Skip to main content

Protocol Integration for Trust-Based Communication

  • Chapter
  • First Online:
Integration of Reusable Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 263))

Abstract

In mobile ad hoc networks (MANETs), nodes have to cooperate in order to accomplish routing tasks . Nevertheless, they have limited resources, and may behave in a selfish way. On the other hand, the networking infrastructure supporting routing is quite weak faced with such misbehaviors. In this chapter, we propose a trust model for reactive routing in MANETs. The proposed solution applies to any source routing protocol. It is based on mechanisms inspired by the CONFIDANT protocol to install and update trust in the network. The model also integrates new protocols to improve trust in the selected routes. It may adapt to topology changes caused by the mobility of nodes and takes into account new routes learned after the route request phase. Finally, it improves the choice of the safest route towards the destination. Fundamental and elaborate tests prove the efficiency of the solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kargl, F., Klenk, A., Schlott, S., Weber, M.: Advanced detection of selfish or malicious nodes in ad hoc networks. In: Proceedings of 1st European Workshop on Security in Ad-hoc and Sensor Networks, ESAS 2004, Heidelberg, Germany, pp. 152–165 (2004)

    Google Scholar 

  2. Bhalaji, N., Shanmugam, A.: A trust based technique to isolate non-forwarding nodes in DSR based mobile ad hoc networks. In: The third International Conference on Network Security and Applications, Chennai, India (2010)

    Google Scholar 

  3. Buchegger, S., Mundinger, J., Le Boudec, J.Y.: Reputation systems for self-organized networks. IEEE Technol. Soc. Mag. 27(1), 41–47 (2008)

    Article  Google Scholar 

  4. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP Conference on Communications and Multi-media Security, Kluwer, B.V. Deventer, The Netherlands vol. 228, pp. 107–121 (2002)

    Google Scholar 

  5. Arya, K.V., Vashistha, P., Gupta, V.: Three phase technique for intrusion detection in mobile ad hoc network. In: DICTAP 2011, vol. 166, pp. 675–684 (2011)

    Google Scholar 

  6. Buchegger, S., Le Boudec, J.Y.: Performance analysis of the confidant protocol. In: ACM 3rd International Symposium on Mobile Ad hoc Networking and Computing-MobiHoc’02, pp. 226–236 (2002)

    Google Scholar 

  7. Buchegger, S., Le Boudec, J.Y.: A robust reputation system for P2P and mobile ad hoc networks. In: Proceedings of P2PEcon 2004 (2004)

    Google Scholar 

  8. Yang, X., Gao, Y.: A routing protocol based on trust for MANETs. In: Zhuge H., Fox G.C. (eds.) Proc. 4th International Conference on Grid and Cooperative Computing GCC 2005, vol. 3795, pp. 959–964. LNCS, Beijing, China, Nov 30–Dec 3 (2005)

    Google Scholar 

  9. Johnson, D. B., Maltz, D.A., Broch, J.: DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In: Perkins C.E. (ed.) Ad Hoc Networking. Addison-Wesley, Reading (2001)

    Google Scholar 

  10. Johnson, D.B., Hu, Y-C., Maltz, D.A.: The dynamic source routing protocol (DSR) for mobile ad hoc networks. IETF RFC4728 (2007)

    Google Scholar 

  11. Suresh, A., Duraiswamy, K.: Routing protocol with node reputation scheme. J. Comput. Sci. 7(2), 242–249 (2011)

    Article  Google Scholar 

  12. Balakrishnan, K., Deng, J., Varshney, P.K.: TWOACK: preventing selfishness in mobile ad hoc networks. In: Proceedings of Wireless Communication and Networking Conference, New Orleans, LA, USA (2005)

    Google Scholar 

  13. Djenouri, D., Ouali, N., Mahmoudi, A., Badache, N.: Random feedbacks for selfish nodes detection in mobile ad hoc networks. In: The 5th IEEE International Workshop on IP Operations and Management-IPOM 2005, Barcelona, Spain (2005)

    Google Scholar 

  14. Abd El-Haleem, A.M., Ali, I.A.: TRIUMF: trust-based routing protocol with controlled degree of selfishness for securing MANET against packet dropping attack. Int. J. Comput. Sci. Issues, 8(4), 1 (2011)

    Google Scholar 

  15. Zhao, L., Delgado-Frias, J.G.: MARS: Misbehavior Detection in Ad Hoc Network. IEEE GLOBECOM, Washington (2007)

    Google Scholar 

  16. Sukumran, S., Jaganathan, V., Korath, A.: Reputation based dynamic source routing protocol for MANET. Int. J. Comput. Appl. 47(4), 42–46 (2012)

    Google Scholar 

  17. Choudhury, S., Roy, S.D., Singh, S.A.: Trust management in ad hoc network for secure DSR routing, novel algorithms and techniques. In: Sobh, T., Elleithy, K., Mahmood, A., Karim, M.A. (eds.) Telecommunications, Automation and Industrial Electronics, pp. 496–500. Springer, The Netherlands (2008)

    Google Scholar 

  18. Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: ODSBR: an on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Sec. 10, 3 (2007)

    Google Scholar 

  19. Awerbuch, B., Scheideler, C.: Robust random number generation for peer-to-peer systems. Theor. Comput. Sci. Elsevier 410(6–7), 453–466.28 (2009)

    Google Scholar 

  20. Yong, C., Chuanhe, H., Wenming, S.: Trusted dynamic source routing protocol. In: Wireless Communications, Networking and Mobile Computing (WiCom) pp. 1632–1636 (2007)

    Google Scholar 

  21. Quercia, D., Hailes, S., Capra, L.: B-trust: Bayesian trust framework for pervasive computing. In: Proceedings of the 4th International Conference on Trust Management (iTrust), Pisa, Italy, pp. 298–312, May (2006)

    Google Scholar 

  22. Marias, G.F., Georgiadis, P., Flitzanis, D., Mandalas, K.: Cooperation enforcement schemes for MANETs: a survey. Wirel. Commun. Mob. Comput. Wirel. Netw. Sec. 6(3), 319–332 (2006)

    Google Scholar 

  23. Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad-hoc networks. Stanford University, Technical Report (2003)

    Google Scholar 

  24. NS Manual, VINT Project. 2011, www.isi.edu/nsnam/ns/doc/ns_doc.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thouraya Bouabana-Tebibel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Laidoui, F., Bouabana-Tebibel, T. (2014). Protocol Integration for Trust-Based Communication. In: Bouabana-Tebibel, T., Rubin, S. (eds) Integration of Reusable Systems. Advances in Intelligent Systems and Computing, vol 263. Springer, Cham. https://doi.org/10.1007/978-3-319-04717-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04717-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04716-4

  • Online ISBN: 978-3-319-04717-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics