Skip to main content

A Robust Trust Mechanism Algorithm for Secure Power Aware AODV Routing in Mobile Ad Hoc Networks

  • Conference paper
Contemporary Computing (IC3 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 94))

Included in the following conference series:

Abstract

MANET refers to a network formed by a group of wireless mobile nodes that can communicate with each other and also mobile at the same time. MANET is an infrastructure-less network in which all the mobile nodes cooperate with each other in routing packets from source node to the destination nodes, in accordance with some routing protocol. The main goal of this paper is to provide secure energy efficient routing protocol for mobile ad hoc networks, since the critical limiting factors for a mobile node is its operation time, restricted by battery capacity and trusted third party, the absence of which may result in nodes deviating from the routing protocol for selfish or malicious reasons. This paper addresses both these problems in MANETs by proposing a new robust trust mechanism against route misbehavior attacks over energy efficient AODV routing. The performance of the proposed methodology has been studied on simulated environment using JiST-SWANS with ad hoc network comprising of route misbehavior attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Corson, S., Macker, J.: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501, Informational (1999)

    Google Scholar 

  2. Royer, E., Toh, C.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications 6(2), 46–55 (1999)

    Article  Google Scholar 

  3. Broch, J., Hu, Y., Johnson, D., Jetcheva, J., Maltz, D.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 85–97 (1998)

    Google Scholar 

  4. Badache, N., Derhab, A., Djenouri, D.: Ad hoc networks routing protocols and mobility. Int. Arab. J. Inf. Technol. 3(2), 126–133 (2006)

    Google Scholar 

  5. Belding-Royer, E., Das, S., Perkins, C.: Ad hoc On- Demand Distance Vector (AODV) Routing, RFC 3561, Experimental (2003)

    Google Scholar 

  6. Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on Attacks and Countermeasures in Mobile Ad hoc Networks. In: Florida Atlantic University, Wireless/Mobile Network Security, ch. 12. Springer, Heidelberg (2006)

    Google Scholar 

  7. Li, J., Li, R., Kato, J.: Future Trust Management Framework for Mobile Ad Hoc Networks: Security in Mobile Ad Hoc Networks. IEEE Communications Magazine 46(4), 108–114 (2008)

    Article  Google Scholar 

  8. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 164–173 (1996)

    Google Scholar 

  9. Paul, K., Westhoff, D.: Context-Aware Detection of Selfish Nodes in DSR based Ad Hoc Networks. In: Proceedings of IEEE Globecom Conference, Taipeh, Taiwan (2002)

    Google Scholar 

  10. Cho, J.-H., Swami, A.: Towards Trust-based Cognitive Networks: A Sur-vey of Trust Management for Mobile Ad Hoc Networks. In: 14th ICCRTS. U.S. Army Research Laboratory (2008)

    Google Scholar 

  11. Han, Z., L.Sun, Y., Yu, W., J.R.Liu, K.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317 (2006)

    Google Scholar 

  12. Golbeck, J.: Computing with Trust: Definition, Properties, and Algorithms. In: Securecomm and Workshops-Security and Privacy for Emerging Areas in Communications Networks, Baltimore, MD, pp. 1–7 (2006)

    Google Scholar 

  13. Jiang, T., S.Baras, J.: Ant-based Adaptive Trust Evidence Distribution in MANET. In: Proc. 2nd Int’l Conf. on Mobile Distributed Computing Systems Workshops (MDC), Tokyo, Japan, pp. 588–593 (2004)

    Google Scholar 

  14. Theodorakopoulos, S.Baras, J.: On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 24(2), 318–328 (2006)

    Google Scholar 

  15. Wu, H., Shi, C.: A Trust Management Model for P2P File Sharing System. In: International Conference on Multimedia and Ubiquitous Engineering, IEEE Explore 978-0-7695-3134-2/08 (2008)

    Google Scholar 

  16. Fotino, M., Gozzi, A., Cano, J.-C., Calafate, C., De Rango, F., Manzoni, P., Marano, S.: Evaluating Energy Consumption of Proactive and Reactive Routing Protocols in a MANET. In: IFIP International Federation for Information Processing. Wireless Sensor and Adhoc Networks, vol. 248, pp. 119–130. Springer, Heidelberg (2007)

    Google Scholar 

  17. Griffiths, N., Jhumka, A., Dawson, A., Myers, R.: A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks. In: IDC 2008, pp. 105–114 (2008)

    Google Scholar 

  18. Rishiwal, V., Verma, S., Bajpai, S.K.: QoS Based Power Aware Routing in MANETs. International Journal of Computer Theory and Engineering 1(1), 1793–8201 (2009)

    Google Scholar 

  19. Huraj, L., Reiser, H.: VO Intersection Trust in Ad Hoc Grid Environment. In: Proceedings of the 2009 Fifth International Conference on Networking and Services, pp. 456–461 (2009)

    Google Scholar 

  20. http://en.wikipedia.org/wiki/Promiscuous_mode

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gidijala, N.S., Datla, S., Joshi, R.C. (2010). A Robust Trust Mechanism Algorithm for Secure Power Aware AODV Routing in Mobile Ad Hoc Networks. In: Ranka, S., et al. Contemporary Computing. IC3 2010. Communications in Computer and Information Science, vol 94. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14834-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14834-7_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14833-0

  • Online ISBN: 978-3-642-14834-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics