Skip to main content
Top

2020 | OriginalPaper | Chapter

On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc Networks

Authors : Uttam Ghosh, Pushpita Chatterjee, Al-Sakib Khan Pathan

Published in: Combating Security Challenges in the Age of Big Data

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the era of big data, the data are produced by numerous sources. Though, Mobile Ad hoc Network (MANET) would not be directly related to big data technology, there are at least two issues that relate MANET with big data scenario which are: (i) collecting reliable data securely from MANET (ii) obtaining meaningful data from the huge data sets and transmission of that securely through MANET. This is why it is needed to talk about the secure routing protocols in MANET as in some way; such network setting also would be related to contributing to the big data environment. The intent of this chapter is to present a survey on the secure routing protocols in MANET.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Perkins C, Royer EB, Das S (2003) Ad hoc on demand distance vector (aodv) routing. IETF RFC 3561 Perkins C, Royer EB, Das S (2003) Ad hoc on demand distance vector (aodv) routing. IETF RFC 3561
2.
go back to reference Hu YC, Perrig A, Johnson D (2004) The dynamic source routing protocol for mobile ad hoc networks (dsr), draft-ietf-manet-dsr-10.txt Hu YC, Perrig A, Johnson D (2004) The dynamic source routing protocol for mobile ad hoc networks (dsr), draft-ietf-manet-dsr-10.txt
3.
go back to reference Perkins EC, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. Proc ACM SIGCOMM 24:234–244CrossRef Perkins EC, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. Proc ACM SIGCOMM 24:234–244CrossRef
4.
go back to reference Haas Z, Pearlman M (1998) The performance of query control schemes for the zone routing protocol. Proc ACM SIGCOMM:167–177CrossRef Haas Z, Pearlman M (1998) The performance of query control schemes for the zone routing protocol. Proc ACM SIGCOMM:167–177CrossRef
5.
go back to reference Hu YC, Perrig A, JohnsonDB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th ACM MOBICOM 2002, September 2002 Hu YC, Perrig A, JohnsonDB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of the 8th ACM MOBICOM 2002, September 2002
6.
go back to reference Papadimitratos P, Haas ZJ (2002) Secure routing for mobile ad hoc networks. In: Proceedings of SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), pp 1–12 Papadimitratos P, Haas ZJ (2002) Secure routing for mobile ad hoc networks. In: Proceedings of SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), pp 1–12
7.
go back to reference Papadimitratos P, Haas Z (2003) Secure message transmission in mobile ad hoc networks. Elsevier Ad Hoc Netw J 1:193–209CrossRef Papadimitratos P, Haas Z (2003) Secure message transmission in mobile ad hoc networks. Elsevier Ad Hoc Netw J 1:193–209CrossRef
8.
go back to reference Sanzgiri K, Dahill B, Levine B, Shields C, Royer EB (2002) A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE ICNP 2002, pp 78–87 Sanzgiri K, Dahill B, Levine B, Shields C, Royer EB (2002) A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE ICNP 2002, pp 78–87
9.
go back to reference Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: Proceedings of the ACM WiSe, pp 1–10 Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: Proceedings of the ACM WiSe, pp 1–10
11.
go back to reference Pathan A-SK (2014, Inderscience Publishers) On the Boundaries of Trust and Security in Computing and Communications Systems. Int J Trust Manag Comput Commun 2(1):1–6MathSciNetCrossRef Pathan A-SK (2014, Inderscience Publishers) On the Boundaries of Trust and Security in Computing and Communications Systems. Int J Trust Manag Comput Commun 2(1):1–6MathSciNetCrossRef
12.
go back to reference Ghosh U, Datta R (2014) Sdrp: secure and dynamic routing protocol for mobile adhoc networks. IET Netw 3(3):235–243CrossRef Ghosh U, Datta R (2014) Sdrp: secure and dynamic routing protocol for mobile adhoc networks. IET Netw 3(3):235–243CrossRef
13.
go back to reference Ghosh U, Datta R (2011) Identity based secure aodv and tcp for mobile ad hoc networks. In: Proceedings of the 1st international conference on wireless Technologies for Humanitarian Relief, ACM, pp 339–346CrossRef Ghosh U, Datta R (2011) Identity based secure aodv and tcp for mobile ad hoc networks. In: Proceedings of the 1st international conference on wireless Technologies for Humanitarian Relief, ACM, pp 339–346CrossRef
14.
go back to reference Hu Y-C, Perrig A, Johnson DB (2002) Sead: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE WMCSA 2002, pp 3–13 Hu Y-C, Perrig A, Johnson DB (2002) Sead: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE WMCSA 2002, pp 3–13
15.
go back to reference Zhao S, Aggarwal A, Liu S, Wu H (2008) A secure routing protocol in proactive security approach for mobile Ad-Hoc networks. In: 2008 IEEE wireless communications and networking conference, 31 March–3 April 2008 Zhao S, Aggarwal A, Liu S, Wu H (2008) A secure routing protocol in proactive security approach for mobile Ad-Hoc networks. In: 2008 IEEE wireless communications and networking conference, 31 March–3 April 2008
16.
go back to reference Papadimitratos P, Haas Z (2003) Secure link state routing for mobile ad hoc networks. In: Proceedings of the IEEE workshop on security and Assurance in Ad Hoc networks, pp 27–31 Papadimitratos P, Haas Z (2003) Secure link state routing for mobile ad hoc networks. In: Proceedings of the IEEE workshop on security and Assurance in Ad Hoc networks, pp 27–31
17.
go back to reference Buchegger S, Boudec J (2002) Performance analysis of the confidant protocol cooperation of nodes fairness in dynamic ad-hoc networks. In: Proceedings of ACM MOBIHOC 2002, pp 226–236 Buchegger S, Boudec J (2002) Performance analysis of the confidant protocol cooperation of nodes fairness in dynamic ad-hoc networks. In: Proceedings of ACM MOBIHOC 2002, pp 226–236
18.
go back to reference Buchegger S, Boudec JYL (2003) The effect of rumour spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt03, March 2003 Buchegger S, Boudec JYL (2003) The effect of rumour spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt03, March 2003
19.
go back to reference Buchegger S, Boudec JYL (2003) Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks. Technical report IC/2003/31, Ecole Polytechnique Federale de Lausanne, May 2003 Buchegger S, Boudec JYL (2003) Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks. Technical report IC/2003/31, Ecole Polytechnique Federale de Lausanne, May 2003
20.
go back to reference Buchegger S, Boudec J (2004) A robust reputation system for p2p and mobile ad-hoc networks. In: Second workshop on the economics of peer-to-peer systems, June 2004 Buchegger S, Boudec J (2004) A robust reputation system for p2p and mobile ad-hoc networks. In: Second workshop on the economics of peer-to-peer systems, June 2004
21.
go back to reference Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of CMS 2002, pp 107–121CrossRef Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of CMS 2002, pp 107–121CrossRef
22.
go back to reference Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of 6th ACM MOBICOM 2000, pp 255–265 Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of 6th ACM MOBICOM 2000, pp 255–265
23.
go back to reference Marias G, Georgiadis P, Flitzanis D, Mandalas K (2006) Cooperation enforcement schemes for manets: a survey. Wiley’s J Wirel Commun Mobile Comput 6:319–332CrossRef Marias G, Georgiadis P, Flitzanis D, Mandalas K (2006) Cooperation enforcement schemes for manets: a survey. Wiley’s J Wirel Commun Mobile Comput 6:319–332CrossRef
24.
go back to reference Bansal S, Baker M (2003) Observation-based cooperation enforcement in ad-hoc networks. Techical Report, Stanford University Bansal S, Baker M (2003) Observation-based cooperation enforcement in ad-hoc networks. Techical Report, Stanford University
25.
go back to reference He Q, Wu D, Khosla P (2004) Sori: a secure and objective reputation based incentive scheme for ad-hoc networks. In: Proceedings of IEEE WCNC 2004, vol. 2, pp 825–830 He Q, Wu D, Khosla P (2004) Sori: a secure and objective reputation based incentive scheme for ad-hoc networks. In: Proceedings of IEEE WCNC 2004, vol. 2, pp 825–830
26.
go back to reference Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: Proceedings of tenth international conference on parallel and distributed systems ICPADS 2004, pp 665–672 Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: Proceedings of tenth international conference on parallel and distributed systems ICPADS 2004, pp 665–672
27.
go back to reference Zhong S, Chen J, Yang YR (2003) Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE INFOCOM 2003, pp 1987–1997 Zhong S, Chen J, Yang YR (2003) Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE INFOCOM 2003, pp 1987–1997
28.
go back to reference Y. H, M. X, and L. S (2002) Self-organized network-layer security in mobile ad hoc networks. In: Proceedings of ACM WiSe 2002, pp 11–20, September 2002 Y. H, M. X, and L. S (2002) Self-organized network-layer security in mobile ad hoc networks. In: Proceedings of ACM WiSe 2002, pp 11–20, September 2002
29.
go back to reference Anderegg L, Eidenbenz S (2003) Ad hoc-vcg: a truthful and cost efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of MOBICOM 2003, pp. 245–259 Anderegg L, Eidenbenz S (2003) Ad hoc-vcg: a truthful and cost efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of MOBICOM 2003, pp. 245–259
30.
go back to reference Nekkanti RK, Lee C (2004) Trust-based adaptive on demand ad hoc routing protocol. In: Proceedings of 42th annual ACM southeast regional conference, pp 88–93 Nekkanti RK, Lee C (2004) Trust-based adaptive on demand ad hoc routing protocol. In: Proceedings of 42th annual ACM southeast regional conference, pp 88–93
31.
go back to reference Pirzada AA, McDonald C (2004) Establishing trust in pure ad-hoc networks. In: Proceedings of 27th conference on Australasian computer science CRPIT 2004, pp 47–54 Pirzada AA, McDonald C (2004) Establishing trust in pure ad-hoc networks. In: Proceedings of 27th conference on Australasian computer science CRPIT 2004, pp 47–54
32.
go back to reference Ghosh T, Pissinou N, Makki K (2004) Collaborative trust-based routing in multi-hop ad hoc networks. In: Proceedings of 3rd International IFIPTC06 Networking Conference, pp 1446–1451, Lecture Notes in Computer Science, May 2004 Ghosh T, Pissinou N, Makki K (2004) Collaborative trust-based routing in multi-hop ad hoc networks. In: Proceedings of 3rd International IFIPTC06 Networking Conference, pp 1446–1451, Lecture Notes in Computer Science, May 2004
33.
go back to reference Ghosh T, Pissinou N, Makki K (2005) Towards designing a trust routing solution in mobile ad hoc networks. Mobile Netw Appl 10:985–995CrossRef Ghosh T, Pissinou N, Makki K (2005) Towards designing a trust routing solution in mobile ad hoc networks. Mobile Netw Appl 10:985–995CrossRef
34.
go back to reference Zouridaki BL Mark MH, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of 3rd ACM workshop on security for Ad Hoc and sensor networks, pp 1–10 Zouridaki BL Mark MH, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of 3rd ACM workshop on security for Ad Hoc and sensor networks, pp 1–10
35.
go back to reference Zouridaki BL, Mark MH, Thomas RK (2006) Robust cooperative trust establishment for manets. In: Proceedings of 4th ACM workshop on security of Ad Hoc and sensor networks, pp 23–34 Zouridaki BL, Mark MH, Thomas RK (2006) Robust cooperative trust establishment for manets. In: Proceedings of 4th ACM workshop on security of Ad Hoc and sensor networks, pp 23–34
36.
go back to reference Ruidong L, Jie L, Peng L, Chen HH (2007) An objective trust management framework for mobile ad hoc networks. In: Proceedings of IEEE 65th vehicular technology conference 2007, pp 56–60 Ruidong L, Jie L, Peng L, Chen HH (2007) An objective trust management framework for mobile ad hoc networks. In: Proceedings of IEEE 65th vehicular technology conference 2007, pp 56–60
37.
go back to reference Sun YL, Yu W, Han Z, Liu KJR (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE JSAC 24:305–317 Sun YL, Yu W, Han Z, Liu KJR (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE JSAC 24:305–317
38.
go back to reference Abusalah L, Khokhar A, Guizani M (2008) A survey of secure mobile ad hoc routing protocols. IEEE Commun Surv Tutorials 19:78–93CrossRef Abusalah L, Khokhar A, Guizani M (2008) A survey of secure mobile ad hoc routing protocols. IEEE Commun Surv Tutorials 19:78–93CrossRef
39.
go back to reference Balakrishnnan V, Varadharajan V, Tupakula UK, Lucs P (2007) Trust and recommendations in mobile ad hoc networks. In: Proceedings of 10th IEEE international conference on networking and services, pp 64–69 Balakrishnnan V, Varadharajan V, Tupakula UK, Lucs P (2007) Trust and recommendations in mobile ad hoc networks. In: Proceedings of 10th IEEE international conference on networking and services, pp 64–69
40.
go back to reference Reidt S, Wolthusen SD, Balfe S (2009) Robust and efficient communication overlays for trust authority computations. In: Proceedings of 32nd IEEE Sarnoff symposium 2009, pp 88–92 Reidt S, Wolthusen SD, Balfe S (2009) Robust and efficient communication overlays for trust authority computations. In: Proceedings of 32nd IEEE Sarnoff symposium 2009, pp 88–92
41.
go back to reference Wang X, Liu L, Su J (2010) Rlm: a general model for trust representation and aggregation. IEEE Trans Serv Comput 5:131–143CrossRef Wang X, Liu L, Su J (2010) Rlm: a general model for trust representation and aggregation. IEEE Trans Serv Comput 5:131–143CrossRef
42.
go back to reference Weimerskirch A, Thonet G (2001) A distributed light-weight authentication model for ad-hoc networks. In: Proceedings of 4th international conference on information security and cryptology, pp 77–82 Weimerskirch A, Thonet G (2001) A distributed light-weight authentication model for ad-hoc networks. In: Proceedings of 4th international conference on information security and cryptology, pp 77–82
43.
go back to reference Verma RRS, O’Mahony D, Tewari H (2001) Ntm – progressive trust negotiation in ad hoc networks. In: Proceedings of 1st joint IEI/IEE symposium on telecommunications Systems Research Verma RRS, O’Mahony D, Tewari H (2001) Ntm – progressive trust negotiation in ad hoc networks. In: Proceedings of 1st joint IEI/IEE symposium on telecommunications Systems Research
44.
go back to reference Pirzada AA, McDonald C, Datta A (2006) Performance comparison of trust-based reactive routing protocols. IEEE Trans Mobile Comput 5:695–710CrossRef Pirzada AA, McDonald C, Datta A (2006) Performance comparison of trust-based reactive routing protocols. IEEE Trans Mobile Comput 5:695–710CrossRef
45.
go back to reference Ngai ECH, Lyu MR (2004) Trust and clustering-based authentication services in mobile ad hoc network. In: Proceedings of 24th IEEE ICDCS workshops, pp 582–587 Ngai ECH, Lyu MR (2004) Trust and clustering-based authentication services in mobile ad hoc network. In: Proceedings of 24th IEEE ICDCS workshops, pp 582–587
46.
go back to reference Hegland A, Winjum E, Mjolsnes SF, Rong C, Kure O, Spilling P (2006) A survey of key management in ad hoc networks. IEEE Commun Surv Tutorials 8:48–66CrossRef Hegland A, Winjum E, Mjolsnes SF, Rong C, Kure O, Spilling P (2006) A survey of key management in ad hoc networks. IEEE Commun Surv Tutorials 8:48–66CrossRef
47.
go back to reference Virendra M, Jadliwala M, Chandrasekaran M, Upadhyaya S (2005) Quantifying trust in mobile ad hoc networks. Proc IEEE KIMAS 2005:65–71 Virendra M, Jadliwala M, Chandrasekaran M, Upadhyaya S (2005) Quantifying trust in mobile ad hoc networks. Proc IEEE KIMAS 2005:65–71
48.
go back to reference Li R, Li J, Liu P, Chen HH (2006) On demand public key management for mobile ad hoc networks. Wiley WCMC 6:295–306 Li R, Li J, Liu P, Chen HH (2006) On demand public key management for mobile ad hoc networks. Wiley WCMC 6:295–306
49.
go back to reference Chang BJ, Kuo SL (2009) Markov chain trust model for trust value analysis and key management in distributed multicast manets. IEEE Trans Veh Technol 58:1846–1863CrossRef Chang BJ, Kuo SL (2009) Markov chain trust model for trust value analysis and key management in distributed multicast manets. IEEE Trans Veh Technol 58:1846–1863CrossRef
50.
go back to reference Yan Z, Prehofer C, (2010) Autonomic trust management for a component based software system. In: IEEE transactions on dependable and secure computing, accepted on April 2010 Yan Z, Prehofer C, (2010) Autonomic trust management for a component based software system. In: IEEE transactions on dependable and secure computing, accepted on April 2010
51.
go back to reference Jiang T, Baras JS (2004) Ant-based adaptive trust evidence distribution in manet. In: Proceedings of 2nd international conference on mobile distributed computing systems workshops, pp 588–593 Jiang T, Baras JS (2004) Ant-based adaptive trust evidence distribution in manet. In: Proceedings of 2nd international conference on mobile distributed computing systems workshops, pp 588–593
52.
go back to reference Jiang T, Baras JS (2004) Cooperative games, phase transition on graphs and distributed trust in manets. In: Proceedings of 43th IEEE conference on decision and control, pp. 93–98 Jiang T, Baras JS (2004) Cooperative games, phase transition on graphs and distributed trust in manets. In: Proceedings of 43th IEEE conference on decision and control, pp. 93–98
53.
go back to reference Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE JSAC 24:318–328 Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE JSAC 24:318–328
54.
go back to reference Boukerche A, Ren Y (2008) A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. In: Proceedings of international workshop on modeling analysis and simulation of wireless and Mobile systems, pp 88–95 Boukerche A, Ren Y (2008) A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. In: Proceedings of international workshop on modeling analysis and simulation of wireless and Mobile systems, pp 88–95
55.
go back to reference Cho JH, Swami A, Chen IR (2009) Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In: Proceedings international conference on computational science and engineering, pp 641–650, Springer LNCS, August 29–31 2009 Cho JH, Swami A, Chen IR (2009) Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks. In: Proceedings international conference on computational science and engineering, pp 641–650, Springer LNCS, August 29–31 2009
56.
go back to reference Chatterjee P, Ghosh U, Sengupta I, Ghosh SK (2014) A trust enhanced secure clustering framework for wireless ad hoc networks. Springer Wirel Netw 20(7):1669–1684CrossRef Chatterjee P, Ghosh U, Sengupta I, Ghosh SK (2014) A trust enhanced secure clustering framework for wireless ad hoc networks. Springer Wirel Netw 20(7):1669–1684CrossRef
Metadata
Title
On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc Networks
Authors
Uttam Ghosh
Pushpita Chatterjee
Al-Sakib Khan Pathan
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-35642-2_5

Premium Partner