0% found this document useful (0 votes)
3 views

Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes

2024 IEEE Transaction on All Domains For More Details::Contact::K.Manjunath - 09535866270 http://www.tmksinfotech.com and http://www.bemtechprojects.com 2024 and 2025 IEEE Projects@ TMKS Infotech,Bangalore

Uploaded by

Manju Nath
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes

2024 IEEE Transaction on All Domains For More Details::Contact::K.Manjunath - 09535866270 http://www.tmksinfotech.com and http://www.bemtechprojects.com 2024 and 2025 IEEE Projects@ TMKS Infotech,Bangalore

Uploaded by

Manju Nath
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Blockchain-Based Trust and Authentication Model

for Detecting and Isolating Malicious Nodes in Flying


Ad Hoc Networks
ABSTRACT

Flying Ad Hoc Networks (FANET) is an emerging area of research due to its low
cost, high coverage and fast transmission features. In these networks, the flying
nodes are connected with ground stations and communicate wirelessly, especially
when the networks are congested and complex. Due to mobility, and lack of
predefined infrastructure, these networks have suffered from various security and
trust issues. The traditional trust and security solutions are designed for ground
networks and are not feasible for these networks. This paper proposes a trust and
authentication model including Trust Establishment Mechanism for FANET (TEM-
FANET) and authentication system by using Block-chain method. The trust is
calculated to evaluate the node’s trust status and ensure the existence of the
trustworthy nodes by using direct, indirect, and cumulative trust values. Whereas the
authentication system is utilizing blockchain technology for nodes authentication and
evaluate its feasibility. The proposed model is lightweight and able to monitor
the node’s behavior and compute the trusted quality and broadcast the node status
with neighbor nodes. The proposed model is also integrated with ground stations for
record keeping and decision-making processes. The proposed model is evaluated in
simulation with state-of-the-art trust solutions where the results show the better
performance in terms of overhead, data delivery, node detection rate, and
computational time.
EXISTING SYSTEM

Authors in [6], proposed a Fuzzy-based novel trust model to handle the node’s
behavior and then classified the nodes using multicriteria fuzzy classification. The
usage of Artificial Intelligence (AI) is also discussed to tackle security attacks and
monitor the country’s borders. The proposed solution also manages and predicts the
disaster performed rescue operation to save lives and property and carry
transportation.

In [17], the authors proposed a novel trust model by using a genetic algorithm for
trust evaluation. To provide secure data communication and trust evaluation, the
authors designed the trust model by using a genetic algorithm and minimized the
weight of different values-based parameters to check the direct trust values of nodes
for secure data communication. Direct trust is aggregated with the recommendation
to evaluate the final trust values of nodes. After this, all nodes that produced the
trusted values come under one group or class, and the others that produced the
variant values come in the risky class and assessment based on risk assessment class.
If a malicious node is found, it can easily separate from regular nodes by using this
direct trust list. However, more than the direct trust evaluation is needed to calculate
the trust of nodes because indirect and cumulative trust is important, especially in
FANET networks.

In another study [18], the authors proposed a trust evaluation model for FANET
networks. The proposed model is designed by using the lightweight and efficient
trust mechanism for secure data communication. The nodes formed a secure self-
organized network and facilitated the users with different applications. Security and
trust are the major challenges due to the open nature of these networks. These
networks need more resources for processing power, battery, and coverage. The
attackers easily enter the network and make a node untrustworthy to imitate the
attacks in the network. Different types of trust and security solutions have been
designed to address security and trust matters. However, the traditional solutions are
different from FANET’s special requirements.

Authors in [19], designed a Trust Based Clustering Scheme (TBCS) by using the
clustering technique for secure data communication. The coordination and
cooperation among nodes are considered an evaluation criterion by adopting the trust
concept. The trust is evaluated based on inter node organization and collaboration for
balance and better data flow. The interaction between nodes is based on the trust
evaluation results of nodes. The proposed solution distinguishes the node’s
incompatibility and interruptions to improve the data reliability.

Authors in [20], proposed a unique Cumulative Trust analysis-based economical


Technique (CTBET) by focusing on various viewpoints on the implementation and
governance of safety in edge-based IoT networks. The projected CTBET is designed
based on the cumulative trust concept and direct and indirect trust values among the
available paths between the sender and the recipient nodes.

Authors in [21], adopted a blockchain-based method to ensure network security. The


blockchain is a decentralized mechanism to secure the network from any kind of
malicious nodes. This method protects the network and ensures data security from
unauthorized and malicious node activities. The blockchain decentralized method
ensures the security of the network and protects the network from security breaches.
The proposed solution is also able to handle the ground stations when notified by the
network with any node tempering detection.
Authors in [22], proposed a Drone Assisted Internet of Vehicles (TPDA-IoV) for
data routing, drone nodes, and trust evaluation. The proposed solution is based on
three modules: drone communication, drone-to-vehicle communication, and trust
evaluation. The proposed solution is to work with flying and ground zones and
ensure nodes’ trust by using a route discovery strategy. The trustworthiness is
evaluated by using the packet evaluation metrics. Based on the drone’s behavior, the
trust value is calculated by the increment and decrement of trust values.

Disadvantages
An existing trust evaluation solutions use any single or two factors, like direct or
indirect trust to evaluate the node’s trustworthiness. Most solutions have been
developed for ground networks or fixed devices like cloud or edge servers.

In an existing system, the system didn't calculate the trust value of drone nodes and
finds the more trustworthy routes for data forwarding. The trust model identifies the
malicious or selfish node status in the network and updates the status in the network.
The proposed trust model contains four main phases including the attack model, trust
analysis model, and trust decision model.

Proposed System
This paper proposed a trust Establishment Mechanism for FANET (TEM-FANET) to
tackle internal and external attacks, monitor or judge the nodes, prevent the network
from malicious nodes, and eliminate such nodes from the network. The proposed
solution provides the best and most secure path to the drones for data combination.
the proposed trust evaluation model design and development phases discuss in the
detailed process. The proposed model calculates the trust value of drone nodes and
finds the more trustworthy routes for data forwarding. The trust model identifies the
malicious or selfish node status in the network and updates the status in the network.
The proposed trust model contains four main phases including the attack model, trust
analysis model, and trust decision model. The first attack model is used to initiate the
internal attacks to identify the selfish and malicious nodes. The trust decision model
is used to analyze the node’s behavior and store all the data for further analysis. All
the recorded data is further forwarded towards the trust decision model to rectify
and identify the malicious and selfish nodes in the network. This model is also useful
to decide the trustworthy path for data communication in the presence of an attack
model. After completing the process from three models, the next and last process is
broadcasting the malicious nodes updates in the network. All the information is
stored in routing tables for reliable and feasible data communication. The proposed
system shows the proposed trust model’s four modules.

Advantages
To calculate the trust values of the nodes and isolate the malicious nodes from the
network
• To broadcast the node’s status about malicious nodes in FANET and ground
networks.
• To keep a record of malicious and untrustworthy nodes for future reference
• To authenticate the FANET nodes by using Blockchain technology
• The proposed TEM-FANET model is evaluated in terms of false positive rate,
malicious nodes detection rate, data throughput, data delay and blocktime.

SYSTEM REQUIREMENTS

➢ H/W System Configuration:-

➢ Processor - Pentium –IV


➢ RAM - 4 GB (min)
➢ Hard Disk - 20 GB
➢ Key Board - Standard Windows Keyboard
➢ Mouse - Two or Three Button Mouse
➢ Monitor - SVGA

Software Requirements:
 Operating System - Windows XP
 Coding Language - Java/J2EE(JSP,Servlet)
 Front End - J2EE
 Back End - MySQL

You might also like