Published April 29, 2026 | Version v1
Journal article Open

Design of a Compact Circular Microstrip Patch Antenna for WLAN Applications

Description

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.

Files

11321ijans02.pdf

Files (639.5 kB)

Name Size Download all
md5:d2267b61bdd24d9735a188b772ee383c
639.5 kB Preview Download

Additional details

Related works

Dates

Copyrighted
2021

References

  • [1] Gambetta D, (2000), "Trust: Making and Breaking Cooperative Relations", Basil Blackwell, Oxford, UK pp. 213–237. [2] Wang X, Liu L, Su J. Rlm, (2012)," A general model for trust representation and aggregation", IEEE Trans. Serv. Comput, 2012;5:131–143. [3] Pham H.T, Yang B.S, (2010),"Estimation and forecasting of machine health condition using ARMA/GARCH model", Mech Syst Signal Process, 24:546–558. [4] Velloso P, Laufer R, de O Cunha D, Duarte O, Pujolle G, (2010),"Trust management in mobile ad hoc networks using a scalable maturity-based model", IEEE Trans. Netw. Serv. Manag, 7:172–185. [5] Jain S, Baras J, (2013)," Distributed Trust Based Routing in Mobile Ad-Hoc Networks", Proceedings of the IEEE Military Communications Conference (MILCOM); San Diego, CA, USA. 18–20 November 2013; pp. 1801–1807. [6] Desai A, Jhaveri R, (2019)," Secure routing in mobile Ad hoc networks: A predictive approach", Int. J. Inf. Technol 11:345–356. [7] Ghosh U, Datta R, (2015)," A Secure Addressing Scheme for Large-Scale Managed MANETs", IEEE Trans. Netw. Serv. Manag, 12 483–495. [8] Rath M, Panigrahi C.R, (2016),"Prioritization of Security Measures at the Junction of MANET and IoT", Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India. 4–5 March 2016; pp. 1–5. [9] Chiang C.C, Wu H.K, Liu W, Gerla M,(1997)," Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel",Proceedings of the IEEE Singapore International Conference on Networks; Singapore. 14–17, pp. 197–211 [10] Dempster A.P, (2015)," A generalization of Bayesian interface", J. R. Stat. Soc.30:205–447. [11] Josang A, Ismail R, Boyd C,(2007)," A survey of trust and reputation systems for online service provision", Decis Support Syst 43:618–644.