CFP last date
20 May 2024
Reseach Article

Trust based Routing in Wireless Ad Hoc Networks under Adverse Environment

by D. Sylvia, Jeevaa Katiravan, D. Srinivasa Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 136 - Number 10
Year of Publication: 2016
Authors: D. Sylvia, Jeevaa Katiravan, D. Srinivasa Rao
10.5120/ijca2016908589

D. Sylvia, Jeevaa Katiravan, D. Srinivasa Rao . Trust based Routing in Wireless Ad Hoc Networks under Adverse Environment. International Journal of Computer Applications. 136, 10 ( February 2016), 23-28. DOI=10.5120/ijca2016908589

@article{ 10.5120/ijca2016908589,
author = { D. Sylvia, Jeevaa Katiravan, D. Srinivasa Rao },
title = { Trust based Routing in Wireless Ad Hoc Networks under Adverse Environment },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 136 },
number = { 10 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume136/number10/24190-2016908589/ },
doi = { 10.5120/ijca2016908589 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:37:03.241578+05:30
%A D. Sylvia
%A Jeevaa Katiravan
%A D. Srinivasa Rao
%T Trust based Routing in Wireless Ad Hoc Networks under Adverse Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 136
%N 10
%P 23-28
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In wireless ad hoc networks, traditional routing considers hop count and distance for making the route selection. The network is prone to various types of attacks by intruders in which packets maybe modified or dropped. A trust based mechanism maybe employed in which the nodes are constantly monitored for malicious behaviour. An abnormality in the behaviour of the intermediate node effects the trust value and such malicious nodes that are detected maybe excluded from the route and a new route discovery maybe initiated. In this paper, such a trust based routing is proposed to detect network layer attacks. A route discovery is initiated under the detection of malicious nodes as against the use of control packets for route rediscovery. Using simulation, it is proved that the proposed scheme achieves better performance in terms of Packet Delivery Fraction, end-to-end delay and therefore improves the performance of the network under adverse environment

References
  1. S. Murthy, C. Siva Ram, and B.S.Manoj, “Ad Hoc Wireless Networks : Architectures and Protocols”, Prentice Hall, 2004.
  2. Y. Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing,”IEEE Computer Society, 2004.
  3. L. Abusalah, A. Khokhar and M. Guizani, “A survey of secure mobile ad hoc routing protocols,” IEEE Commun. Surveys and Tutorials, Vol.10, no. 4, pp. 78-93, 2008.
  4. D. B. Johnson and D. A. Maltz, “Dynamic Sources Routing in Ad Hoc Wireless Networks,” Mobile Computing, 1996.
  5. D. A. Maltz, “Resource Management in Multi-hop Ad Hoc Networks,”CMU School of Computer Science Technical Report CMU-CS-00-150,Nov. 21, 1999.
  6. Y. Hu and D. B. Johonson, “Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks,” Proc. ACM SASN‘04, Oct. 20, 2004.
  7. Y. Hu, A. Perrig, and D. B. Johonson, “Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks,” Proc. ACM MobiCom ‘02,Sept. 23–26, 2002.
  8. S. Buchegger and J. L. Boudec, “Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes-Fairness In Dynamic Ad-hoc Networks,” Proc. IEEE/ACM Symp. Mobile Ad Hoc Networking and Computing (MobiHOC), 2002.
  9. C. E. Perkins and E. M. Royer, “Ad-Hoc On-Demand Distance Vector Routing,” Proc. 2nd IEEE Wksp. Mobile Computer Systems and Applications,1999, pp. 90–100.
  10. P. Michiardi and R. Molva,, “CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks”, IFIP-Communication and Multimedia Security Conf. ,2002.
  11. M. Guerrero Zapata, “Secure Ad hoc On-Demand Distance Vector Routing,” Mobile Computing and Commun. Review, Vol. 6, No. 3.pp.106-107
  12. S. Yi, P. Naldurg, and R. Kravets, “A Security-Aware Routing Protocol for Wireless Ad Hoc Networks,” Proc. ACM MobiHoc ’01, 2001.
  13. Vinod Namboodiri, Manish Agarwal, Lixin Gao, “A Study on the Feasibility of Mobile Gateways for Vehicular Ad-hoc Networks”,VANET’04, October 1, 2004, Philadelphia,Pennsylvania,USA.
  14. C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” ACM SIGCOMM ’94, 1994.
  15. T. H. Clausen et al., “The Optimized Link-State Routing Protocol, Evaluation through Experiments and Simulation,” Proc. IEEE Symp. Wireless Personal Mobile Communications 2001, Sept. 2001.
  16. Y. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” Proc. IEEE Mobile Computing Systems and Applications, 2002, pp. 3–13.
  17. P. Papadimitratos and Z. J. Haas, “Secure Link State Routing for Mobile Ad Hoc Networks,” Proc. IEEE Wksp. Security and Assurance in Ad Hoc Networks, in Conjunction with the 2003 Int’l. Symp. Applications and the Internet, Jan. 28, 2003.
  18. Z. J. Haas and M. R. Pearlman, “The zone routing protocol: A hybrid framework for routing in ad hoc networks,” in Ad Hoc Networks, C. E. Perkins, Ed. Reading, MA: Addison-Wesley, 2000.
  19. Y. Hu and D. B. Johonson, “Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks,” Proc. ACM SASN ‘04, Oct. 20, 2004.
  20. Yongkun Li; Lui, J.C.S., "Epidemic Attacks in Network-Coding-Enabled Wireless Mesh Networks: Detection, Identification, and Evaluation," IEEE Transactions on  Mobile Computing, vol.12, no.11, pp.2219,2232, Nov. 2013.
  21. M.K. Denko, “A Localized Architecture forDetecting Denial of Service (DoS) Attacks in WirelessAd Hoc Networks”, In Proc. IFIP INTELLCOMM'05,Montreal,Canada,2005.
  22. Carl G., Kesidis G., Brooks R., and Rai S., “Denialof Service Attack Detection Techniques,” ComputerJournal of IEEE Internet Computing, vol. 10, no. 1, pp.82-89, 06.
  23. Khan, Rizwan, and A. K. Vatsa. "Detection and control of DDOS attacks over reputation and score based MANET." Journal of Emerging Trends in Computing and Information Sciences 2.11 (2011): p9-12.
  24. Kaur, Gurjinder, Yogesh Chaba, and V. K. Jain. "Distributed Denial of Service Attacks in Mobile Adhoc Networks." World Academy of Science, Engineering and Technology 73 (2011): 725-727.
  25. Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, and Wei Zhao “Modeling and detection of camouflaging worm”, IEEE transactions on dependable and secure computing, vol. 8, no. 3,Mmay/June 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Ad Hoc Network Trust Calculation Attacks Detection