Abstract
Because of versatility and portability brought by remote system made it conceivable in numerous applications. Among all the contemporary remote systems, mobile ad hoc network (MANET) has turned out to be one vital subject because of self arrangement and self upkeep ability. In any case, because of the open medium and dynamic topology MANET is experiencing numerous security powerlessness. Along these lines security is real obstruction in MANET. Trust management is one of the location based system to give security in MANET. Existing methodologies don’t abuse immediate and roundabout perceptions in the meantime to assess put stock in esteem. In many methodologies where circuitous technique is utilized, it comes about into erroneous trust esteem computation. Additionally existing methodologies don’t separate between control parcels and information bundles. Control bundles are more particular than information parcels in MANET. In this way proposed framework is created to upgrade security and also to enhance the execution of the framework. In proposed bound together trust administration conspire, spectator hub figures trust estimation of watched hub utilizing conviction work, Bayesian approach and Dempster Shafer Theory. In proposed conspire coordinate technique recognize assailant hub, hub having low trust esteem is declared as aggressor hub. The proposed plot enhances execution of brought together confide in administration framework.
Similar content being viewed by others
References
Loo, J., Lloret, J., & Ortiz, J. H. (2011). Mobile Ad hoc networks: Current status and future trends. Boca Raton: CRC Press.
Guan, Q., Yu, F. R., Jiang, S., & Leung, V. (2012). Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Transactions on Vehicular Technology,61(6), 2674–2685.
Yu, F. R., Tang, H., Bu, S., & Zheng, D. (2013). Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking,2013, 188–190.
Wang, Y., Yu, F. R., Tang, H., & Huang, M. (2014). A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Transactions on Wireless Communications,13(3), 1616–1627.
Sun, Y., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications,24(2), 305–317.
Chapin, J., & Chan, V. W. (2011). The next 10 years of DoD wireless networking research. In Proceedings of IEEE military communications conference (pp. 2155–2245).
Bu, S., Yu, F. R., Liu, P., Manson, P., & Tang, H. (2011). Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Transactions on Vehicular Technology,60(3), 1025–1036.
Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Transactions on Wireless Communications,11, 38–47.
Liu, J., Yu, F. R., Lung, C.-H., & Tang, H. (2009). Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications,8(2), 806–815.
Bu, S., Yu, F. R., Liu, X. P., & Tang, H. (2011). Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Transactions on Wireless Communications,10(9), 3064–3073.
Adjih, C., Raffo, D., & Muhlethaler, P. (2005). Attacks against OLSR: Distributed key management for security. In Presented at the 2nd OLSR Interop/Workshop, Palaiseau, France.
Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Securing mobile ad hoc networks with certificateless public keys. IEEE Transactions on Dependable and Secure Computing,3(4), 386–399.
Fang, Y., Zhu, X., & Zhang, Y. (2009). Securing resource-constrained wireless ad hoc networks. IEEE Wireless Communications,16(2), 24–30.
Yu, F. R., Tang, H., Mason, P., & Wang, F. (2010). A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Transactions on Network and Service Management,7(4), 258–267.
Buchegger, S., & Le Boudec, J.-Y. (2004). A robust reputation system for P2P and mobile ad-hoc networks. In Proceedings of 2nd workshop on economics peer-to-peer systems (pp. 1–6).
Zouridaki, C., Mark, B. L., Hejmo, M., & Thomas, R. K. (2005). A quantitative trust establishment framework for reliable data packet delivery in MANETs. In Proceedings of 3rd ACM workshop on SASN (pp. 1–10).
Buchegger, S., & Le Boudec, J.-Y. (2002). Performance analysis of the confidant protocol. In Proceedings of ACM MobiHoc (pp. 226–236).
Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics,60(3), 1089–1098.
Josang, A., & LoPresti, S. (2004). Analyzing the relationship between risk and trust. In Proceedings of 2nd international conference on trust management (pp. 135–145). Springer, Berlin.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sarbhukan, V.V., Ragha, L. Establishing Secure Routing Path Using Trust to Enhance Security in MANET. Wireless Pers Commun 110, 245–255 (2020). https://doi.org/10.1007/s11277-019-06724-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06724-0