Skip to main content
Erschienen in: Wireless Personal Communications 3/2017

04.08.2017

Generalized Trust Model for Cooperative Routing in MANETs

verfasst von: P. Raghu Vamsi, Krishna Kant

Erschienen in: Wireless Personal Communications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Routing in a Mobile Ad-Hoc Network (MANET) is prone to various security attacks due to the limitations such as openness, decentralized and infrastructure less network operations. Many of such routing attacks are possible to detect by observing the functional behavior of nodes such as sincerity in packet forwarding, maintaining packet integrity, etc. To do this, the trustworthiness of each node has to be assessed via behavior observation. There exist several methods in the literature for trust assessment. However, each trust model has its advantages and limitations. Further, a common trust model that can be applicable to diverse routing protocols is limited. To this end, the objective of this paper is to propose a Generalized Trust Model (GTM) over MANET routing protocols. GTM is designed to offer self-adaptability, lightweight communication, and effective identification and isolation of malicious nodes during the routing process. The proposed trust model has applied with proactive, reactive, and geographic routing methods. Results that are obtained from the network simulator NS-2 have shown that the proposed method significantly improved the network performance metrics such as packet delivery fraction, throughput, routing load, and end-to-end delay as compared to existing trust models.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abu-Ghazaleh, N., Kang, K.D., Liu, K. (2005). Towards resilient geographic routing in wsns. In Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks (pp. 71–78). ACM. Abu-Ghazaleh, N., Kang, K.D., Liu, K. (2005). Towards resilient geographic routing in wsns. In Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks (pp. 71–78). ACM.
2.
Zurück zum Zitat Adnane, A., Bidan, C., & de Sousa Júnior, R. T. (2013). Trust-based security for the olsr routing protocol. Computer Communications, 36(10), 1159–1171.CrossRef Adnane, A., Bidan, C., & de Sousa Júnior, R. T. (2013). Trust-based security for the olsr routing protocol. Computer Communications, 36(10), 1159–1171.CrossRef
3.
Zurück zum Zitat Alzaid, H., Foo, E., Nieto, J.G. (2008). Rsda: reputation-based secure data aggregation in wireless sensor networks. In Ninth international conference on parallel and distributed computing, applications and technologies, 2008. PDCAT 2008. (pp. 419–424). IEEE. Alzaid, H., Foo, E., Nieto, J.G. (2008). Rsda: reputation-based secure data aggregation in wireless sensor networks. In Ninth international conference on parallel and distributed computing, applications and technologies, 2008. PDCAT 2008. (pp. 419–424). IEEE.
4.
Zurück zum Zitat Aruldoss, M., Lakshmi, T. M., & Venkatesan, V. P. (2013). A survey on multi criteria decision making methods and its applications. American Journal of Information Systems, 1(1), 31–43. Aruldoss, M., Lakshmi, T. M., & Venkatesan, V. P. (2013). A survey on multi criteria decision making methods and its applications. American Journal of Information Systems, 1(1), 31–43.
5.
Zurück zum Zitat Babu, S. S., Raha, A., Naskar, M. K., et al. (2011). A direct trust dependent link state routing protocol using route trusts for wsns (dtlsrp). Wireless Sensor Network, 3(04), 125.CrossRef Babu, S. S., Raha, A., Naskar, M. K., et al. (2011). A direct trust dependent link state routing protocol using route trusts for wsns (dtlsrp). Wireless Sensor Network, 3(04), 125.CrossRef
6.
Zurück zum Zitat Buchegger, S., Le Boudec, J.Y. (2002). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing (pp. 226–236). ACM. Buchegger, S., Le Boudec, J.Y. (2002). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing (pp. 226–236). ACM.
7.
Zurück zum Zitat Changiz, R., Halabian, H., Yu, F.R., Lambadaris, I., Tang, H., Peter, C.M. (2010). Trust establishment in cooperative wireless networks. In Military communications conference, 2010-MILCOM 2010 (pp. 1074–1079). IEEE. Changiz, R., Halabian, H., Yu, F.R., Lambadaris, I., Tang, H., Peter, C.M. (2010). Trust establishment in cooperative wireless networks. In Military communications conference, 2010-MILCOM 2010 (pp. 1074–1079). IEEE.
8.
Zurück zum Zitat Cho, J. H., Swami, A., & Chen, I. R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.CrossRef Cho, J. H., Swami, A., & Chen, I. R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.CrossRef
9.
Zurück zum Zitat Clausen, T., Jacquet, P. (2003). Optimized link state routing protocol (olsr). Technical report. Clausen, T., Jacquet, P. (2003). Optimized link state routing protocol (olsr). Technical report.
10.
Zurück zum Zitat Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: Milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85–96.CrossRef Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: Milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85–96.CrossRef
11.
Zurück zum Zitat Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. (2013). A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless Personal Communications, 70(1), 189–205.CrossRef Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. (2013). A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless Personal Communications, 70(1), 189–205.CrossRef
12.
Zurück zum Zitat Duan, J., Yang, D., Zhu, H., Zhang, S., Zhao, J. (2014). Tsrf: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 1–14. Duan, J., Yang, D., Zhu, H., Zhang, S., Zhao, J. (2014). Tsrf: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 1–14.
13.
Zurück zum Zitat Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.CrossRef Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.CrossRef
14.
Zurück zum Zitat Ho, J. W., Wright, M., & Das, S. K. (2012). Zonetrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing. IEEE Transactions on Dependable and Secure Computing, 9(4), 494–511.CrossRef Ho, J. W., Wright, M., & Das, S. K. (2012). Zonetrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing. IEEE Transactions on Dependable and Secure Computing, 9(4), 494–511.CrossRef
15.
Zurück zum Zitat Hung, K. S., Lui, K. S., Kwok, Y. K. (2007). A trust-based geographical routing scheme in sensor networks. In Wireless communications and networking conference, 2007. WCNC 2007. IEEE (pp. 3123–3127). IEEE. Hung, K. S., Lui, K. S., Kwok, Y. K. (2007). A trust-based geographical routing scheme in sensor networks. In Wireless communications and networking conference, 2007. WCNC 2007. IEEE (pp. 3123–3127). IEEE.
16.
Zurück zum Zitat Johnson, D. B., Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153–181). Springer. Johnson, D. B., Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153–181). Springer.
17.
Zurück zum Zitat Jsang, A., Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th bled electronic commerce conference (vol. 5, pp. 2502–2511). Jsang, A., Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th bled electronic commerce conference (vol. 5, pp. 2502–2511).
18.
Zurück zum Zitat Karp, B., Kung, H.T. (2000). Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 243–254). ACM. Karp, B., Kung, H.T. (2000). Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 243–254). ACM.
19.
Zurück zum Zitat Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.CrossRef Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.CrossRef
20.
Zurück zum Zitat Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced communications and multimedia security (pp. 107–121). Springer. Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced communications and multimedia security (pp. 107–121). Springer.
21.
Zurück zum Zitat Momani, M., Challa, S., Alhmouz, R. (2008). Bnwsn: Bayesian network trust model for wireless sensor networks. In Mosharaka international conference on communications, computers and applications, 2008. MIC-CCA 2008 (pp. 110–115). IEEE. Momani, M., Challa, S., Alhmouz, R. (2008). Bnwsn: Bayesian network trust model for wireless sensor networks. In Mosharaka international conference on communications, computers and applications, 2008. MIC-CCA 2008 (pp. 110–115). IEEE.
22.
Zurück zum Zitat Park, V.D., Corson, M.S. (1997). A highly adaptive distributed routing algorithm for mobile wireless networks. In INFOCOM’97. Sixteenth annual joint conference of the IEEE computer and communications societies. Driving the information revolution. Proceedings IEEE (vol. 3, pp. 1405–1413). IEEE. Park, V.D., Corson, M.S. (1997). A highly adaptive distributed routing algorithm for mobile wireless networks. In INFOCOM’97. Sixteenth annual joint conference of the IEEE computer and communications societies. Driving the information revolution. Proceedings IEEE (vol. 3, pp. 1405–1413). IEEE.
23.
Zurück zum Zitat Perkins, C., Belding-Royer, E., Das, S. (2003). Ad hoc on-demand distance vector (aodv) routing. Technical report. Perkins, C., Belding-Royer, E., Das, S. (2003). Ad hoc on-demand distance vector (aodv) routing. Technical report.
24.
Zurück zum Zitat Perkins, C.E., Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In ACM SIGCOMM computer communication review (Vol. 24, pp. 234–244). ACM. Perkins, C.E., Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In ACM SIGCOMM computer communication review (Vol. 24, pp. 234–244). ACM.
25.
Zurück zum Zitat Pirzada, A.A., McDonald, C. (2007). Trusted greedy perimeter stateless routing. In 15th IEEE international conference on networks, 2007. ICON 2007 (pp. 206–211). IEEE. Pirzada, A.A., McDonald, C. (2007). Trusted greedy perimeter stateless routing. In 15th IEEE international conference on networks, 2007. ICON 2007 (pp. 206–211). IEEE.
26.
Zurück zum Zitat Pirzada, A. A., McDonald, C., & Datta, A. (2006). Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing, 5(6), 695–710.CrossRef Pirzada, A. A., McDonald, C., & Datta, A. (2006). Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing, 5(6), 695–710.CrossRef
27.
Zurück zum Zitat Probst, M.J., Kasera, S.K. (2007). Statistical trust establishment in wireless sensor networks. In International conference on parallel and distributed systems (Vol. 2, pp. 1–8). IEEE. Probst, M.J., Kasera, S.K. (2007). Statistical trust establishment in wireless sensor networks. In International conference on parallel and distributed systems (Vol. 2, pp. 1–8). IEEE.
28.
Zurück zum Zitat Steele, K., Carmel, Y., Cross, J., & Wilcox, C. (2009). Uses and misuses of multicriteria decision analysis (MCDA) in environmental decision making. Risk Analysis, 29(1), 26–33.CrossRef Steele, K., Carmel, Y., Cross, J., & Wilcox, C. (2009). Uses and misuses of multicriteria decision analysis (MCDA) in environmental decision making. Risk Analysis, 29(1), 26–33.CrossRef
29.
Zurück zum Zitat Vamsi, P.R., Kant, K. (2014). Systematic design of trust management systems for wireless sensor networks: A review. In 2014 Fourth international conference on advanced computing & communication technologies (ACCT) (pp. 208–215). IEEE. Vamsi, P.R., Kant, K. (2014). Systematic design of trust management systems for wireless sensor networks: A review. In 2014 Fourth international conference on advanced computing & communication technologies (ACCT) (pp. 208–215). IEEE.
30.
Zurück zum Zitat Venkanna, U., Agarwal, J. K., & Velusamy, R. L. (2015). A cooperative routing for manet based on distributed trust and energy management. Wireless Personal Communications, 81(3), 961–979.CrossRef Venkanna, U., Agarwal, J. K., & Velusamy, R. L. (2015). A cooperative routing for manet based on distributed trust and energy management. Wireless Personal Communications, 81(3), 961–979.CrossRef
31.
Zurück zum Zitat Venkanna, U., & Velusamy, R. L. (2017). Cooperative routing in mobile ad hoc networks using fuzzy logic. International Journal of Ad Hoc and Ubiquitous Computing, 25(3), 147–162.CrossRef Venkanna, U., & Velusamy, R. L. (2017). Cooperative routing in mobile ad hoc networks using fuzzy logic. International Journal of Ad Hoc and Ubiquitous Computing, 25(3), 147–162.CrossRef
32.
Zurück zum Zitat Venkataraman, R., Pushpalatha, M., & Rama Rao, T. (2012). Regression-based trust model for mobile ad hoc networks. Information Security, IET, 6(3), 131–140.CrossRef Venkataraman, R., Pushpalatha, M., & Rama Rao, T. (2012). Regression-based trust model for mobile ad hoc networks. Information Security, IET, 6(3), 131–140.CrossRef
33.
Zurück zum Zitat Wang, J. W., Chen, H. C., & Lin, Y. P. (2010). A secure destination-sequenced distance-vector routing protocol for ad hoc networks. Journal of Networks, 5(8), 942–948.CrossRef Wang, J. W., Chen, H. C., & Lin, Y. P. (2010). A secure destination-sequenced distance-vector routing protocol for ad hoc networks. Journal of Networks, 5(8), 942–948.CrossRef
34.
Zurück zum Zitat Wang, Y., Lu, Y. C., Chen, I. R., Cho, J. H., Swami, A., & Lu, C. T. (2014, December). LogitTrust: A logit regression-based trust model for mobile ad hoc networks. In 6th ASE International Conference on Privacy, Security, Risk and Trust (pp. 1–10), Boston, MA. Wang, Y., Lu, Y. C., Chen, I. R., Cho, J. H., Swami, A., & Lu, C. T. (2014, December). LogitTrust: A logit regression-based trust model for mobile ad hoc networks. In 6th ASE International Conference on Privacy, Security, Risk and Trust (pp. 1–10), Boston, MA.
35.
Zurück zum Zitat Xia, H., Jia, Z., & Sha, E. H. M. (2013). Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Information Security, 8(2), 88–103.CrossRef Xia, H., Jia, Z., & Sha, E. H. M. (2013). Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Information Security, 8(2), 88–103.CrossRef
36.
Zurück zum Zitat Yu, Y., Govindan, R., Estrin, D. (2001). Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Technical report ucla/csd-tr-01-0023, UCLA Computer Science Department. Yu, Y., Govindan, R., Estrin, D. (2001). Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Technical report ucla/csd-tr-01-0023, UCLA Computer Science Department.
37.
Zurück zum Zitat Zahariadis, T., Trakadas, P., Leligou, H. C., Maniatis, S., & Karkazis, P. (2013). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–826.CrossRef Zahariadis, T., Trakadas, P., Leligou, H. C., Maniatis, S., & Karkazis, P. (2013). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–826.CrossRef
38.
Zurück zum Zitat Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106–107.CrossRef Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106–107.CrossRef
39.
Zurück zum Zitat Zhang, G., Zhang, Y., & Chen, Z. (2013). Using trust to secure geographic and energy aware routing against multiple attacks. PLoS ONE, 8(10), e77,488.CrossRef Zhang, G., Zhang, Y., & Chen, Z. (2013). Using trust to secure geographic and energy aware routing against multiple attacks. PLoS ONE, 8(10), e77,488.CrossRef
40.
Zurück zum Zitat Zougagh, H., Toumanari, A., Latif, R., Elmourabit, Y., Idboufker, N. (2014). Modified olsr protocol for detection and prevention of packet dropping attack in manet. International Journal of Computer Applications, 100(17), 32–38.CrossRef Zougagh, H., Toumanari, A., Latif, R., Elmourabit, Y., Idboufker, N. (2014). Modified olsr protocol for detection and prevention of packet dropping attack in manet. International Journal of Computer Applications,  100(17), 32–38.CrossRef
41.
Zurück zum Zitat Zougagh, H., Toumanari, A., Latif, R., & Idboufker, N. (2015). A novel security approach for struggling black hole attack in optimised link state routing protocol. International Journal of Sensor Networks, 18(1–2), 101–110.CrossRef Zougagh, H., Toumanari, A., Latif, R., & Idboufker, N. (2015). A novel security approach for struggling black hole attack in optimised link state routing protocol. International Journal of Sensor Networks, 18(1–2), 101–110.CrossRef
Metadaten
Titel
Generalized Trust Model for Cooperative Routing in MANETs
verfasst von
P. Raghu Vamsi
Krishna Kant
Publikationsdatum
04.08.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4730-1

Weitere Artikel der Ausgabe 3/2017

Wireless Personal Communications 3/2017 Zur Ausgabe

Neuer Inhalt