International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 134

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015


Dynamically Adaptive Recommender Filtering Scheme to Defend against Dishonest Recommenders in a MANET

Shirina Samreen, Dr. G. Narsimha


Abstract: Trust management frameworks play a very important role in securing the mobile ad hoc networks against various insider attacks that could occur during data forwarding. The success of a trust management framework greatly depends upon the proper design of each of its major components including the direct trust computation component as well as the indirect trust computation component. Specifically, the indirect trust computation component should be robust to handle the dishonest recommendations. In this paper, we propose a novel and effective scheme used to design a robust indirect trust computation component called as RecommFilter which can overcome the various attacks caused by dishonest recommendations. Four components namely, Recommendation Selection module, Recommendation Filtering module, Recommendation Evaluation module and Recommendation Trust Update module work in close collaboration to filter out the dishonest recommendations and protect against slandering attacks, bad-mouthing attacks as well as collusive attacks. The novelty of the proposed scheme is that it employs a combination of personal experience based approach as well as majority rule based approach wherein the Selection Module using the personal experiences involves a multi-dimensional trust represented using the Dempster Shafer Theory of evidences and the filtering module using the majority rule involves a clustering based approach performed through an opinion similarity measure computed using the Jousselmes distance between two basic probability assignments (bpa). Experimental results show that the proposed scheme is robust to different dishonest recommendation attacks and accurate in the detection of dishonest recommenders.


Keywords: Mobile Ad hoc Networks, Trust Management framework, Dempster Shafer Theory, Dishonest Recommenders, Slandering attack, Self-promoting attack, Collusion attack, Recommendation Filtering, Jousselmes distance, Opinion Similarity measure


Edition: Volume 4 Issue 5, May 2015,


Pages: 388 - 398


How to Cite this Article?

Shirina Samreen, Dr. G. Narsimha, "Dynamically Adaptive Recommender Filtering Scheme to Defend against Dishonest Recommenders in a MANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB154139, Volume 4 Issue 5, May 2015, 388 - 398

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Mobile Ad hoc Networks'

Downloads: 102

Review Papers, Computer Science & Engineering, India, https://www.ijsr.net/issue.php?edition=Volume%204%20Issue%202,%20February%20201

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2391 - 2394

Securing Mobile Ad-Hoc Network by Discovering and Verifying Neighborhood

Pranita D. Pandit, Prof. Pranjali Deshmukh

Share this Article

Similar Articles with Keyword 'Collusion attack'

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2371 - 2374

Survey on Data Aggregation Technique for Wireless Sensor Networks based on IF algorithm

Anagha Jagtap, M. D. Ingle

Share this Article

Downloads: 118

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1374 - 1377

Group Formation with Neighbour Similarity Trust in P2P E-Commerce

M. Robin Rutherford, V. Dheepa

Share this Article

Similar Articles with Keyword 'Mobile'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'Ad'

Downloads: 174

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 136 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Similar Articles with Keyword 'hoc'

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'Networks'

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Similar Articles with Keyword 'Trust'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'Management'

Downloads: 105 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'framework'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Similar Articles with Keyword 'Dempster'

Downloads: 106

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2171 - 2174

A Revised Approach on Attack Identification and Handling in WSN

Seema Khokher

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar

Share this Article

Similar Articles with Keyword 'Shafer'

Downloads: 106

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2171 - 2174

A Revised Approach on Attack Identification and Handling in WSN

Seema Khokher

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar

Share this Article

Similar Articles with Keyword 'Theory'

Downloads: 39

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1663 - 1668

PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM

Muneeb Manzoor Bhat, Preeti Sondhi

Share this Article

Downloads: 104 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2523 - 2525

Study of Semantic Retrieval by Data Similarity of Trademarks

Deepak Mali, P. D. Lambate

Share this Article

Similar Articles with Keyword 'attack'

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Similar Articles with Keyword 'Collusion'

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2371 - 2374

Survey on Data Aggregation Technique for Wireless Sensor Networks based on IF algorithm

Anagha Jagtap, M. D. Ingle

Share this Article

Downloads: 106

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 781 - 785

Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks

P. Harikrishna, K. V. Srinivasa Rao

Share this Article

Similar Articles with Keyword 'Recommendation'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1068 - 1070

Predicting the Course Knowledge Level of Students using Data Mining Techniques

Thapaswini P S

Share this Article

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 1118 - 1123

Music Recommendation System

Nipun Prakash Gupta, Durgesh Kumar

Share this Article

Similar Articles with Keyword 'Filtering'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this Article

Downloads: 39

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1663 - 1668

PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM

Muneeb Manzoor Bhat, Preeti Sondhi

Share this Article

Similar Articles with Keyword 'distance'

Downloads: 34

Research Paper, Computer Science & Engineering, Syria, Volume 10 Issue 3, March 2021

Pages: 524 - 528

Detection and Classification of Skin Cancer using Image Processing Techniques

Maha Shawish, Balsam Eid

Share this Article

Downloads: 67

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 262 - 265

Data Gathering Optimization Using ACO and Genetic Algorithm in WSN

Shabir Ur Rashid, Mrigana Walia

Share this Article

Similar Articles with Keyword 'Opinion'

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1213 - 1218

Sentiment Analysis of Twitter Data to Analyze the Acceptance of Aadhaar

Aarushi Thakral, Vasantha W. B.

Share this Article

Downloads: 101 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Similar Articles with Keyword 'Similarity'

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 1118 - 1123

Music Recommendation System

Nipun Prakash Gupta, Durgesh Kumar

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2297 - 2299

Measuring and Comparing Semantic Structure of Ontology

Nirmitee N. Kurhekar, Prof. L. J. Sankpal

Share this Article

Similar Articles with Keyword 'measure'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 939 - 945

Load Balancing in Cloud Computing Using Optimization Algorithm

Manpreet Kaur, Dr. Amandeep Kaur

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 915 - 920

Calibration Software: Performance Analysis

Prasad Rajendra Kumbhar, Anil R. Surve, Shailender Shekhawat

Share this Article
Top