Skip to main content

2014 | OriginalPaper | Buchkapitel

Protocol Integration for Trust-Based Communication

verfasst von : Fatma Laidoui, Thouraya Bouabana-Tebibel

Erschienen in: Integration of Reusable Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In mobile ad hoc networks (MANETs), nodes have to cooperate in order to accomplish routing tasks . Nevertheless, they have limited resources, and may behave in a selfish way. On the other hand, the networking infrastructure supporting routing is quite weak faced with such misbehaviors. In this chapter, we propose a trust model for reactive routing in MANETs. The proposed solution applies to any source routing protocol. It is based on mechanisms inspired by the CONFIDANT protocol to install and update trust in the network. The model also integrates new protocols to improve trust in the selected routes. It may adapt to topology changes caused by the mobility of nodes and takes into account new routes learned after the route request phase. Finally, it improves the choice of the safest route towards the destination. Fundamental and elaborate tests prove the efficiency of the solution.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kargl, F., Klenk, A., Schlott, S., Weber, M.: Advanced detection of selfish or malicious nodes in ad hoc networks. In: Proceedings of 1st European Workshop on Security in Ad-hoc and Sensor Networks, ESAS 2004, Heidelberg, Germany, pp. 152–165 (2004) Kargl, F., Klenk, A., Schlott, S., Weber, M.: Advanced detection of selfish or malicious nodes in ad hoc networks. In: Proceedings of 1st European Workshop on Security in Ad-hoc and Sensor Networks, ESAS 2004, Heidelberg, Germany, pp. 152–165 (2004)
2.
Zurück zum Zitat Bhalaji, N., Shanmugam, A.: A trust based technique to isolate non-forwarding nodes in DSR based mobile ad hoc networks. In: The third International Conference on Network Security and Applications, Chennai, India (2010) Bhalaji, N., Shanmugam, A.: A trust based technique to isolate non-forwarding nodes in DSR based mobile ad hoc networks. In: The third International Conference on Network Security and Applications, Chennai, India (2010)
3.
Zurück zum Zitat Buchegger, S., Mundinger, J., Le Boudec, J.Y.: Reputation systems for self-organized networks. IEEE Technol. Soc. Mag. 27(1), 41–47 (2008)CrossRef Buchegger, S., Mundinger, J., Le Boudec, J.Y.: Reputation systems for self-organized networks. IEEE Technol. Soc. Mag. 27(1), 41–47 (2008)CrossRef
4.
Zurück zum Zitat Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP Conference on Communications and Multi-media Security, Kluwer, B.V. Deventer, The Netherlands vol. 228, pp. 107–121 (2002) Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP Conference on Communications and Multi-media Security, Kluwer, B.V. Deventer, The Netherlands vol. 228, pp. 107–121 (2002)
5.
Zurück zum Zitat Arya, K.V., Vashistha, P., Gupta, V.: Three phase technique for intrusion detection in mobile ad hoc network. In: DICTAP 2011, vol. 166, pp. 675–684 (2011) Arya, K.V., Vashistha, P., Gupta, V.: Three phase technique for intrusion detection in mobile ad hoc network. In: DICTAP 2011, vol. 166, pp. 675–684 (2011)
6.
Zurück zum Zitat Buchegger, S., Le Boudec, J.Y.: Performance analysis of the confidant protocol. In: ACM 3rd International Symposium on Mobile Ad hoc Networking and Computing-MobiHoc’02, pp. 226–236 (2002) Buchegger, S., Le Boudec, J.Y.: Performance analysis of the confidant protocol. In: ACM 3rd International Symposium on Mobile Ad hoc Networking and Computing-MobiHoc’02, pp. 226–236 (2002)
7.
Zurück zum Zitat Buchegger, S., Le Boudec, J.Y.: A robust reputation system for P2P and mobile ad hoc networks. In: Proceedings of P2PEcon 2004 (2004) Buchegger, S., Le Boudec, J.Y.: A robust reputation system for P2P and mobile ad hoc networks. In: Proceedings of P2PEcon 2004 (2004)
8.
Zurück zum Zitat Yang, X., Gao, Y.: A routing protocol based on trust for MANETs. In: Zhuge H., Fox G.C. (eds.) Proc. 4th International Conference on Grid and Cooperative Computing GCC 2005, vol. 3795, pp. 959–964. LNCS, Beijing, China, Nov 30–Dec 3 (2005) Yang, X., Gao, Y.: A routing protocol based on trust for MANETs. In: Zhuge H., Fox G.C. (eds.) Proc. 4th International Conference on Grid and Cooperative Computing GCC 2005, vol. 3795, pp. 959–964. LNCS, Beijing, China, Nov 30–Dec 3 (2005)
9.
Zurück zum Zitat Johnson, D. B., Maltz, D.A., Broch, J.: DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In: Perkins C.E. (ed.) Ad Hoc Networking. Addison-Wesley, Reading (2001) Johnson, D. B., Maltz, D.A., Broch, J.: DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In: Perkins C.E. (ed.) Ad Hoc Networking. Addison-Wesley, Reading (2001)
10.
Zurück zum Zitat Johnson, D.B., Hu, Y-C., Maltz, D.A.: The dynamic source routing protocol (DSR) for mobile ad hoc networks. IETF RFC4728 (2007) Johnson, D.B., Hu, Y-C., Maltz, D.A.: The dynamic source routing protocol (DSR) for mobile ad hoc networks. IETF RFC4728 (2007)
11.
Zurück zum Zitat Suresh, A., Duraiswamy, K.: Routing protocol with node reputation scheme. J. Comput. Sci. 7(2), 242–249 (2011)CrossRef Suresh, A., Duraiswamy, K.: Routing protocol with node reputation scheme. J. Comput. Sci. 7(2), 242–249 (2011)CrossRef
12.
Zurück zum Zitat Balakrishnan, K., Deng, J., Varshney, P.K.: TWOACK: preventing selfishness in mobile ad hoc networks. In: Proceedings of Wireless Communication and Networking Conference, New Orleans, LA, USA (2005) Balakrishnan, K., Deng, J., Varshney, P.K.: TWOACK: preventing selfishness in mobile ad hoc networks. In: Proceedings of Wireless Communication and Networking Conference, New Orleans, LA, USA (2005)
13.
Zurück zum Zitat Djenouri, D., Ouali, N., Mahmoudi, A., Badache, N.: Random feedbacks for selfish nodes detection in mobile ad hoc networks. In: The 5th IEEE International Workshop on IP Operations and Management-IPOM 2005, Barcelona, Spain (2005) Djenouri, D., Ouali, N., Mahmoudi, A., Badache, N.: Random feedbacks for selfish nodes detection in mobile ad hoc networks. In: The 5th IEEE International Workshop on IP Operations and Management-IPOM 2005, Barcelona, Spain (2005)
14.
Zurück zum Zitat Abd El-Haleem, A.M., Ali, I.A.: TRIUMF: trust-based routing protocol with controlled degree of selfishness for securing MANET against packet dropping attack. Int. J. Comput. Sci. Issues, 8(4), 1 (2011) Abd El-Haleem, A.M., Ali, I.A.: TRIUMF: trust-based routing protocol with controlled degree of selfishness for securing MANET against packet dropping attack. Int. J. Comput. Sci. Issues, 8(4), 1 (2011)
15.
Zurück zum Zitat Zhao, L., Delgado-Frias, J.G.: MARS: Misbehavior Detection in Ad Hoc Network. IEEE GLOBECOM, Washington (2007) Zhao, L., Delgado-Frias, J.G.: MARS: Misbehavior Detection in Ad Hoc Network. IEEE GLOBECOM, Washington (2007)
16.
Zurück zum Zitat Sukumran, S., Jaganathan, V., Korath, A.: Reputation based dynamic source routing protocol for MANET. Int. J. Comput. Appl. 47(4), 42–46 (2012) Sukumran, S., Jaganathan, V., Korath, A.: Reputation based dynamic source routing protocol for MANET. Int. J. Comput. Appl. 47(4), 42–46 (2012)
17.
Zurück zum Zitat Choudhury, S., Roy, S.D., Singh, S.A.: Trust management in ad hoc network for secure DSR routing, novel algorithms and techniques. In: Sobh, T., Elleithy, K., Mahmood, A., Karim, M.A. (eds.) Telecommunications, Automation and Industrial Electronics, pp. 496–500. Springer, The Netherlands (2008) Choudhury, S., Roy, S.D., Singh, S.A.: Trust management in ad hoc network for secure DSR routing, novel algorithms and techniques. In: Sobh, T., Elleithy, K., Mahmood, A., Karim, M.A. (eds.) Telecommunications, Automation and Industrial Electronics, pp. 496–500. Springer, The Netherlands (2008)
18.
Zurück zum Zitat Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: ODSBR: an on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Sec. 10, 3 (2007) Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: ODSBR: an on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Sec. 10, 3 (2007)
19.
Zurück zum Zitat Awerbuch, B., Scheideler, C.: Robust random number generation for peer-to-peer systems. Theor. Comput. Sci. Elsevier 410(6–7), 453–466.28 (2009) Awerbuch, B., Scheideler, C.: Robust random number generation for peer-to-peer systems. Theor. Comput. Sci. Elsevier 410(6–7), 453–466.28 (2009)
20.
Zurück zum Zitat Yong, C., Chuanhe, H., Wenming, S.: Trusted dynamic source routing protocol. In: Wireless Communications, Networking and Mobile Computing (WiCom) pp. 1632–1636 (2007) Yong, C., Chuanhe, H., Wenming, S.: Trusted dynamic source routing protocol. In: Wireless Communications, Networking and Mobile Computing (WiCom) pp. 1632–1636 (2007)
21.
Zurück zum Zitat Quercia, D., Hailes, S., Capra, L.: B-trust: Bayesian trust framework for pervasive computing. In: Proceedings of the 4th International Conference on Trust Management (iTrust), Pisa, Italy, pp. 298–312, May (2006) Quercia, D., Hailes, S., Capra, L.: B-trust: Bayesian trust framework for pervasive computing. In: Proceedings of the 4th International Conference on Trust Management (iTrust), Pisa, Italy, pp. 298–312, May (2006)
22.
Zurück zum Zitat Marias, G.F., Georgiadis, P., Flitzanis, D., Mandalas, K.: Cooperation enforcement schemes for MANETs: a survey. Wirel. Commun. Mob. Comput. Wirel. Netw. Sec. 6(3), 319–332 (2006) Marias, G.F., Georgiadis, P., Flitzanis, D., Mandalas, K.: Cooperation enforcement schemes for MANETs: a survey. Wirel. Commun. Mob. Comput. Wirel. Netw. Sec. 6(3), 319–332 (2006)
23.
Zurück zum Zitat Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad-hoc networks. Stanford University, Technical Report (2003) Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad-hoc networks. Stanford University, Technical Report (2003)
Metadaten
Titel
Protocol Integration for Trust-Based Communication
verfasst von
Fatma Laidoui
Thouraya Bouabana-Tebibel
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-04717-1_15