Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Trust-based on-demand multipath routing in mobile ad hoc networks

Trust-based on-demand multipath routing in mobile ad hoc networks

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

A mobile ad hoc network (MANET) is a self-organised system comprised of mobile wireless nodes. All nodes act as both communicators and routers. Owing to multi-hop routing and absence of centralised administration in open environment, MANETs are vulnerable to attacks by malicious nodes. In order to decrease the hazards from malicious nodes, the authors incorporate the concept of trust to MANETs and build a simple trust model to evaluate neighbours’ behaviours – forwarding packets. Extended from the ad hoc on-demand distance vector (AODV) routing protocol and the ad hoc on-demand multipath distance vector (AOMDV) routing protocol, a trust-based reactive multipath routing protocol, ad hoc on-demand trusted-path distance vector (AOTDV), is proposed for MANETs. This protocol is able to discover multiple loop-free paths as candidates in one route discovery. These paths are evaluated by two aspects: hop counts and trust values. This two-dimensional evaluation provides a flexible and feasible approach to choose the shortest path from the candidates that meet the requirements of data packets for dependability or trust. Furthermore, the authors give a routing example in details to describe the procedures of route discovery and the differences among AODV, AOMDV and AOTDV. Several experiments have been conducted to compare these protocols and the results show that AOTDV improves packet delivery ratio and mitigates the impairment from black hole, grey hole and modification attacks.

References

    1. 1)
      • Jøsang, A., Ismail, R.: `The beta reputation system', Proc. 15th Bled Electronic Commerce Conf., June 2002, Bled, Slovenia, p. 1–14.
    2. 2)
      • Marti, S., Giuli, T., Lai, K., Baker, M.: `Mitigating routing misbehavior in mobile ad hoc networks', Proc. Int. Conf. Mobile Computing and Networking (MobiCom), August 2000, Boston, MA, USA, p. 255–265.
    3. 3)
      • Pirzada, A.A., Datta, A., McDonald, C.: `Propagating trust in ad hoc networks for reliable routing', Proc. Int. Workshop Wireless Ad Hoc Networks (IWWAN), May 2004, Oulu, Finland, p. 58–62.
    4. 4)
      • J.J. Garcia-Luna-Aceves , M. Mosko , C.E. Perkins . A new approach to on-demand loop-free routing in networks using sequence number. Comput. Netw. , 10 , 1599 - 1615
    5. 5)
      • Y.C. Hu , A. Perrig . A survey of secure wireless ad hoc routing. IEEE Secur. Priv. , 3 , 28 - 39
    6. 6)
      • D. Johnson , D. Maltz , I. Tomasz , K. Hank . (1996) Dynamic source routing in Ad hoc wireless networks, Mobile computing.
    7. 7)
      • A.A. Pirzada , C. McDonald , X.Y. Cheng , D.Y. Li . (2006) Reliable routing in ad hoc networks using direct trust mechanisms, Advances in ad hoc and sensor networks.
    8. 8)
    9. 9)
      • Jia, Z., Qin, Z., Xu, X., Zhang, R.: `Depth-expurgation based dynamic trust evaluation algorithm for ad hoc networks', Proc. Int. Conf. on Embedded Software and Systems, July 2008, Sichuan, China, p. 399–404.
    10. 10)
      • M.G. Zapata , N. Asokan . Secure ad hoc on-demand distance vector routing. ACM Mob. Comput. Commun. Rev. , 6 , 106 - 107
    11. 11)
      • Hu, Y.C., Perrig, A., Johnson, D.B.: `Ariadne: a secure on-demand routing protocol for ad hoc networks', Proc. Int. Conf. Mobile Computing and Networking (Mobicom’02), September 2002, Atlanta, Georgia, p. 12–23.
    12. 12)
      • Jensen, C.D., Connell, P.O.: `Trust-based route selection in dynamic source routing', Proc. Int. Conf. on Trust Management, May 2006, Pisa, Italy, p. 150–163.
    13. 13)
      • Marsh, S.P.: `Formalizing trust as a computational concept', 1994, PhD, University of Stirling, Department of Mathematics and Computer Science.
    14. 14)
    15. 15)
      • 802.11: ‘Wireless LAN medium access control (MAC) and physical layer (PHY) specifications 802.11’, 1997.
    16. 16)
      • A.S. Tanenbaum , A.S. Tanenbaum . (2002) The medium access control sublayer, Computer networks.
    17. 17)
    18. 18)
      • Cheng, W., Liao, X., Shen, C., Li, S., Peng, S.: `A trust-based routing framework in energy-constrained wireless sensor networks', Proc. Int. Conf. on Wireless Algorithms, Systems, and Applications (WASA), August 2006, Xi'an, China, p. 478–489.
    19. 19)
      • Sabater, J., Sierra, C.: `Regret: reputation in gregarious societies', Proc. Int. Conf. Autonomous Agents, 2002, Montreal, Canada, p. 194–195.
    20. 20)
      • Perkins, C.E., Bhagwat, P.: `Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile Computers', Proc. Int. Conf. ACM SIGCOMM, August 1994, London, p. 234–244.
    21. 21)
      • Z. Liang , W. Shi . Analysis of ratings on trust inference in open environments. Perform. Eval. , 2 , 99 - 128
    22. 22)
    23. 23)
      • P. Resnick , R. Zeckhauser , M. Baye . (2000) Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system, Advances in applied microeconomics: the economics of the internet and E-commerce.
    24. 24)
      • L. Xiong , L. Liu . PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Trans. Knowl. Data Eng. , 7 , 843 - 857
    25. 25)
      • Buchegger, S., Boudec, J.L.: `A robust reputation system for p2p and mobile ad-hoc networks', Proc. Int. Workshop on the Economics of Peer-to-Peer Systems, June 2004, Cambridge, MA, USA, p. 119–123.
    26. 26)
      • Douceur, J.R.: `The Sybil Attack', Proc. Int. Workshop on Peer-to-Peer Systems, March 2002, Cambridge, MA, USA, p. 251–260.
    27. 27)
      • A. Nasipuri , R. Castaneda , S.R. Das . Performance of multipath routing for on-demand protocols in mobile ad hoc networks. Mob. Netw. Appl. , 4 , 339 - 349
    28. 28)
      • Perkins, C.E., Royer, E.M., Das, S.R.: `Ad-hoc on-demand distance vector routing', Proc. Int. Workshop on Mobile Computing Systems and Applications (WMCSA), February 1999, New Orleans, LA, USA., p. 90–100.
    29. 29)
      • Selçuk, A.A., Uzun, E., Pariente, M.R.: `A reputation-based trust management system for P2P networks', Proc. Int. Symp. on Cluster Computing and the Grid, April 2004, Chicago, USA, p. 251–258.
    30. 30)
      • Y. Sun , W. Yu , Z. Han , K.J.R. Liu . Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. , 2 , 305 - 317
    31. 31)
      • http://www.isi.edu/nsnam/ns/, accessed September, 2009.
    32. 32)
      • A.A. Pirzada , C. McDonald . Trust establishment in pure ad-hoc networks. Wirel. Pers. Commun. , 1 , 39 - 168
    33. 33)
      • Marina, M.K., Das, S.R.: `On-demand multipath distance vector routing for ad hoc networks', Proc. Int. Conf. on Network Protocols, November 2001, Riverside, CA, USA., p. 11–14.
    34. 34)
    35. 35)
    36. 36)
      • Griffiths, N., Jhumka, A., Dawson, A., Myers, R.: `A simple trust model for on-demand routing in mobile ad-hoc networks', Proc. Int. Symp. on Intelligent Distributed Computing (IDC 2008), 2008, p. 105–114.
    37. 37)
      • D. Gambetta , D. Gambetta . (2000) Can we?, Trust: making and breaking cooperative relations.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2009.0140
Loading

Related content

content/journals/10.1049/iet-ifs.2009.0140
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address