Vol.73, No.2, 2022, pp.3497-3512, doi:10.32604/cmc.2022.029072
OPEN ACCESS
ARTICLE
TMTACS: Two-Tier Multi-Trust-Based Algorithm to Countermeasure the Sybil Attacks
  • Meena Bharti1,*, Shaveta Rani2, Paramjeet Singh2
1 Department of Computer Science and Engineering, I. K. Gujral Punjab Technical University, Kapurthala, 144603, Punjab, India
2 Department of Computer Science and Engineering, Maharaja Ranjit Singh Punjab Technical University, Bathinda, 151001, Punjab, India
* Corresponding Author: Meena Bharti. Email:
Received 23 February 2022; Accepted 10 April 2022; Issue published 16 June 2022
Abstract
Mobile Ad hoc Networks (MANETs) have always been vulnerable to Sybil attacks in which users create fake nodes to trick the system into thinking they’re authentic. These fake nodes need to be detected and deactivated for security reasons, to avoid harming the data collected by various applications. The MANET is an emerging field that promotes trust management among devices. Transparency is becoming more essential in the communication process, which is why clear and honest communication strategies are needed. Trust Management allows for MANET devices with different security protocols to connect. If a device finds difficulty in sending a message to the destination, the purpose of the communication process won’t be achieved and this would disappoint both that device and all of your devices in general. This paper presents, the Two-Tier Multi-Trust based Algorithm for Preventing Sybil Attacks in MANETs (TMTACS). The TMTACS provides a two-tier security mechanism that can grant or revoke trust in the Nodes of the MANET. It’s a smart way to identify Sybil nodes in the system. A proficient cluster head selection algorithm is also defined, which selects cluster head efficiently and does load balancing to avoid resource consumption from a single node only. Also, for routing efficient path is selected to deteriorate energy consumption and maximize throughput. The recent technique is compared with Secured QoS aware Energy Efficient Routing (SQEER), Adaptive Trust-Based Routing Protocol (ATRP), and Secure Trust-Aware Energy-Efficient Adaptive Routing (STEAR) in terms of Packet Delivery Ratio (PDR), consumption of energy etc. The simulation was performed on MATrix LABoratory (MATLAB) and the results achieved by the present scheme are better than existing techniques.
Keywords
Malicious node; sybil attack; MANET; trust management; security
Cite This Article
M. Bharti, S. Rani and P. Singh, "Tmtacs: two-tier multi-trust-based algorithm to countermeasure the sybil attacks," Computers, Materials & Continua, vol. 73, no.2, pp. 3497–3512, 2022.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.