Skip to main content

Trust Oriented Secured AODV Routing Protocol against Rushing Attack

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

Abstract

This research aims to identify the security threats in on-demand routing protocol, AODV for Ad-hoc network. In this context we have extended the AODV protocol with trust and recommendation to secure the network. In AODV, establishment of routing path depends on the faster route request and route reply packets. Rushing attacker exploits such faster traversal activities to attack the network. Firstly, rushing attackers are identified based on their misbehavior in comparison to other nodes of the network. Furthermore, trust value is assigned to the misbehaving node and the same is augmented with other aspects of trust like dependency pattern, context, previous history and dynamicity. Finally, based on threshold value of trust, trust evaluating node takes the decision to include or not to include the trustee node in routing path depending on the final trust value. To facilitate the trust computation and decision of our trust model, AODV is enhanced with different functional modules: Node Manager, Trust Module and Decision Manager. Lastly, AODV secures the routing path by isolating the rushing attacker, based on their trust value. Our analysis and simulation results show the effectiveness of our proposal against rushing attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Menaka, A., Pushpa, M.E.: Menaka Pushpa, A.: Trust Based Secure Routing in AODV Routing Protocol. In: IMSAA, Bangalore, pp. 1–6 (2009)

    Google Scholar 

  2. Xiu, D., Liu, Z.: A Formal Definition for Trust in Distributed Systems. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 482–489. Springer, Heidelberg (2005)

    Google Scholar 

  3. De Rango, F., Marano, S.: Trust-based SAODV Protocol with Intrusion Detection and Incentive Cooperation in MANET. In: IWCMC 2009, Leipzig, Germany (2009)

    Google Scholar 

  4. Li, J., Moh, T.-S., Moh, M.: Path-Based Reputation System for MANET Routing. In: van den Berg, H., Heijenk, G., Osipov, E., Staehle, D. (eds.) WWIC 2009. LNCS, vol. 5546, pp. 48–60. Springer, Heidelberg (2009)

    Google Scholar 

  5. Meka, K.D., Virendra, M., Upadhyaya, S.: Trust Based Routing Decisions in Mobile Ad-hoc Networks. CiteSeerX (2009)

    Google Scholar 

  6. Ayachi, M.A., Bidan, C., Abbes, T., Bouhoula, A.: Misbehavior Detection using Implicit Trust Relations in the AODV Routing Protocol. In: International Conference on Computational Science and Engineering (2009)

    Google Scholar 

  7. Uddin, M.G., Zulkernine, M.: A Trust Monitoring Architecture for Service Based Software. Springer Science+Business Media, LLC (2009)

    Google Scholar 

  8. Neisse, R., Wegdam, M., van Sinderen, M., Lenzini, G.: Trust Management Model and Architecture for Context-Aware Service Platforms. Springer, Heidelberg (2007)

    Google Scholar 

  9. Basagni, S., Conti, M., Giordano, S., Stojmenovic, I.: Mobile Ad Hoc Networking (ch. 10). A John Wiley & Sons, Inc.

    Google Scholar 

  10. Hu, Y., Perrig, A., Johnson, D.B.: Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocol. In: WISE 2003, San Diego, California, USA, September 19 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Swarnali Hazra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hazra, S., Setua, S.K. (2012). Trust Oriented Secured AODV Routing Protocol against Rushing Attack. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_79

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_79

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics