Open Access
Subscription Access
Open Access
Subscription Access
Energy Efficient Secure Routing Framework Based on Multidimensional Trust Evaluation for MANET
Subscribe/Renew Journal
Very popular MANET works with some functions like data exchange, communication management and routing etc. based on the cooperation. Assess the trustworthiness of the nodes became important since trust is the pillar for cooperation. For secure routing, an efficient trust management mechanism should be implemented in such a way that it could not change the basic nature of network. Mobility, battery limitation and the computational complexities make the trust evaluation a challenging task. To manage the energy during inside attack this paper proposes a trust based energy efficient routing approach, as the extension of our previous work [10] by including various dimensions of trust such as initial trust, behavioral and recommended trust. Most favourite Ad-hoc On-demand Distance Vector (AODV) Routing protocol is used as a representative in the proposed framework. In this paper, a multidimensional trust evaluation security solution is proposed to make minimal changes to the functioning of AODV and achieved an increased level of security and reliability.
Keywords
AODV, Direct trust, Multidimensional Trust, Security, Secure Routing, Trust.
Subscription
Login to verify subscription
User
Font Size
Information
- N. Pissinou, T. Ghosh, and K. Makki, “Collaborative trust-based secure routing in multihop ad hoc net works,” in Networking 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, 2004.
- J. Cordasco, and S. Wetzel, “Cryptographic versus trust-based methods for MANET routing security,” Electronic Notes in Theoretical Computer Science, vol. 197, no. 2, pp. 131-140, 2008.
- R. Mishra, S. Sharma, and R. Agrawal, “Vulnerabilities and security for ad-hoc networks,” in Proceedings of the IEEE International Conference on Networking and Information Technology, pp. 192-196, April 2010.
- H. Deng, W. Li, and D. P. Agrawal, “Routing security in wireless ad hoc networks,” IEEE Communications Magazine, vol. 40, no. 10, pp. 70-75, 2002.
- K. Sanzgiri, B. Dahill, B. N. Levine, C. Shield, and E. M. Belding-Royar, “A secure routing protocol for ad hoc networks,” in Proceedings of ICNP’02, 2002.
- B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A survey of routing attacks in mobile ad hoc networks,” IEEE Wireless Communications, IEEE, vol. 14, no. 5, pp. 85-91, 2007.
- M. G. Zapata, and N. Asokan, “Securing ad hoc routing protocols,” in Proceedings of the ACM Workshop on Wireless Security (WiSE’02), ACM Press, 2002.
- L. Zhou, and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
- K. Meka, M. Virendra, and S. Upadhyaya, “Trust based routing decisions in mobile ad-hoc networks,” in Proceedings of the Workshop on Secure Knowledge Management (SKM’2006), 2006.
- R. Mishra, I. Kaur, and S. Sharma, “New trust based security method for mobile ad-hoc networks,” International Journal of Computer Science and Security (IJCSS), vol. 4, no. 3, pp. 346-351, June-July 2010.
- X. Li, M. R. Lyu, and J. Liu, “A trust model based routing protocol for secure ad hoc networks,” in Proceedings of the IEEE Aerospace Conference (IEEEAC), pp. 1286-1295, 2004.
- M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya, “Quantifying trust in ad-hoc networks,” in Proceedings of the IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), pp. 65-71, 2005.
- M. G. Zapata, and N. Asokan, “Securing ad hoc routing protocol,” in Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 1-10, 2002.
- Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu, “A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks,” IEEE INFOCOM, 2006.
- S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc network,” in Proceedings of the 6th Annual conference on Mobile Computing and Networking, pp. 255-265, 2000.
- Z. Liu, A. W. Joy, and R. A. Thompson, “A dynamic trust model for mobile ad hoc networks,” in Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS), pp. 80-85, 2004.
- L. Eschenuer, V. D. Gligor, and J. Baras, “On trust establishment in mobile ad-hoc networks,” Security Protocols: 10th International Workshop, pp. 47-62, 2002.
- Z. Yan, P. Zhang, and T. Virtanen, “Trust evaluation based security solution in ad hoc networks,” 2011.
- A. A. Pirzada, and C. McDonald, “Trusted route discovery with TORA protocol,” in Proceedings of the Second Annual Conference on Communication Networks and Services Research (CNSR’04), IEEE, 2004.
- A. Sharma, and N. Kumar, “Trust based theoretical framework for mobile ad-hoc networks,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 6, pp. 905-909, 2013.
- Y. Wang, and V. Varadharajan, “Trust2: Developing trust in peer-to-peer environments,” in Proceedings of the IEEE International Conference on Services Computing,” IEEE, vol. 1, pp. 24-31, 2005. DOI: 10.1109/SCC.2005.104
- M. S. Khan, M. I. Khan, S.-U.-R. Malik, O. Khalid, M. Azim, and N. Javaid, “MATF: A multi-attribute trust framework for MANETs,” EURASIP Journal on Wireless Communications and Networking, vol. 2016, no. 1, p. 1, 2016.
- S. Saxena, G. Sanyal, S. Srivastava, and R. Amin, “Preventing from cross-VM side-channel attack using new replacement method,” Wireless Personal Communications, vol. 97, no. 3, pp. 4827-4854, 2017. DOI: 10.1007/s11277-017-4753-7
- Z. Yan, P. Zhang, and T. Virtanen, “Trust evaluation based security solution in ad hoc networks,” in Proceedings of the Seventh Nordic Workshop on Secure IT Systems 2003, Norway, 2003.
Abstract Views: 233
PDF Views: 0