Trust and Resource Oriented Communication Scheme in Mobile Ad Hoc Networks

  • Burhan Ul Islam Khan
  • Rashidah F. Olanrewaju
  • Roohie Naaz Mir
  • S. H. Yusoff
  • Mistura L. Sanni
Conference paper
Part of the Studies in Computational Intelligence book series (SCI, volume 751)

Abstract

Attaining high security in mobile ad hoc networks (or MANETs) is the utmost concern in the present era of wireless ad-hoc communication and efforts are continuously being made by the researchers, in order to provide a feasible solution for the same. Impervious security has to be ensured in MANETs because of their involvement in transacting highly sensitive information. However, it has been discerned that during the communication process, the decentralized and dynamic nature of MANETs impedes the security of mobile nodes. This study is an attempt to enhance the security in routing techniques of MANETs by overhauling the existing security system after its critical evaluation. It has been observed that the cryptographic techniques in use prove to be inefficient or fail in some of the current scenarios. Therefore, a non-cryptographic method has been put forward that strengthens the process of authenticating nodes in MANETs by taking into account two factors viz. trust and resource, unlike the conventional ones. On analyzing the performance with respect to throughput, packet delivery ratio, end-to-end delay and computational time, the proposed system proves to be better than the previous standard secure routing scheme.

Keywords

Mobile ad-hoc network Secure routing Node authentication Trust Resource 

Notes

Acknowledgements

I would like to express my sincere gratitude towards Prof. A. G. Lone; I could see myself becoming a researcher just because, coincidently he was teaching mathematics at the same Engineering College from where I graduated.

This work was partially supported by Ministry of Higher Education Malaysia (Kementerian Pendidikan Tinggi) under Research Initiative Grant Scheme number (RIGS15-150-0150).

References

  1. 1.
    Jin, M., Du, Z.: Management innovation and information technology. WIT Trans. Inf. Commun. Technol. 61, 2124 (2014)Google Scholar
  2. 2.
    Sarkar, S., Datta, R.: A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw. 37, 209–227 (2016)CrossRefGoogle Scholar
  3. 3.
    Sarkar, S.: Wireless sensor and ad hoc networks under diversified network scenarios. Artech House, Boston, Mass. (2012)Google Scholar
  4. 4.
    Khan, B., Olanrewaju, R.F., Baba, A.M., Mir, R.N., Lone, S.A.: DTASR: dual threshold-based authentication for secure routing in mobile adhoc network. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 22(1), 1–9 (2015)Google Scholar
  5. 5.
    Vashist, P., Hema, K.: New multicast routing protocol in ad-hoc network. Int. J. Innovations Eng. Technol. (IJIET) 2(2), 108–119 (2013)Google Scholar
  6. 6.
    Aluvala, S., Sekhar, K.R., Vodnala, D.: An empirical study of routing attacks in mobile ad-hoc networks. Proc. Comput. Sci. 92, 554–561 (2016)CrossRefGoogle Scholar
  7. 7.
    Khan, B., Olanrewaju, R.F., Ali, N.A., Shah, A.: ElePSO: energy aware elephant swarm optimization for mobile adhoc network. Pensee J. 76(5), 88–103 (2014)Google Scholar
  8. 8.
    McNerney, P.J., Zhang, N.: A study on reservation-based adaptation for QoS in adversarial MANET environments. In: 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 677–682. IEEE (2012)Google Scholar
  9. 9.
    Lafta, H.A., Al-Salih, A.M.: Efficient routing protocol in the mobile ad-hoc network (MANET) by using genetic algorithm (GA). IOSR J. (IOSR J. Comput. Eng.) 1(16), 47–54 (2014)CrossRefGoogle Scholar
  10. 10.
    Ahmed, M.N., Abdullah, A.H., Chizari, H., Kaiwartya, O.: F3TM: flooding factor based trust management framework for secure data transmission in MANET. J. King Saud Univ.-Comput. Inf. Sci. (2016).  https://doi.org/10.1016/j.jksuci.2016.03.004 Google Scholar
  11. 11.
    Loo, L., Mauri, J., Ortiz, J.: Mobile Ad Hoc Networks: Current Status and Future Trends, p. 538. CRC Press, Inc. Boca Raton, FL, USA©2011 (2012)Google Scholar
  12. 12.
    Kennington, J., Olinick, E., Rajan, D.: Wireless Network Design. Springer, New York (2011)CrossRefMATHGoogle Scholar
  13. 13.
    Sadasivam, K., Yang, T.A.: Evaluation of certificate-based authentication in mobile ad hoc networks. In: IASTED International Conference on Networks and Communication Systems (NCS 2005), Krabi, Thailand (2005)Google Scholar
  14. 14.
    Aluvala, S., Sekhar, K.R., Vodnala, D.: A novel technique for node authentication in mobile ad hoc networks. Perspect. Sci. 8, 680–682 (2016)CrossRefGoogle Scholar
  15. 15.
    Amine. A,, Ait Mohamed, O., Benatallah, B.: Network Security Technologies: Design and Applications, p. 330. IGI Global (2013)Google Scholar
  16. 16.
    Pathan, A., Monowar, M., Fadlullah, Z.: Building Next-Generation Converged Networks: Theory and Practice. CRC Press, Boca Raton, FL (2013)CrossRefGoogle Scholar
  17. 17.
    Pathan, A.: Security of self-organizing networks: MANET, WSN, WMN, VANET. Auerbach Pub, Boca Raton (2011)Google Scholar
  18. 18.
    Thorat, S.A., Kulkarni, P.J.: Uncertainty analysis framework for trust based routing in MANET. Peer-to-Peer Netw. Appl. 1–11 (2016)Google Scholar
  19. 19.
    Yavuz, A.A., Alagöz, F., Anarim, E.: A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. Turk. J. Electr. Eng. Comput. Sci. 18(1), 1–22 (2010)Google Scholar
  20. 20.
    O’rourke, C., Johnson, S.B.: Mobile ad hoc networking revamps military communications. Mil. Electron. Comput. (2011)Google Scholar
  21. 21.
    Sarkar, S., Datta, R.: A game theoretic model for stochastic routing in self-organized MANETs. In: IEEE Wireless Communications and Networking Conference (WCNC), pp. 1962–1967 (2013)Google Scholar
  22. 22.
    Ji, Z., Yu, W., Liu, K.R.: A game theoretical framework for dynamic pricing-based routing in self-organized MANETs. IEEE J. Sel. Areas Commun. 26(7), 1204–1217 (2008)CrossRefGoogle Scholar
  23. 23.
    Anderegg, L., Eidenbenz, S.: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 245–259. ACM (2003)Google Scholar
  24. 24.
    Shen, H., Li, Z.: A hierarchical account-aided reputation management system for MANETs. IEEE/ACM Trans. Netw. (TON) 23(1), 70–84 (2015)CrossRefGoogle Scholar
  25. 25.
    Zapata, M.G.: Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mob. Comput. Commun. Rev. 6(3), 106–107 (2002)CrossRefGoogle Scholar
  26. 26.
    Sarkar, S., Kisku, B., Misra, S., Obaidat, M.S.: Chinese remainder theorem-based RSA-threshold cryptography in MANET using verifiable secret sharing scheme. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 258–262 (2009)Google Scholar
  27. 27.
    Buttyán, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8(5), 579–592 (2003)CrossRefGoogle Scholar
  28. 28.
    Sarkar, S., Datta, R.: AODV-based technique for quick and secure local recovery from link failures in MANETs. Int. J. Commun. Netw. Distrib. Syst. 11(1), 92–116 (2013)CrossRefGoogle Scholar
  29. 29.
    Khan, B., Olanrewaju, R., Habaebi, M.: Malicious behaviour of node and its significant security techniques in MANET-a review. Aust. J. Basic Appl. Sci. 7(12), 286–293 (2013)Google Scholar
  30. 30.
    Khan, B., Olanrewaju, R., Mir, R., Adebayo, B.: Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. Am. J. Comput. Sci. Eng. 2(3), 10–19 (2015)Google Scholar
  31. 31.
    Marimuthu, M., Krishnamurthi, I.: Enhanced OLSR for defense against DOS attack in ad hoc networks. J. Commun. Netw. 15(1), 31–37 (2013)CrossRefGoogle Scholar
  32. 32.
    Venkataraman, R., Rama Rao, T., Pushpalatha, M.: Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3), 131–140 (2012)CrossRefGoogle Scholar
  33. 33.
    Lv, X., Li, H.: Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. IET Inf. Secur. 7(2), 61–66 (2013)CrossRefGoogle Scholar
  34. 34.
    Zhang, P., Lin, C., Jiang, Y., Fan, Y., Shen, X.: A lightweight encryption scheme for network-coded mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 2211–2221 (2014)CrossRefGoogle Scholar
  35. 35.
    Dangare, N.N., Mangrulkar, R.S.: Design and implementation of trust based approach to mitigate various attacks in mobile ad hoc network. Proc. Comput. Sci. 78, 342–349 (2016)CrossRefGoogle Scholar
  36. 36.
    Zhao, S., Aggarwal, A., Frost, R., Bai, X.: A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun. Surv. Tutorials 14(2), 380–400 (2012)CrossRefGoogle Scholar
  37. 37.
    Dhanapal, J., Srivatsa, S.: Link quality-based cache replacement technique in mobile ad hoc network. IET Inf. Secur. 7(4), 277–282 (2013)CrossRefGoogle Scholar
  38. 38.
    Xi, S., Liang, S., Jianfeng, M., Zhuo, M.: A trust management scheme based on behavior feedback for opportunistic networks. China Commun. 12(4), 117–129 (2015)CrossRefGoogle Scholar
  39. 39.
    Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)CrossRefGoogle Scholar
  40. 40.
    Tan, S., Li, X., Dong, Q.: Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw. 30, 84–98 (2015)CrossRefGoogle Scholar
  41. 41.
    Wan, Z., Ren, K., Gu, M.: USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks. IEEE Trans. Wirel. Commun. 11(5), 1922–1932 (2012)CrossRefGoogle Scholar
  42. 42.
    Khan, B., Olanrewaju, R.F., Mir, R.N., Baba, A., Adebayo, B.W.: Strategic profiling for behaviour visualization of malicious node in Manets using game theory. J. Theoret. Appl. Inf. Technol. 77(1), 25–43 (2015)Google Scholar
  43. 43.
    Khan, B., Olanrewaju, R.F., Anwar, F., Shah, A.: Manifestation and mitigation of node misbehaviour in adhoc networks. Wulfenia J. 21(3), 462–470 (2014)Google Scholar
  44. 44.
    Joshi, S.S., Biradar, S.R.: Communication framework for jointly addressing issues of routing overhead and energy drainage in MANET. Proc. Comput. Sci. 89, 57–63 (2016)CrossRefGoogle Scholar
  45. 45.
    Rajkumar, B., Narsimha, G.: Trust based certificate revocation for secure routing in MANET. Proc. Comput. Sci. 92, 431–441 (2016)CrossRefGoogle Scholar
  46. 46.
    Phu, P., Yi, M., Kim, M.: Securing AODV routing protocol in mobile ad-hoc networks. In: Active and Programmable Networks, vol. 4388, pp. 182–187. Springer, Berlin (2009)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Burhan Ul Islam Khan
    • 1
  • Rashidah F. Olanrewaju
    • 1
  • Roohie Naaz Mir
    • 2
  • S. H. Yusoff
    • 1
  • Mistura L. Sanni
    • 3
  1. 1.Department of ECEKulliyyah of Engineering, International Islamic MalaysiaKualalumpurMalaysia
  2. 2.Department of CSENational Institute of TechnologyHazratbal, SrinagarIndia
  3. 3.Faculty of Technology, Department of CSEObafemi Awolowo UniversityIle-IfeNigeria

Personalised recommendations