Abstract
Mobile Ad hoc Network (MANET) is a self-organizing wireless network for mobile devices. It does not require any fixed infrastructure to be configured which makes it more suitable to be used in environments that require on-the-fly setup. This paper discusses the challenging issues in MANET routing security. It presents FrAODV, a trust-based scheme for securing AODV routing protocol in MANET using the friendship mechanism. The nodes can evaluate the routing paths according to some selected features (such as node reputation and identity information) before forwarding the data through these routes. We have used two types of implementation in our scheme, simulation (using NS2) and real test-bed (using JADHOC). This scheme is believed to provide a robust environment where MANET nodes can trust each other in a secure community.
Similar content being viewed by others
References
Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE International Conference on Network Protocols, ICNP ’02, pp 78–89, Washington, DC, USA, 2002. IEEE Computer Society
Hu Y-C, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2nd ACM workshop on Wireless security,WiSe ’03, pp 30–40, New York, NY, USA. ACM
Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security, WiSE ’02, pp 1–10, New York, NY, USA. ACM
Al-Shurman M, Yoo S-M, Park S (2004) Black hole attack in mobile ad hoc networks. In Proceedings of the 42nd annual Southeast regional conference, ACM-SE 42, pp 96–97, New York, NY, USA. ACM
Hu Y-C, Perrig A, Johnson DB (2003) Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, volume 3, pp 1976–1986, march-3 April 2003
Johnson DB, Maltz DA (1996) Dynamic Source Routing in Ad HocWireless Networks. Kluwer Academic Publishers
Perkins CE, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In Proceedings of the conference on Communications architectures, protocols and applications, SIGCOMM ’94, pp 234–244, New York, NY, USA. ACM
Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA ’99. Second IEEE Workshop on, pp 90–100, Feb 1999
Zhou L, Haas ZJ (1999) Securing ad hoc networks. Network, IEEE 13(6):24–30
Buttýan L, Hubaux J-P (2003) Stimulating cooperation in self-organizing mobile ad hoc networks. Mob Netw Appl 8:579–592
Kong J, Luo H, Xu K, Gu DL, Gerla M, Lu S (2002) Adaptive security for multilevel ad hoc networks
Hu Y-C, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11:21–38
Yang H, Meng X, Lu S (2002) Scane: Selforganized network-layer security in mobile ad hoc networks. In Proceedings of the 1st ACM workshop on Wireless security, WiSE ’02, pp 11–20, New York, NY, USA. ACM
Saxena N, Tsudik G, Yi JH (2009) Efficient node admission and certificateless secure communication in short-lived manets. Parallel and Distributed Systems, IEEE Transactions 20(2):158–170
Frankel Y, Yung M, Desmedt Y (1994) How to share a function securely (extended summary (1994)). In Symposium on the Theory of Computation (STOC)
Zhang Y, Lou W, Liu W, Fang Y (2007) A secure incentive protocol for mobile ad hoc networks. Wirel Netw 13:569–582
Saxena N, Tsudik G, Yi JH (2007) Threshold cryptography in p2p and manets: the case of access control. Comput Netw 51:3632–3649
Thakur V, Marshall J, Yasinsac A (2003) Identifying flaws in the secure routing protocol. In Proc. 2003 IEEE Intl. Performance, Computing, and Commun. Conf, p 167174
Papadimitratos P, Haas ZJ (2002) Secure routing formobile ad hoc networks. In SCS Communication Networks And Distributed Systems Modeling And Simulation Conference (CNDS 2002), pp 193–204
Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36
Buttyn L, Vajda I (2004) Towards provable security for ad hoc routing protocols. In In Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN, pp 94–105. ACM Press
Yi S, Naldurg P, Kravets R (2001) Security-aware ad hoc routing for wireless networks
Carter S, Yasinsac A (2002) Secure position aided ad hoc routing. In Proc. IASTED Intl. Conf. Commun. And Computer Networks (CCN02), pp 329–334
Papadimitratos P, Haas ZJ (2003) Secure link state routing for mobile ad hoc networks
Andel TR, Yasinsac A (2007) Surveying security analysis techniques in manet routing protocols. Communications Surveys Tutorials, IEEE 9(4):70–84
Weimerskirch A, Thonet G (2002) A distributed light-weight authentication model for ad-hoc networks. In Proceedings of the 4th International Conference Seoul on Information Security and Cryptology, ICISC ’01. Springer-Verlag, London, UK, pp 341–354
Wang G, Wang Q, Cao J, Guo M (2007) An effective trust establishment scheme for authentication in mobile ad hoc networks, pp 749–754, Oct
Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In In Proceedings of the Security Protocols Workshop, pp 47–66. Springer-Verlag
Zhu S, Zhu S, Xu S, Setia S, Jajodia S (2003) Lhap: A lightweight hop-by-hop authentication protocol for ad-hoc. In In Proc. of the 23rd International Conference on Distributed Computing Systems Workshops, p 749755
Ren K, Li T, Wan Z, Bao F, Deng RH, Kim K (2004) Highly reliable trust establishment scheme in ad hoc networks. Comput Netw 45:687–699
Samian N, Maarof MA, Razak SA (2008) Towards identifying features of trust in mobile ad hoc network. In Proceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS), pages 271–276, Washington, DC, USA, 2008. IEEE Comput Soc
Abusalah L, Khokhar A, BenBrahim G, ElHajj W (2006) Tarp: trust-aware routing protocol. In Proceedings of the 2006 international conference on Wireless communications and mobile computing, IWCMC ’06, pp 135–140, New York, NY, USA, ACM
Li H, Singhal M (2006) A secure routing protocol for wireless ad hoc networks. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 09, pages 225.1–, Washington, DC, USA. IEEE Comput Soc
Nekkanti RK, Lee C (2004) Trust based adaptive on demand ad hoc routing protocol. In Proceedings of the 42nd annual Southeast regional conference, ACM-SE 42, pp 88–93, New York, NY, USA, ACM
Pirzada AA, McDonald C (2004) Establishing trust in pure ad-hoc networks. 27th Conference on Australasian Computer Science (CRPIT 04), January 2004
Zhang P, Yan Z, Virtanen T (2003) Trust evaluation based security solution in ad hoc networks. In Proceedings of the 7th Nordic Workshop on Secure IT Systems, pp 1–14
Pandey AK (2005) Study of manet routing protocols by glomosim simulator. In International Journal Of Network Management, volume 15, pp 393–410. John Wiley and Sons, Ltd
Rani A, Dave M (2007) Performance evaluation of modified aodv for load balancing 1. J Comput Sci
Acknowledgment
This research has been supported by the Ministry of Science, Technology and Innovation (MOSTI) Malaysia under E-Science Project vote No. 79261.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Eissa, T., Abdul Razak, S., Khokhar, R.H. et al. Trust-Based Routing Mechanism in MANET: Design and Implementation. Mobile Netw Appl 18, 666–677 (2013). https://doi.org/10.1007/s11036-011-0328-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-011-0328-0