{"title":"基于无线网络的军事环境中检测黑洞攻击的认证与可信AODV (ATAODV)路由协议","authors":"Prathapchandran Kannimuthu","doi":"10.4018/IJITN.2021040105","DOIUrl":null,"url":null,"abstract":"In this paper, an authenticated and trusted AODV (ATAODV) routing protocol is proposed to identify and eliminate the black attack and form the trusted route in MANET-based military environments. The aim is to provide two-level security by mapping the multi-agent system (MAS). The first level focuses on providing authentication by identifying blackhole soldiers/devices, and the second level focuses on forming a trusted path between the origin and the endpoint communication. The authentication is achieved by aggregated trust (AT), which is calculated based on the reputation, closeness, and energy by aggregated trust design agent (ATDA). Then, forming a trusted route between the source and the destination is achieved by combining route aggregated trust (RAT), which is calculated based on AT and hop count (HC). The trusted route is formed by a routing agent (RA). The simulation results demonstrate that the ATAODV routing protocol is performing well and shows improved results compared with the existing routing protocols.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Authenticated and Trusted AODV (ATAODV) Routing Protocol to Detect Blackhole Attack in MANET-Based Military Environments\",\"authors\":\"Prathapchandran Kannimuthu\",\"doi\":\"10.4018/IJITN.2021040105\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, an authenticated and trusted AODV (ATAODV) routing protocol is proposed to identify and eliminate the black attack and form the trusted route in MANET-based military environments. The aim is to provide two-level security by mapping the multi-agent system (MAS). The first level focuses on providing authentication by identifying blackhole soldiers/devices, and the second level focuses on forming a trusted path between the origin and the endpoint communication. The authentication is achieved by aggregated trust (AT), which is calculated based on the reputation, closeness, and energy by aggregated trust design agent (ATDA). Then, forming a trusted route between the source and the destination is achieved by combining route aggregated trust (RAT), which is calculated based on AT and hop count (HC). The trusted route is formed by a routing agent (RA). The simulation results demonstrate that the ATAODV routing protocol is performing well and shows improved results compared with the existing routing protocols.\",\"PeriodicalId\":120331,\"journal\":{\"name\":\"Int. J. Interdiscip. Telecommun. Netw.\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Interdiscip. Telecommun. Netw.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/IJITN.2021040105\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Interdiscip. Telecommun. Netw.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/IJITN.2021040105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authenticated and Trusted AODV (ATAODV) Routing Protocol to Detect Blackhole Attack in MANET-Based Military Environments
In this paper, an authenticated and trusted AODV (ATAODV) routing protocol is proposed to identify and eliminate the black attack and form the trusted route in MANET-based military environments. The aim is to provide two-level security by mapping the multi-agent system (MAS). The first level focuses on providing authentication by identifying blackhole soldiers/devices, and the second level focuses on forming a trusted path between the origin and the endpoint communication. The authentication is achieved by aggregated trust (AT), which is calculated based on the reputation, closeness, and energy by aggregated trust design agent (ATDA). Then, forming a trusted route between the source and the destination is achieved by combining route aggregated trust (RAT), which is calculated based on AT and hop count (HC). The trusted route is formed by a routing agent (RA). The simulation results demonstrate that the ATAODV routing protocol is performing well and shows improved results compared with the existing routing protocols.