Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

05.10.2016

An Augmented Routing Algorithm for Trusted Detection of Link Failures in MANETs

verfasst von: M. S. Rahul, E. Arun, P. Mohamed Shameem, J. Rajeesh

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Now a days, the communication between different nodes in a Mobile Ad hoc Network (MANET) is not guarded. Various encryption mechanisms are used to protect the communication between nodes. Link failures and packet dropping due to unfaithful nodes are becoming one of the main opposition for the trusted detection of malicious nodes. A failure can occur either due to channel errors or harmful nodes in network. These attacks may have the intention of modifying the routing protocol so that the data transmission through a specific node controlled by the attacker disturbs the network topology. Thus it deteriorates the performance of network. Mutual association of dropped packets is capitalized for synthesizing the suspicious nodes in MANET. The algorithm proposed is using an efficient cryptosystem with cipher text list validator scheme and a communal auditing scheme for the validation of certificate received from individual nodes. For constructing the framework, the proposed algorithm with five phases has a network setup phase, data routing phase, communal auditing phase, error node detection phase and a data receiver phase. This framework makes the MANET node build a safe routing topology by effectively judging the harmful nodes as well as the unfaithful information accepted from supplementary nodes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liu, W., & Yu, M. (2014). AASR: Authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Transaction On Vehicular Technology, 63(9), 4585–4593.CrossRef Liu, W., & Yu, M. (2014). AASR: Authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Transaction On Vehicular Technology, 63(9), 4585–4593.CrossRef
2.
Zurück zum Zitat Shu, T., & Krunz, M. (2015). Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 813–828.CrossRef Shu, T., & Krunz, M. (2015). Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 813–828.CrossRef
3.
Zurück zum Zitat Zhong, S., Chen, J., and Yang, Y.R. (2003). Sprite: A simple cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of IEEE INFOCOM Conference, pp. 1987–1997. Zhong, S., Chen, J., and Yang, Y.R. (2003). Sprite: A simple cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of IEEE INFOCOM Conference, pp. 1987–1997.
4.
Zurück zum Zitat Kozma Jr. W., & Lazos, L. (2009). REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits. In Proceedings of ACM conference wireless network security, pp. 103–110. Kozma Jr. W., & Lazos, L. (2009). REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits. In Proceedings of ACM conference wireless network security, pp. 103–110.
5.
Zurück zum Zitat Liu, K., Deng, J., Varshney, P., & Balakrishnan, K. (2006). An acknowledgement-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput., 6(5), 536–550.CrossRef Liu, K., Deng, J., Varshney, P., & Balakrishnan, K. (2006). An acknowledgement-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput., 6(5), 536–550.CrossRef
6.
Zurück zum Zitat Liu, Y., & Yang, Y. R. (2003). Reputation propagation and agreement in mobile ad-hoc networks. In Proceedings of IEEE WCNC conference, pp. 1510–1515. Liu, Y., & Yang, Y. R. (2003). Reputation propagation and agreement in mobile ad-hoc networks. In Proceedings of IEEE WCNC conference, pp. 1510–1515.
7.
Zurück zum Zitat Zhang, Y., Lazos, L., & Kozma, W. (2012). AMD: Audit-based misbehavior detection in wireless ad hoc networks. IEEE Transactions Mobile Computing, 99, 1. Zhang, Y., Lazos, L., & Kozma, W. (2012). AMD: Audit-based misbehavior detection in wireless ad hoc networks. IEEE Transactions Mobile Computing, 99, 1.
8.
Zurück zum Zitat Reed, M. G., Syverson, P. F., & Goldschlag, D. M. (1998). Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4), 482–494.CrossRef Reed, M. G., Syverson, P. F., & Goldschlag, D. M. (1998). Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4), 482–494.CrossRef
9.
Zurück zum Zitat Boneh, D., Boyen, X., & Shacham, H. (2004). Short group signatures. In Proceedings of CRYPTO, pp. 41–55. Boneh, D., Boyen, X., & Shacham, H. (2004). Short group signatures. In Proceedings of CRYPTO, pp. 41–55.
10.
Zurück zum Zitat Yu, M., Zhou, M. C., & Su, W. (2009). A secure routing protocol against Byzantine attacks for MANETs in adversarial environment. IEEE Transactions on Vehicular Technology, 58(1), 449–460.CrossRef Yu, M., Zhou, M. C., & Su, W. (2009). A secure routing protocol against Byzantine attacks for MANETs in adversarial environment. IEEE Transactions on Vehicular Technology, 58(1), 449–460.CrossRef
11.
Zurück zum Zitat Awerbuch, B., Holmer, D. Rotaru, C.-N., & Rubens, H. (2002). An on-demand secure routing protocol resilient to byzantine failures. In WiSE ‘02 proceedings of the 1st ACM workshop on wireless security. Awerbuch, B., Holmer, D. Rotaru, C.-N., & Rubens, H. (2002). An on-demand secure routing protocol resilient to byzantine failures. In WiSE ‘02 proceedings of the 1st ACM workshop on wireless security.
14.
Zurück zum Zitat Balakrishnan, K., Deng, J., & Varshney, P. K. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. In Proceedings of IEEE wireless communications and networking conference (WCNC’05). Balakrishnan, K., Deng, J., & Varshney, P. K. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. In Proceedings of IEEE wireless communications and networking conference (WCNC’05).
15.
Zurück zum Zitat Shu, T., & Krunz, M. (2012). Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing. In Proceedings of WiSec, pp. 87–98. Shu, T., & Krunz, M. (2012). Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing. In Proceedings of WiSec, pp. 87–98.
16.
Zurück zum Zitat William, S., & Stallings W. (2009). Cryptography and network security (4th ed.) Delhi, India: Pearson Education India, Eighth Impression. William, S., & Stallings W. (2009). Cryptography and network security (4th ed.) Delhi, India: Pearson Education India, Eighth Impression.
17.
Zurück zum Zitat Chou, C.-C., Wei, D. S. L. Jay, Kuo, C.-C., & Naik, K. (2007). An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks. IEEE Journal on Selected Areas in Communications, 25(1), 192–203.CrossRef Chou, C.-C., Wei, D. S. L. Jay, Kuo, C.-C., & Naik, K. (2007). An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks. IEEE Journal on Selected Areas in Communications, 25(1), 192–203.CrossRef
19.
Zurück zum Zitat Kong, J., Hong, X., & Gerla, M. (2007). ANODR: An identity-free and ondemand routing scheme against anonymity threats in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(8), 888–902.CrossRef Kong, J., Hong, X., & Gerla, M. (2007). ANODR: An identity-free and ondemand routing scheme against anonymity threats in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(8), 888–902.CrossRef
21.
Zurück zum Zitat Shen, H., & Zhao, L. (2013). ALERT: An anonymous location-based efficient routing protocol in MANETs. IEEE Transactions on Mobile Computing, 12(10), 1079–1093.CrossRef Shen, H., & Zhao, L. (2013). ALERT: An anonymous location-based efficient routing protocol in MANETs. IEEE Transactions on Mobile Computing, 12(10), 1079–1093.CrossRef
22.
Zurück zum Zitat Shu, T., Krunz, M., & Liu, S. (2010). Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Transactions on Mobile Computing, 9(7), 941–954.CrossRef Shu, T., Krunz, M., & Liu, S. (2010). Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Transactions on Mobile Computing, 9(7), 941–954.CrossRef
23.
Zurück zum Zitat Proano, A., & Lazos, L. (2012). Packet-hiding methods for preventing selective jamming attacks. IEEE Transactions on Dependable and Secure Computing, 9(1), 101–114.CrossRef Proano, A., & Lazos, L. (2012). Packet-hiding methods for preventing selective jamming attacks. IEEE Transactions on Dependable and Secure Computing, 9(1), 101–114.CrossRef
Metadaten
Titel
An Augmented Routing Algorithm for Trusted Detection of Link Failures in MANETs
verfasst von
M. S. Rahul
E. Arun
P. Mohamed Shameem
J. Rajeesh
Publikationsdatum
05.10.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3735-5

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt