Protocol Integration for Trust-Based Communication

Chapter
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 263)

Abstract

In mobile ad hoc networks (MANETs), nodes have to cooperate in order to accomplish routing tasks . Nevertheless, they have limited resources, and may behave in a selfish way. On the other hand, the networking infrastructure supporting routing is quite weak faced with such misbehaviors. In this chapter, we propose a trust model for reactive routing in MANETs. The proposed solution applies to any source routing protocol. It is based on mechanisms inspired by the CONFIDANT protocol to install and update trust in the network. The model also integrates new protocols to improve trust in the selected routes. It may adapt to topology changes caused by the mobility of nodes and takes into account new routes learned after the route request phase. Finally, it improves the choice of the safest route towards the destination. Fundamental and elaborate tests prove the efficiency of the solution.

Keywords

Mobile ad hoc network DSR CONFIDANT Trust Security Reactive routing 

References

  1. 1.
    Kargl, F., Klenk, A., Schlott, S., Weber, M.: Advanced detection of selfish or malicious nodes in ad hoc networks. In: Proceedings of 1st European Workshop on Security in Ad-hoc and Sensor Networks, ESAS 2004, Heidelberg, Germany, pp. 152–165 (2004)Google Scholar
  2. 2.
    Bhalaji, N., Shanmugam, A.: A trust based technique to isolate non-forwarding nodes in DSR based mobile ad hoc networks. In: The third International Conference on Network Security and Applications, Chennai, India (2010)Google Scholar
  3. 3.
    Buchegger, S., Mundinger, J., Le Boudec, J.Y.: Reputation systems for self-organized networks. IEEE Technol. Soc. Mag. 27(1), 41–47 (2008)CrossRefGoogle Scholar
  4. 4.
    Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP Conference on Communications and Multi-media Security, Kluwer, B.V. Deventer, The Netherlands vol. 228, pp. 107–121 (2002)Google Scholar
  5. 5.
    Arya, K.V., Vashistha, P., Gupta, V.: Three phase technique for intrusion detection in mobile ad hoc network. In: DICTAP 2011, vol. 166, pp. 675–684 (2011)Google Scholar
  6. 6.
    Buchegger, S., Le Boudec, J.Y.: Performance analysis of the confidant protocol. In: ACM 3rd International Symposium on Mobile Ad hoc Networking and Computing-MobiHoc’02, pp. 226–236 (2002)Google Scholar
  7. 7.
    Buchegger, S., Le Boudec, J.Y.: A robust reputation system for P2P and mobile ad hoc networks. In: Proceedings of P2PEcon 2004 (2004)Google Scholar
  8. 8.
    Yang, X., Gao, Y.: A routing protocol based on trust for MANETs. In: Zhuge H., Fox G.C. (eds.) Proc. 4th International Conference on Grid and Cooperative Computing GCC 2005, vol. 3795, pp. 959–964. LNCS, Beijing, China, Nov 30–Dec 3 (2005)Google Scholar
  9. 9.
    Johnson, D. B., Maltz, D.A., Broch, J.: DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In: Perkins C.E. (ed.) Ad Hoc Networking. Addison-Wesley, Reading (2001)Google Scholar
  10. 10.
    Johnson, D.B., Hu, Y-C., Maltz, D.A.: The dynamic source routing protocol (DSR) for mobile ad hoc networks. IETF RFC4728 (2007)Google Scholar
  11. 11.
    Suresh, A., Duraiswamy, K.: Routing protocol with node reputation scheme. J. Comput. Sci. 7(2), 242–249 (2011)CrossRefGoogle Scholar
  12. 12.
    Balakrishnan, K., Deng, J., Varshney, P.K.: TWOACK: preventing selfishness in mobile ad hoc networks. In: Proceedings of Wireless Communication and Networking Conference, New Orleans, LA, USA (2005)Google Scholar
  13. 13.
    Djenouri, D., Ouali, N., Mahmoudi, A., Badache, N.: Random feedbacks for selfish nodes detection in mobile ad hoc networks. In: The 5th IEEE International Workshop on IP Operations and Management-IPOM 2005, Barcelona, Spain (2005)Google Scholar
  14. 14.
    Abd El-Haleem, A.M., Ali, I.A.: TRIUMF: trust-based routing protocol with controlled degree of selfishness for securing MANET against packet dropping attack. Int. J. Comput. Sci. Issues, 8(4), 1 (2011)Google Scholar
  15. 15.
    Zhao, L., Delgado-Frias, J.G.: MARS: Misbehavior Detection in Ad Hoc Network. IEEE GLOBECOM, Washington (2007)Google Scholar
  16. 16.
    Sukumran, S., Jaganathan, V., Korath, A.: Reputation based dynamic source routing protocol for MANET. Int. J. Comput. Appl. 47(4), 42–46 (2012)Google Scholar
  17. 17.
    Choudhury, S., Roy, S.D., Singh, S.A.: Trust management in ad hoc network for secure DSR routing, novel algorithms and techniques. In: Sobh, T., Elleithy, K., Mahmood, A., Karim, M.A. (eds.) Telecommunications, Automation and Industrial Electronics, pp. 496–500. Springer, The Netherlands (2008)Google Scholar
  18. 18.
    Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: ODSBR: an on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Sec. 10, 3 (2007)Google Scholar
  19. 19.
    Awerbuch, B., Scheideler, C.: Robust random number generation for peer-to-peer systems. Theor. Comput. Sci. Elsevier 410(6–7), 453–466.28 (2009)Google Scholar
  20. 20.
    Yong, C., Chuanhe, H., Wenming, S.: Trusted dynamic source routing protocol. In: Wireless Communications, Networking and Mobile Computing (WiCom) pp. 1632–1636 (2007)Google Scholar
  21. 21.
    Quercia, D., Hailes, S., Capra, L.: B-trust: Bayesian trust framework for pervasive computing. In: Proceedings of the 4th International Conference on Trust Management (iTrust), Pisa, Italy, pp. 298–312, May (2006)Google Scholar
  22. 22.
    Marias, G.F., Georgiadis, P., Flitzanis, D., Mandalas, K.: Cooperation enforcement schemes for MANETs: a survey. Wirel. Commun. Mob. Comput. Wirel. Netw. Sec. 6(3), 319–332 (2006)Google Scholar
  23. 23.
    Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad-hoc networks. Stanford University, Technical Report (2003)Google Scholar
  24. 24.
    NS Manual, VINT Project. 2011, www.isi.edu/nsnam/ns/doc/ns_doc.pdf

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Laboratoire de Communication des Systèmes InformatiquesEcole Militaire Polytechnique—EMPAlgiersAlgeria
  2. 2.Laboratoire de Communication des Systèmes InformatiquesÉcole nationale Supérieure d’Informatique—ESIAlgiersAlgeria

Personalised recommendations