Advertisement

Collaborative Trust-Based Shortest Secure Path Discovery in Mobile Ad Hoc Networks

  • Seungtak Oh
  • Chilgee Lee
  • Hyunseung Choo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3992)

Abstract

As routes in MANET are composed of only mobile terminals based on a multi-hop mechanism, MANET may encounter severe situations where intermediate nodes disturb delivering packets adversely. Accordingly, the stability of routing protocols is very important for operating the ad hoc networks efficiently and securely. However finding a secure end-to-end path is not easy, since the nodes in MANET are characterized by uncertain trust relationship each other. In this paper, a comprehensive mechanism for discovering the most secure and shortest paths, is proposed. This proposed mechanism is based on the Dijkstra algorithm, and regards distance weight and trust weight highly. The metric value which can determine the routing path is to be extracted from the distance value and the trust level. According to the simulation results, even though the communication cost increases up to about 8%, the security level of the shortest path is improved significantly.

Keywords

Source Node Destination Node Malicious Node Distance Weight Mutual Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002) (2002)Google Scholar
  2. 2.
    Capkun, S., Hubaux, J.-P., Buttyan, L.: Mobility Helps Peer-to-Peer Security. IEEE Transactions on Mobile Computing 5(1), 43–51 (2006)CrossRefGoogle Scholar
  3. 3.
    Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of the 10 th IEEE International Conference on Network Protocols (ICNP 2002) (2002)Google Scholar
  4. 4.
    Karlof, D.W.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1, 293–315 (2003)CrossRefGoogle Scholar
  5. 5.
    Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), pp. 3–13 (2002)Google Scholar
  6. 6.
    Montenegro, G., Castelluccia, C.: Statistically Unique and Cryptographically Verifiable(SUCV) Identifiers and Addresses. In: Proc. Symp. Networks and Distributed Systems Security(NDSS 2002), Internet Society, pp. 87–99 (2002)Google Scholar
  7. 7.
    Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)CrossRefGoogle Scholar
  8. 8.
    Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector(AODV) routing. In: The Second IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA (February 1999)Google Scholar
  9. 9.
    Pissinou, N., Ghosh, T., Makki, K.: Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol. 3042, pp. 1446–1451. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Ghosh, T., Pissinou, N., Makki, K.: Collaborative Trust-based Secure Routing Against Colluding Malicious Nodes in Multi-hop Ad Hoc Networks. In: 29th Annual IEEE International Conference on Local Computer Networks 2004, November 16-18, pp. 224–231 (2004)Google Scholar
  11. 11.
    Pirzada, A.A., Datta, A., McDonald, C.: Trust-based routing for ad-hoc wireless networks. In: Proceedings. 12th IEEE International Conference on Networks (ICON 2004), November 16-19, vol. 1, pp. 326–330 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Seungtak Oh
    • 1
  • Chilgee Lee
    • 1
  • Hyunseung Choo
    • 1
  1. 1.School of Information and Communication EngineeringSungkyunkwan UniversitySuwonKorea

Personalised recommendations