copyrighted
-
2021
References
- [1] Gambetta D, (2000), "Trust: Making and Breaking Cooperative Relations", Basil Blackwell, Oxford, UK pp. 213–237. [2] Wang X, Liu L, Su J. Rlm, (2012)," A general model for trust representation and aggregation", IEEE Trans. Serv. Comput, 2012;5:131–143. [3] Pham H.T, Yang B.S, (2010),"Estimation and forecasting of machine health condition using ARMA/GARCH model", Mech Syst Signal Process, 24:546–558. [4] Velloso P, Laufer R, de O Cunha D, Duarte O, Pujolle G, (2010),"Trust management in mobile ad hoc networks using a scalable maturity-based model", IEEE Trans. Netw. Serv. Manag, 7:172–185. [5] Jain S, Baras J, (2013)," Distributed Trust Based Routing in Mobile Ad-Hoc Networks", Proceedings of the IEEE Military Communications Conference (MILCOM); San Diego, CA, USA. 18–20 November 2013; pp. 1801–1807. [6] Desai A, Jhaveri R, (2019)," Secure routing in mobile Ad hoc networks: A predictive approach", Int. J. Inf. Technol 11:345–356. [7] Ghosh U, Datta R, (2015)," A Secure Addressing Scheme for Large-Scale Managed MANETs", IEEE Trans. Netw. Serv. Manag, 12 483–495. [8] Rath M, Panigrahi C.R, (2016),"Prioritization of Security Measures at the Junction of MANET and IoT", Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India. 4–5 March 2016; pp. 1–5. [9] Chiang C.C, Wu H.K, Liu W, Gerla M,(1997)," Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel",Proceedings of the IEEE Singapore International Conference on Networks; Singapore. 14–17, pp. 197–211 [10] Dempster A.P, (2015)," A generalization of Bayesian interface", J. R. Stat. Soc.30:205–447. [11] Josang A, Ismail R, Boyd C,(2007)," A survey of trust and reputation systems for online service provision", Decis Support Syst 43:618–644.