Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Trust-Based Routing Mechanism in MANET: Design and Implementation

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

An Erratum to this article was published on 16 November 2013

Abstract

Mobile Ad hoc Network (MANET) is a self-organizing wireless network for mobile devices. It does not require any fixed infrastructure to be configured which makes it more suitable to be used in environments that require on-the-fly setup. This paper discusses the challenging issues in MANET routing security. It presents FrAODV, a trust-based scheme for securing AODV routing protocol in MANET using the friendship mechanism. The nodes can evaluate the routing paths according to some selected features (such as node reputation and identity information) before forwarding the data through these routes. We have used two types of implementation in our scheme, simulation (using NS2) and real test-bed (using JADHOC). This scheme is believed to provide a robust environment where MANET nodes can trust each other in a secure community.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE International Conference on Network Protocols, ICNP ’02, pp 78–89, Washington, DC, USA, 2002. IEEE Computer Society

  2. Hu Y-C, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2nd ACM workshop on Wireless security,WiSe ’03, pp 30–40, New York, NY, USA. ACM

  3. Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security, WiSE ’02, pp 1–10, New York, NY, USA. ACM

  4. Al-Shurman M, Yoo S-M, Park S (2004) Black hole attack in mobile ad hoc networks. In Proceedings of the 42nd annual Southeast regional conference, ACM-SE 42, pp 96–97, New York, NY, USA. ACM

  5. Hu Y-C, Perrig A, Johnson DB (2003) Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, volume 3, pp 1976–1986, march-3 April 2003

  6. Johnson DB, Maltz DA (1996) Dynamic Source Routing in Ad HocWireless Networks. Kluwer Academic Publishers

  7. Perkins CE, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In Proceedings of the conference on Communications architectures, protocols and applications, SIGCOMM ’94, pp 234–244, New York, NY, USA. ACM

  8. Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA ’99. Second IEEE Workshop on, pp 90–100, Feb 1999

  9. Zhou L, Haas ZJ (1999) Securing ad hoc networks. Network, IEEE 13(6):24–30

    Article  Google Scholar 

  10. Buttýan L, Hubaux J-P (2003) Stimulating cooperation in self-organizing mobile ad hoc networks. Mob Netw Appl 8:579–592

    Article  Google Scholar 

  11. Kong J, Luo H, Xu K, Gu DL, Gerla M, Lu S (2002) Adaptive security for multilevel ad hoc networks

  12. Hu Y-C, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11:21–38

    Article  Google Scholar 

  13. Yang H, Meng X, Lu S (2002) Scane: Selforganized network-layer security in mobile ad hoc networks. In Proceedings of the 1st ACM workshop on Wireless security, WiSE ’02, pp 11–20, New York, NY, USA. ACM

  14. Saxena N, Tsudik G, Yi JH (2009) Efficient node admission and certificateless secure communication in short-lived manets. Parallel and Distributed Systems, IEEE Transactions 20(2):158–170

    Article  Google Scholar 

  15. Frankel Y, Yung M, Desmedt Y (1994) How to share a function securely (extended summary (1994)). In Symposium on the Theory of Computation (STOC)

  16. Zhang Y, Lou W, Liu W, Fang Y (2007) A secure incentive protocol for mobile ad hoc networks. Wirel Netw 13:569–582

    Article  Google Scholar 

  17. Saxena N, Tsudik G, Yi JH (2007) Threshold cryptography in p2p and manets: the case of access control. Comput Netw 51:3632–3649

    Article  MATH  Google Scholar 

  18. Thakur V, Marshall J, Yasinsac A (2003) Identifying flaws in the secure routing protocol. In Proc. 2003 IEEE Intl. Performance, Computing, and Commun. Conf, p 167174

  19. Papadimitratos P, Haas ZJ (2002) Secure routing formobile ad hoc networks. In SCS Communication Networks And Distributed Systems Modeling And Simulation Conference (CNDS 2002), pp 193–204

  20. Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36

    Article  Google Scholar 

  21. Buttyn L, Vajda I (2004) Towards provable security for ad hoc routing protocols. In In Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN, pp 94–105. ACM Press

  22. Yi S, Naldurg P, Kravets R (2001) Security-aware ad hoc routing for wireless networks

  23. Carter S, Yasinsac A (2002) Secure position aided ad hoc routing. In Proc. IASTED Intl. Conf. Commun. And Computer Networks (CCN02), pp 329–334

  24. Papadimitratos P, Haas ZJ (2003) Secure link state routing for mobile ad hoc networks

  25. Andel TR, Yasinsac A (2007) Surveying security analysis techniques in manet routing protocols. Communications Surveys Tutorials, IEEE 9(4):70–84

    Article  Google Scholar 

  26. Weimerskirch A, Thonet G (2002) A distributed light-weight authentication model for ad-hoc networks. In Proceedings of the 4th International Conference Seoul on Information Security and Cryptology, ICISC ’01. Springer-Verlag, London, UK, pp 341–354

  27. Wang G, Wang Q, Cao J, Guo M (2007) An effective trust establishment scheme for authentication in mobile ad hoc networks, pp 749–754, Oct

  28. Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In In Proceedings of the Security Protocols Workshop, pp 47–66. Springer-Verlag

  29. Zhu S, Zhu S, Xu S, Setia S, Jajodia S (2003) Lhap: A lightweight hop-by-hop authentication protocol for ad-hoc. In In Proc. of the 23rd International Conference on Distributed Computing Systems Workshops, p 749755

  30. Ren K, Li T, Wan Z, Bao F, Deng RH, Kim K (2004) Highly reliable trust establishment scheme in ad hoc networks. Comput Netw 45:687–699

    Article  MATH  Google Scholar 

  31. Samian N, Maarof MA, Razak SA (2008) Towards identifying features of trust in mobile ad hoc network. In Proceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS), pages 271–276, Washington, DC, USA, 2008. IEEE Comput Soc

  32. Abusalah L, Khokhar A, BenBrahim G, ElHajj W (2006) Tarp: trust-aware routing protocol. In Proceedings of the 2006 international conference on Wireless communications and mobile computing, IWCMC ’06, pp 135–140, New York, NY, USA, ACM

  33. Li H, Singhal M (2006) A secure routing protocol for wireless ad hoc networks. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 09, pages 225.1–, Washington, DC, USA. IEEE Comput Soc

  34. Nekkanti RK, Lee C (2004) Trust based adaptive on demand ad hoc routing protocol. In Proceedings of the 42nd annual Southeast regional conference, ACM-SE 42, pp 88–93, New York, NY, USA, ACM

  35. Pirzada AA, McDonald C (2004) Establishing trust in pure ad-hoc networks. 27th Conference on Australasian Computer Science (CRPIT 04), January 2004

  36. Zhang P, Yan Z, Virtanen T (2003) Trust evaluation based security solution in ad hoc networks. In Proceedings of the 7th Nordic Workshop on Secure IT Systems, pp 1–14

  37. Pandey AK (2005) Study of manet routing protocols by glomosim simulator. In International Journal Of Network Management, volume 15, pp 393–410. John Wiley and Sons, Ltd

  38. Rani A, Dave M (2007) Performance evaluation of modified aodv for load balancing 1. J Comput Sci

Download references

Acknowledgment

This research has been supported by the Ministry of Science, Technology and Innovation (MOSTI) Malaysia under E-Science Project vote No. 79261.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shukor Abdul Razak.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Eissa, T., Abdul Razak, S., Khokhar, R.H. et al. Trust-Based Routing Mechanism in MANET: Design and Implementation. Mobile Netw Appl 18, 666–677 (2013). https://doi.org/10.1007/s11036-011-0328-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-011-0328-0

Keywords

Navigation