Skip to main content

2020 | OriginalPaper | Buchkapitel

Dynamic Trust Based Secure Multipath Routing for Mobile Ad-Hoc Networks

verfasst von : V. Sathiyavathi, R. Reshma, S. B. Saleema Parvin, L. SaiRamesh, A. Ayyasamy

Erschienen in: Intelligent Communication Technologies and Virtual Mobile Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose a new secure routing protocol for mobile Ad-hoc networks. The proposed new secure routing protocol works by evaluating the trustworthiness of each node to reduce the hazards from malicious mode and enhance the security of network. A new trust computation model is used to calculate the trustworthiness of a node based on the historical behavior. The trust value is evaluated by including the intruder node using Intrusion Detection System (IDS). In this paper, intruder nodes are detected based on the packet delivery mode during the communication. The Ad-hoc on demand multipath distance vector routing protocol is used in this paper which is based on the trust model that computes the trust of nodes and makes decision accordingly. A new dynamic and trust-based routing protocol named Ad-hoc on demand Dynamic Trusted Multipath Distance Vector (AODTMDV) has been proposed for performing effective and secured multi-path routing in MANETs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.: Trust-based on-demand multipath routing in mobile Ad Hoc networks. IET Inf. Sec. 4(4), 212–232 (2010)CrossRef Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.: Trust-based on-demand multipath routing in mobile Ad Hoc networks. IET Inf. Sec. 4(4), 212–232 (2010)CrossRef
2.
Zurück zum Zitat Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETs. IEEE Trans. Inds. Elect. 60(3), 1089–1098 (2013)CrossRef Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETs. IEEE Trans. Inds. Elect. 60(3), 1089–1098 (2013)CrossRef
3.
Zurück zum Zitat Sun, Y.L., Addada, V.G., Setia, S., Jajodia, S.: Securing MAODV: attacks and countermeasure: In: 2005 Proceedings of IEEE SECON, pp. 521–532 (2005) Sun, Y.L., Addada, V.G., Setia, S., Jajodia, S.: Securing MAODV: attacks and countermeasure: In: 2005 Proceedings of IEEE SECON, pp. 521–532 (2005)
4.
Zurück zum Zitat Liang, Z., Shi, W.: Analysis of ratings on trust inference in open environments. Els B.V 65(2), 99–128 (2007) Liang, Z., Shi, W.: Analysis of ratings on trust inference in open environments. Els B.V 65(2), 99–128 (2007)
5.
Zurück zum Zitat Chen, A., Xu, G., Yang, Y.: A cluster-based trust model for mobile Ad Hoc networks. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–1 (2008) Chen, A., Xu, G., Yang, Y.: A cluster-based trust model for mobile Ad Hoc networks. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–1 (2008)
6.
Zurück zum Zitat Selvakumar, K., Sairamesh, L., Kannan, A.: An intelligent energy aware secured algorithm for routing in wireless sensor networks. Wirel. Pers. Commun. 96(3), 4781–4798 (2017)CrossRef Selvakumar, K., Sairamesh, L., Kannan, A.: An intelligent energy aware secured algorithm for routing in wireless sensor networks. Wirel. Pers. Commun. 96(3), 4781–4798 (2017)CrossRef
7.
Zurück zum Zitat Kamalanathan, S., Lakshmanan, S.R., Arputharaj, K.: Fuzzy-clustering-based intelligent and secured energy-aware routing. In: Handbook of Research on Fuzzy and Rough Set Theory in Organizational Decision Making, pp. 24–37. IGI Global (2017) Kamalanathan, S., Lakshmanan, S.R., Arputharaj, K.: Fuzzy-clustering-based intelligent and secured energy-aware routing. In: Handbook of Research on Fuzzy and Rough Set Theory in Organizational Decision Making, pp. 24–37. IGI Global (2017)
8.
Zurück zum Zitat Ayyasamy, A., Venkatachalapathy, K.: Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs. Wirel. Netw. 21(2), 421–430 (2015)CrossRef Ayyasamy, A., Venkatachalapathy, K.: Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs. Wirel. Netw. 21(2), 421–430 (2015)CrossRef
9.
Zurück zum Zitat Ayyasamy, A., Venkatachalapathy, K.: Performance evaluation of load based channel aware routing in MANETs with reusable path. Int. J. Eng. Adv. Technol. (IJEAT) 3(1), 183–186 (2013) Ayyasamy, A., Venkatachalapathy, K.: Performance evaluation of load based channel aware routing in MANETs with reusable path. Int. J. Eng. Adv. Technol. (IJEAT) 3(1), 183–186 (2013)
10.
Zurück zum Zitat Xia, H., Jia, Z., Ju, L., Zhu, Y.: Trust management model for mobile Ad Hoc network based on analytic hierarchy process and fuzzy theory. IET Wirel. Sens. Syst. 1(4), 248–266 (2011)CrossRef Xia, H., Jia, Z., Ju, L., Zhu, Y.: Trust management model for mobile Ad Hoc network based on analytic hierarchy process and fuzzy theory. IET Wirel. Sens. Syst. 1(4), 248–266 (2011)CrossRef
11.
Zurück zum Zitat Xia, H., Jia, Z., Ju, L., Li, X., Sha, E.H.-M.: Impact of trust model on on-demand multi-path routing in mobile Ad Hoc networks. Els. Comput. Commun. 36(9), 1078–1093 (2013)CrossRef Xia, H., Jia, Z., Ju, L., Li, X., Sha, E.H.-M.: Impact of trust model on on-demand multi-path routing in mobile Ad Hoc networks. Els. Comput. Commun. 36(9), 1078–1093 (2013)CrossRef
Metadaten
Titel
Dynamic Trust Based Secure Multipath Routing for Mobile Ad-Hoc Networks
verfasst von
V. Sathiyavathi
R. Reshma
S. B. Saleema Parvin
L. SaiRamesh
A. Ayyasamy
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_63