Open Access iconOpen Access

ARTICLE

TMTACS: Two-Tier Multi-Trust-Based Algorithm to Countermeasure the Sybil Attacks

by Meena Bharti1,*, Shaveta Rani2, Paramjeet Singh2

1 Department of Computer Science and Engineering, I. K. Gujral Punjab Technical University, Kapurthala, 144603, Punjab, India
2 Department of Computer Science and Engineering, Maharaja Ranjit Singh Punjab Technical University, Bathinda, 151001, Punjab, India

* Corresponding Author: Meena Bharti. Email: email

Computers, Materials & Continua 2022, 73(2), 3497-3512. https://doi.org/10.32604/cmc.2022.029072

Abstract

Mobile Ad hoc Networks (MANETs) have always been vulnerable to Sybil attacks in which users create fake nodes to trick the system into thinking they’re authentic. These fake nodes need to be detected and deactivated for security reasons, to avoid harming the data collected by various applications. The MANET is an emerging field that promotes trust management among devices. Transparency is becoming more essential in the communication process, which is why clear and honest communication strategies are needed. Trust Management allows for MANET devices with different security protocols to connect. If a device finds difficulty in sending a message to the destination, the purpose of the communication process won’t be achieved and this would disappoint both that device and all of your devices in general. This paper presents, the Two-Tier Multi-Trust based Algorithm for Preventing Sybil Attacks in MANETs (TMTACS). The TMTACS provides a two-tier security mechanism that can grant or revoke trust in the Nodes of the MANET. It’s a smart way to identify Sybil nodes in the system. A proficient cluster head selection algorithm is also defined, which selects cluster head efficiently and does load balancing to avoid resource consumption from a single node only. Also, for routing efficient path is selected to deteriorate energy consumption and maximize throughput. The recent technique is compared with Secured QoS aware Energy Efficient Routing (SQEER), Adaptive Trust-Based Routing Protocol (ATRP), and Secure Trust-Aware Energy-Efficient Adaptive Routing (STEAR) in terms of Packet Delivery Ratio (PDR), consumption of energy etc. The simulation was performed on MATrix LABoratory (MATLAB) and the results achieved by the present scheme are better than existing techniques.

Keywords


Cite This Article

APA Style
Bharti, M., Rani, S., Singh, P. (2022). TMTACS: two-tier multi-trust-based algorithm to countermeasure the sybil attacks. Computers, Materials & Continua, 73(2), 3497-3512. https://doi.org/10.32604/cmc.2022.029072
Vancouver Style
Bharti M, Rani S, Singh P. TMTACS: two-tier multi-trust-based algorithm to countermeasure the sybil attacks. Comput Mater Contin. 2022;73(2):3497-3512 https://doi.org/10.32604/cmc.2022.029072
IEEE Style
M. Bharti, S. Rani, and P. Singh, “TMTACS: Two-Tier Multi-Trust-Based Algorithm to Countermeasure the Sybil Attacks,” Comput. Mater. Contin., vol. 73, no. 2, pp. 3497-3512, 2022. https://doi.org/10.32604/cmc.2022.029072



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1268

    View

  • 789

    Download

  • 0

    Like

Share Link