ABSTRACT
Security in infrastructure-less networks like MANETs (Mobile Ad Hoc Networks) has proven to be a challenging task. Inherently secure routing protocols is a must for operational continuity of such networks. A number of secure routing protocols based on trust have recently been proposed. These protocols use the traditional route discovery model where along with normal nodes misbehaving nodes also participate in the route discovery process to incapacitate the network. To avoid the participation of misbehaving nodes, a secure and efficient route to destination can be calculated using weighted average of the number of nodes in the route and their trust values. However, the challenge is to minimize overhead of the above weighted average based routing technique while ensuring good throughput.
In this paper we propose efficient trust based multi-path dynamic source routing protocol (TMDSR). Unlike previous approaches which are based on broadcast and hence ignore the path from one hop neighbor of destination, the protocol proposed in this paper consider such path as it uses unicasting of route discovery packet from one hop neighbor of destination. Results show that our method increases the throughput of the network while minimizing the routing overhead.
- Poonam, Garg, K., and Misra, M. 2010. Trust based multi path DSR protocol. In Proceedings of Fifth International Conference on Availability, Reliability and Security (ARES), (Poland, February, 2010).Google Scholar
- Johnson, D. B., Maltz, D. A., Hu, Y. C. and Jetcheva, J. G. 2003. The dynamic source routing protocol for mobile ad hoc networks (DSR). Internet draft IETF RFC 3561, http://www.ietf.org/rfc/rfc3561.txt.Google Scholar
- Marti, S., Giuli, T. J., Lai, K. and Baker, M. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In Proceeding of Sixth Annual International Conference Mobile Computing and Networking (MobiCom). ACM Press, New York, NY, 255--265. Google ScholarDigital Library
- Pirzada, A. A., Datta, A. and McDonald, C. 2004. Propagating trust in ad-hoc networks for reliable routing. In Proceeding of IEEE International Workshop Wireless Ad Hoc Networks (Finland, 2004). 58--62.Google ScholarCross Ref
- Pirzada, A. A., Datta, A. and McDonald, C. 2004. Trust-based routing for ad-hoc wireless networks. In Proceeding of. IEEE International Conference Networks (Singapore, 2004). 326--330.Google Scholar
- Wang, C., Yang, X. and Gao, Y. 2005. A Routing Protocol Based on Trust for MANETs. In Proceeding of Sixth Annual International Conference on Grid and Cooperative Computing (Beijing, China). Lecture notes in computer science, vol. 3795, 959--964. Google ScholarDigital Library
- Pissinou, N., Ghosh, T. and Makki, K. 2004. Collaborative trust-based secure routing in multihop ad hoc networks. Networking (Athens, Greece 2004). Lecture Notes in Computer Science, vol. 3042, 1446--1451. Google ScholarDigital Library
- Buchegger, S. and Boudec, J. 2002. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes---Fairness in Distributed Ad hoc NeTworks. In Proceeding ACM Workshop Mobile Ad Hoc Networking and Computing (Switzerland, 2006). 226--236. Google ScholarDigital Library
- Garfinkel, S. 1995 PGP: Pretty Good Privacy. O'Reilly and Associates. Google ScholarDigital Library
- Yong, C., Chuanhe, H. and Wenming, S. 2007. Trusted Dynamic Source Routing Protocol. IEEE International Conference on Wireless Communications, Networking and Mobile Computing, (WiCom 2007), 1632--1636.Google Scholar
- Narula, P., Dhurandher, S. K., Misra, S. and Woungang, I. 2007. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Elsevier Journal of Computer Communications, 760--769. Google ScholarDigital Library
- Haniotakis, T., Tragoudas, S. and Kalapodas, C. 2004. Security enhancement through multiple path transmission in ad hoc networks. IEEE Communications Society, 4187--4191.Google Scholar
- Zhou, L. and Haas, Z. J. 1999. Securing ad hoc networks IEEE Network Magazine, vol. 13, no. 6. Google ScholarDigital Library
- QUALNET simulator, Available from: <http://www.scalable-networks.com>.Google Scholar
- Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C. and Jetcheva, J. G. 1998 A performance comparison of multihop wireless ad hoc network routing protocols. In proceeding of International Conference Mobile Computing and Networking (MobiCom), ACM Press, 85--97. Google ScholarDigital Library
Index Terms
- Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes
Recommendations
Misbehaving nodes detection through opinion based trust evaluation model in MANETs
ICWET '11: Proceedings of the International Conference & Workshop on Emerging Trends in TechnologyRouting protocols are the binding force in mobile ad hoc network (MANETs) since they facilitate communication beyond the wireless transmission range of the nodes. However, the infrastructure-less, pervasive, and distributed nature of MANETs renders them ...
Trust based multi-path routing for end to end secure data delivery in manets
SIN '10: Proceedings of the 3rd international conference on Security of information and networksMobile Ad Hoc Networks (MANETs) are comprised of highly mobile nodes that communicate with each other without relying on a pre-existing network infrastructure. Therefore they are ideally suited for use in rescue and emergency operations. These ...
Authenticated routing for ad hoc networks protocol and misbehaving nodes
TELE-INFO'05: Proceedings of the 4th WSEAS International Conference on Telecommunications and InformaticsIn this paper, we analyze one of the secure mobile ad hoc networks protocols, which is Authenticated routing for ad hoc networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is based on some type of query-reply ...
Comments