WeST 2010, VLSI 2010, NeCoM 2010, ASUC 2010, WiMoN 2010: Recent Trends in Networks and Communications pp 326-335 | Cite as

A Generalized Trust Framework for Mobile Ad Hoc Networks

  • Revathi Venkataraman
  • M. Pushpalatha
  • T. Rama Rao
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 90)

Abstract

Mobile ad hoc networks (MANET) are formed when two or more nodes come within the communication range of each other. Since the wireless range is very short, all the nodes in the network have to extend their complete co-operation for efficient functioning of the network. This paper proposes a generalized trust framework for any ad hoc routing protocol to curb selfish and malicious nodes in a MANET. The trust relationships existing between the nodes determine the routing path to be taken for data transfer. The trust framework is combined with any MANET routing algorithm. The performance analysis of this framework is currently done with two reactive protocols. Jointly, they form a trusted network to curb various attacks originating in the ad hoc network. This type of a trusted framework established in a MANET, would be most suited for tactical environments.

Keywords

Black Hole Neighboring Node Malicious Node Trust Relationship Dynamic Source Route 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Burbank, J.L., Chimento, P.F., Haberman, B.K., Kasch, W.T.: Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology. IEEE Communications Magazine 44(11), 39–45 (2006)CrossRefGoogle Scholar
  2. 2.
    Buttyán, L., Hubaux, J.-P.: Security and Co-operation in wireless networks. Cambridge University Press, Cambridge (February 2007)Google Scholar
  3. 3.
    Yoo, Y., Agrawal, D.P.: Why Does It Pay To Be Selfish In A Manet? IEEE Wireless Communications (December 2006)Google Scholar
  4. 4.
    Conti, M., Giordano, S.: Multihop Ad Hoc Networking: The Reality. IEEE Communications Magazine 45(4), 88–95 (2007)CrossRefGoogle Scholar
  5. 5.
    Li, J., Kato, J.: Future Trust Management Framework for Mobile Ad hoc Networks. IEEE Communications Magazine (April 2008)Google Scholar
  6. 6.
    Sun, Y., Han, Z., Liu, K.J.R.: Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine (February 2008)Google Scholar
  7. 7.
    Sun, Y., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Framework of Trust Modeling and Evaluation for ad hoc networks. IEEE JSAC 24(2) (February 2006)Google Scholar
  8. 8.
    Pirzada, A.A., Datta, A., McDonald, C.: Incorporating Trust and Reputation in the DSR protocol for Dependable Routing. Computer Communications, Special issue on Internet Communications Security 29, 2806–2821 (2006)Google Scholar
  9. 9.
    Pirzada, A.A., Datta, A., McDonald, C.: Performance Comparison of Trust-based reactive routing protocols. IEEE Transactions on Mobile Computing 5(6) (June 2006)Google Scholar
  10. 10.
    Papadimitratos, P., Haas, Z.J.: Secure Data Communication in Mobile Ad hoc Networks. IEEE JSAC 24(2) (February 2006)Google Scholar
  11. 11.
    Papadimitratos, P., Haas, Z.J., Samar, P.: The Secure Routing Protocol (SRP) for Ad Hoc Networks, IETF Internet Draft (March 2004), http://www.potaroo.net/ietf/idref/draft-papadimitratos-secure-routing-protocol
  12. 12.
    Zhou, L., Haas, Z.J.: Securing Ad hoc Networks. IEEE Networks 13(6), 24–30 (1999)CrossRefGoogle Scholar
  13. 13.
    Yi, P., Dai, Z., Zhong, Y., Zhang, S.: Resisting Flooding Attacks in Ad Hoc Networks. In: International Conference on Information Technology, Coding and Computing, ITCC 2005, April 2005, vol. 2, pp. 657–662 (2005)Google Scholar
  14. 14.
    Ping, Y., Yafei, H., Yiping, B., Shiyong, Z., Zhoulin, D.: Flooding Attacks and defence in Ad hoc networks. Journal of Systems Engineering and Electronics 17(2), 410–416 (2006)MATHCrossRefGoogle Scholar
  15. 15.
    Balakrishnan, V., Varadharajan, V., Tapakula, U., Gaup Moe, M.E.: Mitigating Flooding attacks in Mobile Ad hoc Networks Supporting Anonymous Communications. In: Proceedings of the 2nd International Conference on Wireless and Ultra Wideband Communications, Auswireless, p. 29 (2007)Google Scholar
  16. 16.
    Theodorakopoulos, G., Baras, J.S.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 318–328 (2006)CrossRefGoogle Scholar
  17. 17.
    Theodorakopoulos, G., Baras, J.S.: A Testbed for Comparing Trust Computation Algorithms. In: Proceedings of the 25th Army Science Conference, Orlando, FL, November 27-30 (2006)Google Scholar
  18. 18.
    Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: WiSe 2004: Proceedings of the 3rd ACM workshop on Wireless security, PA, pp. 1–10 (2004)Google Scholar
  19. 19.
    Venkataraman, R., Pushpalatha, M.: Security in Ad Hoc Networks: An extension of dynamic Source Routing in Mobile Ad Hoc Networks. In: Proceedings of the 10th IEEE International Conference on Communication Systems (2006)Google Scholar
  20. 20.
    Venkataraman, R., Pushpalatha, M., Khemka, R., Rao, T.R.: Prevention of Flooding attacks in Mobile Ad hoc Networks. In: ICAC3 2009: Proceedings of the International Conference on Advances in Computing, Communication and Control, January 2009, pp. 525–529 (2009) ISBN:978-1-60558-351-8Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Revathi Venkataraman
    • 1
  • M. Pushpalatha
    • 1
  • T. Rama Rao
    • 2
  1. 1.Computer Science & Engg 
  2. 2.Telecomunication Engg 

Personalised recommendations