Skip to main content
Log in

Establishing Secure Routing Path Using Trust to Enhance Security in MANET

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Because of versatility and portability brought by remote system made it conceivable in numerous applications. Among all the contemporary remote systems, mobile ad hoc network (MANET) has turned out to be one vital subject because of self arrangement and self upkeep ability. In any case, because of the open medium and dynamic topology MANET is experiencing numerous security powerlessness. Along these lines security is real obstruction in MANET. Trust management is one of the location based system to give security in MANET. Existing methodologies don’t abuse immediate and roundabout perceptions in the meantime to assess put stock in esteem. In many methodologies where circuitous technique is utilized, it comes about into erroneous trust esteem computation. Additionally existing methodologies don’t separate between control parcels and information bundles. Control bundles are more particular than information parcels in MANET. In this way proposed framework is created to upgrade security and also to enhance the execution of the framework. In proposed bound together trust administration conspire, spectator hub figures trust estimation of watched hub utilizing conviction work, Bayesian approach and Dempster Shafer Theory. In proposed conspire coordinate technique recognize assailant hub, hub having low trust esteem is declared as aggressor hub. The proposed plot enhances execution of brought together confide in administration framework.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Loo, J., Lloret, J., & Ortiz, J. H. (2011). Mobile Ad hoc networks: Current status and future trends. Boca Raton: CRC Press.

    Book  Google Scholar 

  2. Guan, Q., Yu, F. R., Jiang, S., & Leung, V. (2012). Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Transactions on Vehicular Technology,61(6), 2674–2685.

    Article  Google Scholar 

  3. Yu, F. R., Tang, H., Bu, S., & Zheng, D. (2013). Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking,2013, 188–190.

    Article  Google Scholar 

  4. Wang, Y., Yu, F. R., Tang, H., & Huang, M. (2014). A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Transactions on Wireless Communications,13(3), 1616–1627.

    Article  Google Scholar 

  5. Sun, Y., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications,24(2), 305–317.

    Article  Google Scholar 

  6. Chapin, J., & Chan, V. W. (2011). The next 10 years of DoD wireless networking research. In Proceedings of IEEE military communications conference (pp. 2155–2245).

  7. Bu, S., Yu, F. R., Liu, P., Manson, P., & Tang, H. (2011). Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Transactions on Vehicular Technology,60(3), 1025–1036.

    Article  Google Scholar 

  8. Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Transactions on Wireless Communications,11, 38–47.

    Article  Google Scholar 

  9. Liu, J., Yu, F. R., Lung, C.-H., & Tang, H. (2009). Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications,8(2), 806–815.

    Article  Google Scholar 

  10. Bu, S., Yu, F. R., Liu, X. P., & Tang, H. (2011). Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Transactions on Wireless Communications,10(9), 3064–3073.

    Article  Google Scholar 

  11. Adjih, C., Raffo, D., & Muhlethaler, P. (2005). Attacks against OLSR: Distributed key management for security. In Presented at the 2nd OLSR Interop/Workshop, Palaiseau, France.

  12. Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Securing mobile ad hoc networks with certificateless public keys. IEEE Transactions on Dependable and Secure Computing,3(4), 386–399.

    Article  Google Scholar 

  13. Fang, Y., Zhu, X., & Zhang, Y. (2009). Securing resource-constrained wireless ad hoc networks. IEEE Wireless Communications,16(2), 24–30.

    Article  Google Scholar 

  14. Yu, F. R., Tang, H., Mason, P., & Wang, F. (2010). A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Transactions on Network and Service Management,7(4), 258–267.

    Article  Google Scholar 

  15. Buchegger, S., & Le Boudec, J.-Y. (2004). A robust reputation system for P2P and mobile ad-hoc networks. In Proceedings of 2nd workshop on economics peer-to-peer systems (pp. 1–6).

  16. Zouridaki, C., Mark, B. L., Hejmo, M., & Thomas, R. K. (2005). A quantitative trust establishment framework for reliable data packet delivery in MANETs. In Proceedings of 3rd ACM workshop on SASN (pp. 1–10).

  17. Buchegger, S., & Le Boudec, J.-Y. (2002). Performance analysis of the confidant protocol. In Proceedings of ACM MobiHoc (pp. 226–236).

  18. Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics,60(3), 1089–1098.

    Article  Google Scholar 

  19. Josang, A., & LoPresti, S. (2004). Analyzing the relationship between risk and trust. In Proceedings of 2nd international conference on trust management (pp. 135–145). Springer, Berlin.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vaishali V. Sarbhukan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sarbhukan, V.V., Ragha, L. Establishing Secure Routing Path Using Trust to Enhance Security in MANET. Wireless Pers Commun 110, 245–255 (2020). https://doi.org/10.1007/s11277-019-06724-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06724-0

Keywords

Navigation