Abstract
A secure routing mechanism is the basis of security in mobile ad hoc networks. Seeing that nodes have to share routing information in order to find the route to the destination, further an ad hoc network is an open setting where everyone can participate, trust is a key concept in secure routing mechanisms. In this paper, we propose a novel opinion based trust evaluation model to detect misbehaving nodes and further securing data transmission by avoiding such node from path selected. Misbehaving nodes are detected based on the node own direct observation, but in the circumstances of network failure as node congestion or collusion a well-behaving node can be misidentified. Therefore we require opinion of other nodes before proceeding to isolation of such misbehaving node. Source nodes maintain a path reliability index associated with each path to the intended destination. The most trustworthy and reliable path is selected by source node for forwarding data packets to the intended destination. We have evaluated the misbehaving node detection rate and the performance of our method along a number of parameters through simulation. Results show that our method increases the throughput of the network while also discovering a secure route.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceeding of Sixth Annual International Conference Mobile Computing and Networking (MobiCom), pp. 255–265. ACM Press, New York (2000)
Michiardi, R., Molva, C.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communication and Multimedia Security Conference, Portoroz, Slovenia (2002)
Buchegger, S., Boudec, J.: Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes—Fairnes. In: Distributed Ad hoc NeTworks. In: Proceeding ACM Workshop Mobile Ad Hoc Networking and Computing, pp. 226–236 (2002, 2006)
Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad hoc networks, Research Report cs. NI/0307012, Stanford University
Pirzada, A.A., Datta, A., McDonald, C.: Propagating trust in ad-hoc networks for reliable routing. In: Proceeding of IEEE International Workshop Wireless Ad Hoc Networks, pp. 58–62 (2004)
Pirzada, A.A., Datta, A., McDonald, C.: Trust-based routing for ad-hoc wireless networks. In: Proceeding of. IEEE International Conference Networks, pp. 326–330 (2004)
Park, S., Al-Shurman, M., Yoo, S.: Black Hole Attack in Mobile Ad hoc Network. In: ACMSE 2004, Huntsville, AL, USA (2004)
Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: Proceedings of the 2003 IEEE Radio and Wireless Conference, Boston, MA, USA, pp. 75–78 (2003)
Back, A.: Hashcash: A Denial of Service Counter-Measure (2002), http://www.hashcash.org
Johnson, D.B., Maltz, D.A., Hu, Y.C., Jetcheva, J.G.: The dynamic source routing protocol for mobile ad hoc networks (DSR). Internet draft IETFRFC 3561 (2003), http://www.ietf.org/rfc/rfc3561.txt
Dijkstra, E.W.: A note on two problems in connection with graphs. Numer. Math., 83–89 (1959)
QUALNET simulator, http://www.scalable-networks.com
IEEE Computer Society LAN MAN Standards Committee, Wireless LANMedium Access Protocol (MAC) and Physical Layer (PHY) Specification,IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, NY (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Poonam, Garg, K., Misra, M. (2011). Opinion Based Trust Evaluation Model in MANETs. In: Aluru, S., et al. Contemporary Computing. IC3 2011. Communications in Computer and Information Science, vol 168. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22606-9_32
Download citation
DOI: https://doi.org/10.1007/978-3-642-22606-9_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22605-2
Online ISBN: 978-3-642-22606-9
eBook Packages: Computer ScienceComputer Science (R0)