Trust-oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks

Waqas Buksh, Ying Guo, Saleem Iqbal, Kashif Naseer Qureshi, Jaime Lloret

Research output: Contribution to journalArticlepeer-review

Abstract

Flying Ad Hoc Networks (FANETs) are gaining popularity due to its extra-ordinary features in avionics and electronics domain. FANETs are also considered as most powerful weapon in military assets as well as in civil security applications. Due to its infrastructureless design and wireless nature network, some security challenges are overhead that should be overcome before the whole network performance degradation. Malicious nodes are capable of degrading the network throughput and credibility by including false and malicious data. Securing the dynamic network from malicious nodes is a critical issue in infrastructureless environment. In this paper we have purely focused on identification and isolation of malicious node in order to make enhancement in packet delivery rate and maintain the network reliability. To accomplish all these tasks, we have introduced Trust-Oriented Peered Customized Mechanism (TOPCM) to estimate the trust value among flying ad hoc nodes. In this research, we have also eliminated the malicious nodes presence that causes misbehavior and interruption in the network. To demonstrate the effectiveness of our proposed approach we have used Network Simulator NS2 to demonstrate the entire process into simulated environment. Simulated results showed that proposed TOPCM works more effectively and meets our desired expectation. The main contribution of this research is to establish trust among nodes that will be helpful to isolate the malicious nodes and make enhancement in packet delivery rate.

Original languageEnglish
Article numbere4489
JournalTransactions on Emerging Telecommunications Technologies
Volume35
Issue number4
DOIs
Publication statusPublished - Apr 2024
Externally publishedYes

Fingerprint

Dive into the research topics of 'Trust-oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks'. Together they form a unique fingerprint.

Cite this