skip to main content
10.1145/1741906.1741925acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicwetConference Proceedingsconference-collections
research-article

Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes

Authors Info & Claims
Published:26 February 2010Publication History

ABSTRACT

Security in infrastructure-less networks like MANETs (Mobile Ad Hoc Networks) has proven to be a challenging task. Inherently secure routing protocols is a must for operational continuity of such networks. A number of secure routing protocols based on trust have recently been proposed. These protocols use the traditional route discovery model where along with normal nodes misbehaving nodes also participate in the route discovery process to incapacitate the network. To avoid the participation of misbehaving nodes, a secure and efficient route to destination can be calculated using weighted average of the number of nodes in the route and their trust values. However, the challenge is to minimize overhead of the above weighted average based routing technique while ensuring good throughput.

In this paper we propose efficient trust based multi-path dynamic source routing protocol (TMDSR). Unlike previous approaches which are based on broadcast and hence ignore the path from one hop neighbor of destination, the protocol proposed in this paper consider such path as it uses unicasting of route discovery packet from one hop neighbor of destination. Results show that our method increases the throughput of the network while minimizing the routing overhead.

References

  1. Poonam, Garg, K., and Misra, M. 2010. Trust based multi path DSR protocol. In Proceedings of Fifth International Conference on Availability, Reliability and Security (ARES), (Poland, February, 2010).Google ScholarGoogle Scholar
  2. Johnson, D. B., Maltz, D. A., Hu, Y. C. and Jetcheva, J. G. 2003. The dynamic source routing protocol for mobile ad hoc networks (DSR). Internet draft IETF RFC 3561, http://www.ietf.org/rfc/rfc3561.txt.Google ScholarGoogle Scholar
  3. Marti, S., Giuli, T. J., Lai, K. and Baker, M. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In Proceeding of Sixth Annual International Conference Mobile Computing and Networking (MobiCom). ACM Press, New York, NY, 255--265. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Pirzada, A. A., Datta, A. and McDonald, C. 2004. Propagating trust in ad-hoc networks for reliable routing. In Proceeding of IEEE International Workshop Wireless Ad Hoc Networks (Finland, 2004). 58--62.Google ScholarGoogle ScholarCross RefCross Ref
  5. Pirzada, A. A., Datta, A. and McDonald, C. 2004. Trust-based routing for ad-hoc wireless networks. In Proceeding of. IEEE International Conference Networks (Singapore, 2004). 326--330.Google ScholarGoogle Scholar
  6. Wang, C., Yang, X. and Gao, Y. 2005. A Routing Protocol Based on Trust for MANETs. In Proceeding of Sixth Annual International Conference on Grid and Cooperative Computing (Beijing, China). Lecture notes in computer science, vol. 3795, 959--964. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Pissinou, N., Ghosh, T. and Makki, K. 2004. Collaborative trust-based secure routing in multihop ad hoc networks. Networking (Athens, Greece 2004). Lecture Notes in Computer Science, vol. 3042, 1446--1451. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Buchegger, S. and Boudec, J. 2002. Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes---Fairness in Distributed Ad hoc NeTworks. In Proceeding ACM Workshop Mobile Ad Hoc Networking and Computing (Switzerland, 2006). 226--236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Garfinkel, S. 1995 PGP: Pretty Good Privacy. O'Reilly and Associates. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Yong, C., Chuanhe, H. and Wenming, S. 2007. Trusted Dynamic Source Routing Protocol. IEEE International Conference on Wireless Communications, Networking and Mobile Computing, (WiCom 2007), 1632--1636.Google ScholarGoogle Scholar
  11. Narula, P., Dhurandher, S. K., Misra, S. and Woungang, I. 2007. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Elsevier Journal of Computer Communications, 760--769. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Haniotakis, T., Tragoudas, S. and Kalapodas, C. 2004. Security enhancement through multiple path transmission in ad hoc networks. IEEE Communications Society, 4187--4191.Google ScholarGoogle Scholar
  13. Zhou, L. and Haas, Z. J. 1999. Securing ad hoc networks IEEE Network Magazine, vol. 13, no. 6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. QUALNET simulator, Available from: <http://www.scalable-networks.com>.Google ScholarGoogle Scholar
  15. Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C. and Jetcheva, J. G. 1998 A performance comparison of multihop wireless ad hoc network routing protocols. In proceeding of International Conference Mobile Computing and Networking (MobiCom), ACM Press, 85--97. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ICWET '10: Proceedings of the International Conference and Workshop on Emerging Trends in Technology
              February 2010
              1070 pages
              ISBN:9781605588124
              DOI:10.1145/1741906

              Copyright © 2010 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 26 February 2010

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader