Skip to main content

Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs

  • Conference paper
Intelligent Distributed Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 321))

Abstract

A routing protocol for detection of malicious nodes and selection of most reliable, secure, close to shortest and trustworthy path for routing data packets in Mobile Ad Hoc Networks (MANETs) is introduced. Dynamic Source Routing (DSR) protocol [1] is extended and termed as Energy Efficient Secure Dynamic Source Routing (EESDSR). The protocol is based on an efficient, power aware and distributed trust model that enhances the security of Dynamic Source Routing (DSR) protocol. The model identifies the nodes exhibiting malicious behaviors like: gray hole, malicious topology change behavior, dropping data packets and dropping control packets. Monitoring mechanism is suitable for MANETs as it focuses on power saving, has distributed nature and adaptable to dynamic network topology. The new routing protocol is evaluated using Network Simulator 2 (NS2). Through extensive simulations, it has been proved that EESDSR protocol performs better than the standard DSR protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad-Hoc Wireless Networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, pp. 153–181. Kluwer (1996)

    Google Scholar 

  2. Kukreja, D., Singh, U., Reddy, B.V.R.: A Survey of Trust Based Routing Protocols in MANETs. In: Fourth International Conference on Electronics Computer Technology (ICECT 2012), pp. 537–542. IEEE Press (2012)

    Google Scholar 

  3. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of Sixth Ann. Int’l Conf. Mobile Computing and Networking (MobiCom), pp. 255–265 (2000)

    Google Scholar 

  4. Buchegger, S., Boudec, J.: Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes-Fairness in Distributed Ad Hoc NeTworks. In: Proceedings of IEEE/ACM Workshop Mobile Ad Hoc Networking and Computing (MobiHOC), pp. 226–236 (2002)

    Google Scholar 

  5. Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 12–23. ACM Press (2002)

    Google Scholar 

  6. Deng, H., Li, W., Agrawal, D.P.: Routing Security in Wireless Ad hoc Networks. IEEE Communications Magazine 40(10), 70–75 (2002)

    Article  Google Scholar 

  7. Pirzada, A.A., Datta, A., McDonald, C.: Trust-Based Routing for Ad-Hoc Wireless Networks, pp. 326–330. IEEE (2004)

    Google Scholar 

  8. Wang, C., Yang, X., Gao, Y.: A Routing Protocol Based on Trust for MANETs. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol. 3795, pp. 959–964. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Pirzada, A.A., McDonald, C.: Deploying trust gateways to reinforce dynamic source routing. In: Proceedings of the 3rd International IEEE Conference on Industrial Informatics, pp. 779–784. IEEE Press (2005)

    Google Scholar 

  10. Pirzada, A.A., McDonald, C.: Trust Establishment In Pure Ad-hoc Networks. Wireless Personal Communications 37, 139–163 (2006)

    Article  Google Scholar 

  11. Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317 (2006)

    Article  MATH  Google Scholar 

  12. Chuanhe, H., Yong, C., Wenming, S., Hao, Z.: A Trusted Routing Protocol for Wireless Mobile Ad hoc Networks. In: Conference, I.E.T. (ed.) IET Conference on Wireless, Mobile and Sensor Networks (CCWMSN 2007), pp. 406–409 (2007)

    Google Scholar 

  13. Boukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications 31(18), 4343–4351 (2008)

    Article  Google Scholar 

  14. Raza, I., Hussain, S.A.: Identification of malicious nodes in an AODV pure ad hoc network through guard nodes. Computer Communications 31(9), 1796–1802 (2008)

    Article  Google Scholar 

  15. Zhang, Z.: An Intelligent Scheme of Secure Routing for Mobile Ad Hoc Networks. In: 2nd International Conference on Signal Processing and Communication Systems (ICSPCS), pp. 1–6. IEEE (2008)

    Google Scholar 

  16. Narula, P., Dhurandher, S.K., Misra, S., Woungang, I.: Security in mobile ad-hoc networks using soft encryption and trust based multipath routing. Sci. Direct Comput. Commun. 31, 760–769 (2008)

    Article  Google Scholar 

  17. Ayday, E., Fekri, F.: A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks 8(2), 181–192 (2010)

    Article  Google Scholar 

  18. Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.: Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security 4(4), 212 (2010)

    Article  MathSciNet  Google Scholar 

  19. Halim, I.T.A., Fahmy, H.M.A., El-Din, A.M.B., El-Shafey, M.H.: Agent-based Trusted On-Demand Routing Protocol for Mobile Ad-hoc Networks. In: Wireless Communications Networking and Mobile Computing (WiCOM) (2010)

    Google Scholar 

  20. Wang, J., Liu, Y., Jiao, Y.: Building a trusted route in a mobile ad hoc network considering communication reliability and path length. Journal of Network and Computer Applications 34(4), 1138–1149 (2011)

    Article  Google Scholar 

  21. Dhurandher, S.K., Obaidat, M.S., Verma, K., Gupta, P., Dhurandher, P.: FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems. IEEE Systems Journal 5(2), 176–188 (2011)

    Article  Google Scholar 

  22. Siva Ram Murthy, C., Manoj, B.S.: Ad Hoc Wireless Networks: Architectures and Protocols. Prentice Hall (2004)

    Google Scholar 

  23. Li, Y., Peng, S., Chu, W.: An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks, pp. 199–205. IEEE (2006)

    Google Scholar 

  24. Kukreja, D., Miglani, M., Dhurandher, S.K., Reddy, B.V.R.: Security enhancement by detection and penalization of malicious nodes in wireless networks. In: IEEE International Conference on Signal Processing and Integrated Networks, pp. 275–280 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kukreja, D., Dhurandher, S.K., Reddy, B.V.R. (2015). Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs. In: Buyya, R., Thampi, S. (eds) Intelligent Distributed Computing. Advances in Intelligent Systems and Computing, vol 321. Springer, Cham. https://doi.org/10.1007/978-3-319-11227-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11227-5_8

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11226-8

  • Online ISBN: 978-3-319-11227-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics