Skip to main content
Erschienen in: Wireless Networks 4/2010

01.05.2010

A cluster-based trust-aware routing protocol for mobile ad hoc networks

verfasst von: Haidar Safa, Hassan Artail, Diana Tabet

Erschienen in: Wireless Networks | Ausgabe 4/2010

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Routing protocols are the binding force in mobile ad hoc network (MANETs) since they facilitate communication beyond the wireless transmission range of the nodes. However, the infrastructure-less, pervasive, and distributed nature of MANETs renders them vulnerable to security threats. In this paper, we propose a novel cluster-based trust-aware routing protocol (CBTRP) for MANETs to protect forwarded packets from intermediary malicious nodes. The proposed protocol organizes the network into one-hop disjoint clusters then elects the most qualified and trustworthy nodes to play the role of cluster-heads that are responsible for handling all the routing activities. The proposed CBTRP continuously ensures the trustworthiness of cluster-heads by replacing them as soon as they become malicious and can dynamically update the packet path to avoid malicious routes. We have implemented and simulated the proposed protocol then evaluated its performance compared to the clustered based routing protocol (CBRP) as well as the 2ACK approach. Comparisons and analysis have shown the effectiveness of our proposed scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Andel, T. R., & Yasinac, A. (2006). On the credibility of manet simulations (Vol. 39, pp. 48–54). Los Alamitos, CA: IEEE Computer Society Press. Andel, T. R., & Yasinac, A. (2006). On the credibility of manet simulations (Vol. 39, pp. 48–54). Los Alamitos, CA: IEEE Computer Society Press.
2.
Zurück zum Zitat Arsenault, A. & Turner, S. (2000, November). Internet x.509 public key infrastructure. Internet Engineering Task Force (IETF). Arsenault, A. & Turner, S. (2000, November). Internet x.509 public key infrastructure. Internet Engineering Task Force (IETF).
3.
Zurück zum Zitat Bhargava, B., Zoltowski, M., & Meunier, P. (2002). Trusted routing and intruder identification in mobile ad hoc networks. Research proposal for cerias 2002. Purdue University. Bhargava, B., Zoltowski, M., & Meunier, P. (2002). Trusted routing and intruder identification in mobile ad hoc networks. Research proposal for cerias 2002. Purdue University.
4.
Zurück zum Zitat Buchegger, S. & Le Boudec, J.-Y. (2002, June 09–11). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing (MobiHoc ’02) (pp. 226–236), Lausanne, Switzerland. Buchegger, S. & Le Boudec, J.-Y. (2002, June 09–11). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing (MobiHoc ’02) (pp. 226–236), Lausanne, Switzerland.
5.
Zurück zum Zitat Chlamtac, I., Conti M., & Liu, J. (2003, July). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks 1(1), 13-64. Chlamtac, I., Conti M., & Liu, J. (2003, July). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks 1(1), 13-64.
6.
Zurück zum Zitat Chatterjee, M., Das, S. K., & Turgut, D. (2002, April). WCA: A weighted clusrering algorithm for mobile ad hoc networks. Journal of Cluster Computing, 5, 193–204.CrossRef Chatterjee, M., Das, S. K., & Turgut, D. (2002, April). WCA: A weighted clusrering algorithm for mobile ad hoc networks. Journal of Cluster Computing, 5, 193–204.CrossRef
7.
Zurück zum Zitat Hahn, G., Nyang, D., Song, J., Lee, J., & Park, B. (2004, May 12–15). Secure cluster based routing protocol incorporating the distributed pki mechanisms. In Proceedings of the 12th IEEE mediterranean electrotechnical conference (MELECON 2004) (pp. 787–790), Dubrovnik, Croatia. Hahn, G., Nyang, D., Song, J., Lee, J., & Park, B. (2004, May 12–15). Secure cluster based routing protocol incorporating the distributed pki mechanisms. In Proceedings of the 12th IEEE mediterranean electrotechnical conference (MELECON 2004) (pp. 787–790), Dubrovnik, Croatia.
8.
Zurück zum Zitat Hu, Y.-C., Perrig, A., & Johnson, D. (2005, January). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11, 21–38. Hu, Y.-C., Perrig, A., & Johnson, D. (2005, January). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11, 21–38.
9.
Zurück zum Zitat Jiang, M., Li, J., & Tay, Y. C. (1999). Cluster based routing protocol(cbrp). Internet Draft, MANET working group. Jiang, M., Li, J., & Tay, Y. C. (1999). Cluster based routing protocol(cbrp). Internet Draft, MANET working group.
10.
Zurück zum Zitat Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski & H. Korth (Eds.). Mobile computing (Vol. 353). Kluwer. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski & H. Korth (Eds.). Mobile computing (Vol. 353). Kluwer.
11.
Zurück zum Zitat Li, X., Lyu, M. R., & Liu, J. (2004, March 6–13). A trust model based routing protocol for secure ad hoc networks. In Proceedings 2004 IEEE aerospace conference (pp. 1286–1295), Big Sky, MT, USA. Li, X., Lyu, M. R., & Liu, J. (2004, March 6–13). A trust model based routing protocol for secure ad hoc networks. In Proceedings 2004 IEEE aerospace conference (pp. 1286–1295), Big Sky, MT, USA.
12.
Zurück zum Zitat Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007, May). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6, 536–550. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007, May). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6, 536–550.
13.
Zurück zum Zitat Liu, W., Chiang, C., Wu, H., & Gerla, C. (1997, April). Routing in clustered multihop mobile wireless networks with fading channel. In IEEE Singapore international conference on networks (SICON’97) (pp. 197–211). Liu, W., Chiang, C., Wu, H., & Gerla, C. (1997, April). Routing in clustered multihop mobile wireless networks with fading channel. In IEEE Singapore international conference on networks (SICON’97) (pp. 197–211).
15.
Zurück zum Zitat Palchaudhuri, S., Le Boudec, J. Y., & Vojnovic, M. (2005, April 4–6). Perfect simulations for random trip mobility models. In Proceedings of the 38th annual simulation symposium (pp. 72–79), San Diego, CA, USA. Palchaudhuri, S., Le Boudec, J. Y., & Vojnovic, M. (2005, April 4–6). Perfect simulations for random trip mobility models. In Proceedings of the 38th annual simulation symposium (pp. 72–79), San Diego, CA, USA.
16.
Zurück zum Zitat Park, C., Lee, Y. H., Yoon, H., Choi, D. S., & Jin, S. H. (2005, February). Cluster-based trust evaluation in ad hoc networks. In 7th international conference on advanced communication technology. LNCS (pp. 503–507). Park, C., Lee, Y. H., Yoon, H., Choi, D. S., & Jin, S. H. (2005, February). Cluster-based trust evaluation in ad hoc networks. In 7th international conference on advanced communication technology. LNCS (pp. 503–507).
17.
Zurück zum Zitat Perkins, C., & Bhagwat, P. (1994, August 31–September 2). Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In ACM SIGCOMM’94 conference on communications architectures, protocols and applications (pp. 234–244), London, UK. Perkins, C., & Bhagwat, P. (1994, August 31–September 2). Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In ACM SIGCOMM’94 conference on communications architectures, protocols and applications (pp. 234–244), London, UK.
18.
Zurück zum Zitat Perkins, C. E., & Royer, E. M. (1999, February 25–26). Ad-hoc on-demand distance vector routing. In Proceedings of the second IEEE workshop on mobile computer systems and applications (WMCSA ’99) (pp. 90–100), New Orleans, Louisiana. Perkins, C. E., & Royer, E. M. (1999, February 25–26). Ad-hoc on-demand distance vector routing. In Proceedings of the second IEEE workshop on mobile computer systems and applications (WMCSA ’99) (pp. 90–100), New Orleans, Louisiana.
19.
Zurück zum Zitat Pirzada, A. A., Datta, A., & Mcdonald, C. S. (2004, November). Trust based routing for ad-hoc wireless networks, In Proceedings of 12th IEEE international conference on networks (ICON’ 04) (pp. 326–330), Piscataway, NJ, USA. Pirzada, A. A., Datta, A., & Mcdonald, C. S. (2004, November). Trust based routing for ad-hoc wireless networks, In Proceedings of 12th IEEE international conference on networks (ICON’ 04) (pp. 326–330), Piscataway, NJ, USA.
20.
Zurück zum Zitat Pirzada, A. A., & McDonald, C. (2003, December 8–11). A review of secure routing protocols for ad hoc mobile wireless networks. In Proceedings of 7th international symposium on digital signal processing and communication systems (pp. 118–123), Brisbane, Australia. Pirzada, A. A., & McDonald, C. (2003, December 8–11). A review of secure routing protocols for ad hoc mobile wireless networks. In Proceedings of 7th international symposium on digital signal processing and communication systems (pp. 118–123), Brisbane, Australia.
21.
Zurück zum Zitat Pirzada, A. A., & McDonald, C. (2004, January 18–22). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australian conference on computer science (ACSC ’04) (pp. 47–54), Dunedin, New Zealand. Pirzada, A. A., & McDonald, C. (2004, January 18–22). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australian conference on computer science (ACSC ’04) (pp. 47–54), Dunedin, New Zealand.
22.
Zurück zum Zitat Royer, E., & Toh, C.-K. (1999, September). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Wireless Communications and IEEE Personal Communications, 6, 46–55. Royer, E., & Toh, C.-K. (1999, September). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Wireless Communications and IEEE Personal Communications, 6, 46–55.
23.
Zurück zum Zitat Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2002, November). A secure routing protocol for ad hoc networks, In Proceedings of the 10th IEEE international conference on network protocols (pp. 78–87), Paris, France. Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2002, November). A secure routing protocol for ad hoc networks, In Proceedings of the 10th IEEE international conference on network protocols (pp. 78–87), Paris, France.
24.
Zurück zum Zitat Theodorakopoulos, G., & Baras, J. S. (2004). Trust evaluation in ad-hoc networks. In Proceedings of the 2004 ACM workshop on wireless security (WiSe ’04) (pp. 1–10), New York, NY, USA. Theodorakopoulos, G., & Baras, J. S. (2004). Trust evaluation in ad-hoc networks. In Proceedings of the 2004 ACM workshop on wireless security (WiSe ’04) (pp. 1–10), New York, NY, USA.
25.
Zurück zum Zitat Virendra, M., Jadliwala, M., Chandrasekaran, M., & Upadhyaya, S. (2005, April 18–21). Quantifying trust in mobile ad-hoc networks. In Proceedings of the international conference on integration of knowledge intensive multi-agent systems (KIMAS) (pp. 65–70), Weltham , MA, USA. Virendra, M., Jadliwala, M., Chandrasekaran, M., & Upadhyaya, S. (2005, April 18–21). Quantifying trust in mobile ad-hoc networks. In Proceedings of the international conference on integration of knowledge intensive multi-agent systems (KIMAS) (pp. 65–70), Weltham , MA, USA.
Metadaten
Titel
A cluster-based trust-aware routing protocol for mobile ad hoc networks
verfasst von
Haidar Safa
Hassan Artail
Diana Tabet
Publikationsdatum
01.05.2010
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2010
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-009-0182-1

Weitere Artikel der Ausgabe 4/2010

Wireless Networks 4/2010 Zur Ausgabe

Neuer Inhalt