Skip to main content

Opinion Based Trust Evaluation Model in MANETs

  • Conference paper
Contemporary Computing (IC3 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 168))

Included in the following conference series:

  • 1148 Accesses

Abstract

A secure routing mechanism is the basis of security in mobile ad hoc networks. Seeing that nodes have to share routing information in order to find the route to the destination, further an ad hoc network is an open setting where everyone can participate, trust is a key concept in secure routing mechanisms. In this paper, we propose a novel opinion based trust evaluation model to detect misbehaving nodes and further securing data transmission by avoiding such node from path selected. Misbehaving nodes are detected based on the node own direct observation, but in the circumstances of network failure as node congestion or collusion a well-behaving node can be misidentified. Therefore we require opinion of other nodes before proceeding to isolation of such misbehaving node. Source nodes maintain a path reliability index associated with each path to the intended destination. The most trustworthy and reliable path is selected by source node for forwarding data packets to the intended destination. We have evaluated the misbehaving node detection rate and the performance of our method along a number of parameters through simulation. Results show that our method increases the throughput of the network while also discovering a secure route.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceeding of Sixth Annual International Conference Mobile Computing and Networking (MobiCom), pp. 255–265. ACM Press, New York (2000)

    Chapter  Google Scholar 

  2. Michiardi, R., Molva, C.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communication and Multimedia Security Conference, Portoroz, Slovenia (2002)

    Google Scholar 

  3. Buchegger, S., Boudec, J.: Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes—Fairnes. In: Distributed Ad hoc NeTworks. In: Proceeding ACM Workshop Mobile Ad Hoc Networking and Computing, pp. 226–236 (2002, 2006)

    Google Scholar 

  4. Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad hoc networks, Research Report cs. NI/0307012, Stanford University

    Google Scholar 

  5. Pirzada, A.A., Datta, A., McDonald, C.: Propagating trust in ad-hoc networks for reliable routing. In: Proceeding of IEEE International Workshop Wireless Ad Hoc Networks, pp. 58–62 (2004)

    Google Scholar 

  6. Pirzada, A.A., Datta, A., McDonald, C.: Trust-based routing for ad-hoc wireless networks. In: Proceeding of. IEEE International Conference Networks, pp. 326–330 (2004)

    Google Scholar 

  7. Park, S., Al-Shurman, M., Yoo, S.: Black Hole Attack in Mobile Ad hoc Network. In: ACMSE 2004, Huntsville, AL, USA (2004)

    Google Scholar 

  8. Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: Proceedings of the 2003 IEEE Radio and Wireless Conference, Boston, MA, USA, pp. 75–78 (2003)

    Google Scholar 

  9. Back, A.: Hashcash: A Denial of Service Counter-Measure (2002), http://www.hashcash.org

  10. Johnson, D.B., Maltz, D.A., Hu, Y.C., Jetcheva, J.G.: The dynamic source routing protocol for mobile ad hoc networks (DSR). Internet draft IETFRFC 3561 (2003), http://www.ietf.org/rfc/rfc3561.txt

  11. Dijkstra, E.W.: A note on two problems in connection with graphs. Numer. Math., 83–89 (1959)

    Google Scholar 

  12. QUALNET simulator, http://www.scalable-networks.com

  13. IEEE Computer Society LAN MAN Standards Committee, Wireless LANMedium Access Protocol (MAC) and Physical Layer (PHY) Specification,IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, NY (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Poonam, Garg, K., Misra, M. (2011). Opinion Based Trust Evaluation Model in MANETs. In: Aluru, S., et al. Contemporary Computing. IC3 2011. Communications in Computer and Information Science, vol 168. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22606-9_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22606-9_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22605-2

  • Online ISBN: 978-3-642-22606-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics