Skip to main content
Top

2020 | OriginalPaper | Chapter

Dynamic Trust Based Secure Multipath Routing for Mobile Ad-Hoc Networks

Authors : V. Sathiyavathi, R. Reshma, S. B. Saleema Parvin, L. SaiRamesh, A. Ayyasamy

Published in: Intelligent Communication Technologies and Virtual Mobile Networks

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we propose a new secure routing protocol for mobile Ad-hoc networks. The proposed new secure routing protocol works by evaluating the trustworthiness of each node to reduce the hazards from malicious mode and enhance the security of network. A new trust computation model is used to calculate the trustworthiness of a node based on the historical behavior. The trust value is evaluated by including the intruder node using Intrusion Detection System (IDS). In this paper, intruder nodes are detected based on the packet delivery mode during the communication. The Ad-hoc on demand multipath distance vector routing protocol is used in this paper which is based on the trust model that computes the trust of nodes and makes decision accordingly. A new dynamic and trust-based routing protocol named Ad-hoc on demand Dynamic Trusted Multipath Distance Vector (AODTMDV) has been proposed for performing effective and secured multi-path routing in MANETs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.: Trust-based on-demand multipath routing in mobile Ad Hoc networks. IET Inf. Sec. 4(4), 212–232 (2010)CrossRef Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.: Trust-based on-demand multipath routing in mobile Ad Hoc networks. IET Inf. Sec. 4(4), 212–232 (2010)CrossRef
2.
go back to reference Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETs. IEEE Trans. Inds. Elect. 60(3), 1089–1098 (2013)CrossRef Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion-detection system for MANETs. IEEE Trans. Inds. Elect. 60(3), 1089–1098 (2013)CrossRef
3.
go back to reference Sun, Y.L., Addada, V.G., Setia, S., Jajodia, S.: Securing MAODV: attacks and countermeasure: In: 2005 Proceedings of IEEE SECON, pp. 521–532 (2005) Sun, Y.L., Addada, V.G., Setia, S., Jajodia, S.: Securing MAODV: attacks and countermeasure: In: 2005 Proceedings of IEEE SECON, pp. 521–532 (2005)
4.
go back to reference Liang, Z., Shi, W.: Analysis of ratings on trust inference in open environments. Els B.V 65(2), 99–128 (2007) Liang, Z., Shi, W.: Analysis of ratings on trust inference in open environments. Els B.V 65(2), 99–128 (2007)
5.
go back to reference Chen, A., Xu, G., Yang, Y.: A cluster-based trust model for mobile Ad Hoc networks. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–1 (2008) Chen, A., Xu, G., Yang, Y.: A cluster-based trust model for mobile Ad Hoc networks. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–1 (2008)
6.
go back to reference Selvakumar, K., Sairamesh, L., Kannan, A.: An intelligent energy aware secured algorithm for routing in wireless sensor networks. Wirel. Pers. Commun. 96(3), 4781–4798 (2017)CrossRef Selvakumar, K., Sairamesh, L., Kannan, A.: An intelligent energy aware secured algorithm for routing in wireless sensor networks. Wirel. Pers. Commun. 96(3), 4781–4798 (2017)CrossRef
7.
go back to reference Kamalanathan, S., Lakshmanan, S.R., Arputharaj, K.: Fuzzy-clustering-based intelligent and secured energy-aware routing. In: Handbook of Research on Fuzzy and Rough Set Theory in Organizational Decision Making, pp. 24–37. IGI Global (2017) Kamalanathan, S., Lakshmanan, S.R., Arputharaj, K.: Fuzzy-clustering-based intelligent and secured energy-aware routing. In: Handbook of Research on Fuzzy and Rough Set Theory in Organizational Decision Making, pp. 24–37. IGI Global (2017)
8.
go back to reference Ayyasamy, A., Venkatachalapathy, K.: Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs. Wirel. Netw. 21(2), 421–430 (2015)CrossRef Ayyasamy, A., Venkatachalapathy, K.: Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs. Wirel. Netw. 21(2), 421–430 (2015)CrossRef
9.
go back to reference Ayyasamy, A., Venkatachalapathy, K.: Performance evaluation of load based channel aware routing in MANETs with reusable path. Int. J. Eng. Adv. Technol. (IJEAT) 3(1), 183–186 (2013) Ayyasamy, A., Venkatachalapathy, K.: Performance evaluation of load based channel aware routing in MANETs with reusable path. Int. J. Eng. Adv. Technol. (IJEAT) 3(1), 183–186 (2013)
10.
go back to reference Xia, H., Jia, Z., Ju, L., Zhu, Y.: Trust management model for mobile Ad Hoc network based on analytic hierarchy process and fuzzy theory. IET Wirel. Sens. Syst. 1(4), 248–266 (2011)CrossRef Xia, H., Jia, Z., Ju, L., Zhu, Y.: Trust management model for mobile Ad Hoc network based on analytic hierarchy process and fuzzy theory. IET Wirel. Sens. Syst. 1(4), 248–266 (2011)CrossRef
11.
go back to reference Xia, H., Jia, Z., Ju, L., Li, X., Sha, E.H.-M.: Impact of trust model on on-demand multi-path routing in mobile Ad Hoc networks. Els. Comput. Commun. 36(9), 1078–1093 (2013)CrossRef Xia, H., Jia, Z., Ju, L., Li, X., Sha, E.H.-M.: Impact of trust model on on-demand multi-path routing in mobile Ad Hoc networks. Els. Comput. Commun. 36(9), 1078–1093 (2013)CrossRef
Metadata
Title
Dynamic Trust Based Secure Multipath Routing for Mobile Ad-Hoc Networks
Authors
V. Sathiyavathi
R. Reshma
S. B. Saleema Parvin
L. SaiRamesh
A. Ayyasamy
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_63