Light-weight trust-based routing protocol for mobile ad hoc networks
Light-weight trust-based routing protocol for mobile ad hoc networks
- Author(s): N. Marchang and R. Datta
- DOI: 10.1049/iet-ifs.2010.0160
For access to this article, please select a purchase option:
Buy article PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Thank you
Your recommendation has been sent to your librarian.
- Author(s): N. Marchang 1 and R. Datta 2
-
-
View affiliations
-
Affiliations:
1: Department of Computer Science and Engineering, North Eastern Regional Institute of Science and Technology Nirjuli, Itanagar, India
2: Department of Electronics and Electrical Communication Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India
-
Affiliations:
1: Department of Computer Science and Engineering, North Eastern Regional Institute of Science and Technology Nirjuli, Itanagar, India
- Source:
Volume 6, Issue 2,
June 2012,
p.
77 – 83
DOI: 10.1049/iet-ifs.2010.0160 , Print ISSN 1751-8709, Online ISSN 1751-8717
Mobile ad hoc networks (MANETs) were originally designed for a cooperative environment. To use them in hostile environments, trust-based routing can be used, where instead of establishing the shortest routes as done in traditional routing protocols, most trusted routes are established. In this study, the authors present a light-weight trust-based routing protocol. It is light-weight in the sense that the intrusion detection system (IDS) used for estimating the trust that one node has for another, consumes limited computational resource. Moreover, it uses only local information thereby ensuring scalability. Our light-weight IDS takes care of two kinds of attacks, namely, the blackhole attack and the grey hole attack. Whereas our proposed approach can be incorporated in any routing protocol, the authors have used AODV as the base routing protocol to evaluate our proposed approach and give a performance analysis.
Inspec keywords: cryptographic protocols; routing protocols; mobile ad hoc networks; trusted computing; cooperative communication; telecommunication security
Other keywords:
Subjects: Cryptography; Data security; Communication network design, planning and routing; Protocols; Protocols; Mobile radio systems
References
-
-
1)
- J. Cordasco , S. Wetzel . Cryptographic versus trust-based methods for MANET routing security. Elsevier Electron. Notes Theor. Comput. Sci. , 131 - 140
-
2)
- Hu, Y., Perrig, A., Johnson, D.B.: `Ariadne: a secure on-demand routing protocol for ad-hoc networks', Proc. Mobicom 2002, National Science Foundation and the Polytechnic University, 23–26 September 2002, Atlanta, Georgia, USA.
-
3)
- Tamilselvan, L., Sankaranarayanan, V.: `Prevention of blackhole attack in MANET', Proc. Wireless Broadband and Ultra Wideband Communications, 2007 (AusWireless 2007), 2007, p. 21–26.
-
4)
- S. Gupte , M. Singhal . Secure routing in mobile wireless ad-hoc networks. Elsevier Ad Hoc Netw. , 151 - 174
-
5)
- Li, X., Lyu, M.R., Liu, J.: `A trust model based routing protocol for secure ad hoc networks', Proc. IEEE Aerospace Conf., 2004.
-
6)
- Rezgui, A., Eltoweissy, M.: `TARP: a trust-aware routing protocol for sensor-actuator networks', Proc. Fourth IEEE Int. Conf. on Mobile Ad Hoc and Sensor Networks, October 2007, Pisa, Italy.
-
7)
- Abusalah, L., Khokhar, A., BenBrahim, G., ElHajj, W.: `TARP: trust-aware routing protocol', Proc. ACM IWCMC 2006, 3–6 July 2006, Vancouver, Canada.
-
8)
- Su, M.-Y., Chiang, K.-L., Liao, W.-C.: `Mitigation of black-hole nodes in mobile ad hoc networks', Proc. Parallel and Distributed Processing with Applications (ISPA), 2010, p. 162–167.
-
9)
- Michiardi, P., Molva, R.: `Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks', Proc. Sixth IFIP Communication and Multimedia Security Conf. (CMS’02), September 2002.
-
10)
- H.L. Nguyen , U.T. Nguyen . A study of different types of attacks on multicast in mobile ad hoc networks. Elsevier Ad Hoc Netw. , 32 - 46
-
11)
- Buttyan, L., Hubaux, J.: `Stimulating cooperation in self-organizing mobile ad hoc networks', Proc. ACM/Kluwer Mobile Networks and Applications (MONET), 2003, 8, p. 579–592.
-
12)
- Perkins, C.E., Royer, E.M.: `Ad-hoc on-demand vector routing', Proc. Second IEEE Workshop on Mobile Computing Systems and Applications, February 1999, New Orleans, LA, p. 90–100.
-
13)
- A.A. Pirzada , A. Datta , C. McDonald . Incorporating trust and reputation in the DSR protocol for dependable routing. Elsevier Comput. Commun. , 15 , 2806 - 2821
-
14)
- Marti, S., Giuli, T.J., La, K., Baker, M.: `Mitigating routing misbehaviour in a mobile ad-hoc environment', Proc. Sixth Annual ACM/IEEE Int. Conf. on Mobile Computing and Networking, August 2000.
-
15)
- Zakhary, S.R., Radenkovic, M.: `Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments', Proc. IEEE/IFIP WONS 2010 – Seventh Int. Conf. on Wireless On-demand Network Systems and Services, 2010, p. 161–167.
-
16)
- Buttyan, L., Hubaux, J.: `Enforcing service availability in mobile ad hoc networks', Proc. IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), 2000, p. 87–96.
-
17)
- H.N. Saha , D. Bhattacharyya , P.K. Banerjee . A distributed administration based approach for detecting and preventing attacks on mobile ad hoc networks. Int. J. Sci. Eng. Res. , 3
-
18)
- J. Li , C. Lee . Improve routing trust with promiscuous listening routing security algorithm in mobile ad-hoc networks. Elsevier Comput. Commun. , 8 , 1121 - 1132
-
19)
- Bhalaji, N., Shanmugam, A.: `Association between nodes to combat blackhole attack in DSR based MANET', Proc. Wireless and Optical Communications Networks (WOCN), 2009, p. 1–5.
-
20)
- Buchegger, S., Le Boudec, J.: `Performance analysis of the CONFIDANT protocol (cooperation of nodes – fairness in dynamic ad-hoc networks', Proc. Third ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc’02), June 2002, p. 226–336.
-
21)
- Umuhoza, D., Agbinya, J.I., Omlin, C.W.: `Estimation of trust metrics for MANET using QoS parameters and source routing algorithms', Proc. Second Int. Conf. on Wireless Broadband and Ultra Wideband Communications, (AusWireless 2007), 2007.
-
22)
- Xing, F., Wang, W.: `Understanding dynamic denial of service attacks in mobile ad hoc networks', Proc. Military Communications Conf., (MILCOM 2006), 2006, p. 1–7.
-
23)
- Pirzada, A.A., McDonald, C.: `Establishing trust in pure ad hoc networks', Proc. 27th Australian Computer Science Conf. (ACSC), 2004, 26, p. 47–54.
-
24)
- Meka, K.D., Virendra, M., Upadhyaya, S.: `Trust based routing decisions in mobile ad-hoc networks', Proc. Workshop on Secure Knowledge Management (SKM 2006), 2006.
-
25)
- Balakrishnan, V., Varadharajan, V., Lucs, P., Tupakula, U.K.: `Trust enhanced secure mobile ad-hoc network routing', Proc. 21st Int. Conf. on Advanced Information Networking and Applications Workshops (AINAW’07), 2007.
-
26)
- Virendra, M., Jadliwala, M., Chandrasekaran, M., Upadhyaya, S.: `Quantifying trust in ad-hoc networks', Proc. IEEE Int. Conf. on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), 2005, p. 65–71.
-
27)
- A.A. Pirzada , C. McDonald , A. Datta . Performance comparison of trust-based reactive routing protocols. IEEE Trans. Mobile Comput. , 6 , 695 - 710
-
28)
- Lima, M.N., da Silva, H.W., dos Santos, A.L., Pujolle, G.: `Requirements for survivable routing in MANETs', Proc. Wireless Pervasive Computing, (ISWPC 2008), 2008, p. 441–445.
-
29)
- Balakrishnan, V., Varadharajan, V., Tupakula, U.K.: `Fellowship: defense against flooding and packet drop attacks in MANET', Proc. 10th IEEE/IFIP Network Operations and Management Symp., 2006, Vancouver, Canada, p. 1–4.
-
1)