CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

T-AODV Heuristic based Trust implementation in Ad-hoc Routing Protocol for Wireless Sensor Networks

by Shashika Lokuliyana, Lakmal Rupasinghe
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 19
Year of Publication: 2018
Authors: Shashika Lokuliyana, Lakmal Rupasinghe
10.5120/ijca2018916432

Shashika Lokuliyana, Lakmal Rupasinghe . T-AODV Heuristic based Trust implementation in Ad-hoc Routing Protocol for Wireless Sensor Networks. International Journal of Computer Applications. 180, 19 ( Feb 2018), 21-26. DOI=10.5120/ijca2018916432

@article{ 10.5120/ijca2018916432,
author = { Shashika Lokuliyana, Lakmal Rupasinghe },
title = { T-AODV Heuristic based Trust implementation in Ad-hoc Routing Protocol for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2018 },
volume = { 180 },
number = { 19 },
month = { Feb },
year = { 2018 },
issn = { 0975-8887 },
pages = { 21-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number19/29040-2018916432/ },
doi = { 10.5120/ijca2018916432 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:01:06.952071+05:30
%A Shashika Lokuliyana
%A Lakmal Rupasinghe
%T T-AODV Heuristic based Trust implementation in Ad-hoc Routing Protocol for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 19
%P 21-26
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Sensor Networks (WSNs) operates with an open network topology without well-established infrastructure. Due to the absence of a centralized administration in network management, WSNs are highly vulnerable to various malicious attacks. The introductory of such a malicious node in a network may lead the network to security breaches, miscommunication, starvation and finally decay. In this paper, the authors attempt to reduce the vulnerability of a WSN node communicating with a malicious node by establishing a TRUST based authentication and filtering routing mechanism. The authors aim to detect and prevent potential attacks such as DoS attacks and Blackhole attacks, thus providing the associated security needed in order to build up relationships among each other to communicate. The authors have used the existing AODV routing protocol and modified to perform a heuristic based TRUST metric calculation. In a situation of a suspected malicious node, the TRUST based security protocol detects and isolate the attacker as the communication channels proceed. The TRUST based AODV protocol has been implemented and evaluated with the NS-2 simulator and simulation results are compared with the existing protocols.

References
  1. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks.”, Wireless Network Security, Signals and Communication Technology 2007, pp 103-135
  2. Kaushik,N., Dureja, A., “A Comparative Study Of Black Hole Attack In Manet.”, International Journal of electronics and communication Engineering & Technology, Volume4, Issue 2, March-April, 2013, pp. 93-102
  3. S. Corson, J. Macker. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. IETF RFC2501, 1999.
  4. HongMei Deng, Wei Li, Dharma P. Agrawal. Routing Security in Wireless Ad Hoc Networks. IEEE Communications Magazine, October 2002, p70-75.
  5. Abusalah, L., Khokhar, A., Guizani, M.: A Survey of Secure Mobile Ad Hoc Routing Protocols. IEEE Communications Surveys & Tutorials 10(4), 78–93 (2008)
  6. Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad hoc Wireless Networks. In: Mobile Computing, pp. 153–181. Kluwer Academic Publishers (1996)
  7. Zapata, M.G.: Secure adhoc on-demand distance vector (S-AODV) Routing. In: Proceeding of ACM Workshop on Wireless Security (WISE), Atlanta (2002)
  8. Yi, S., Naldurg, P., Kravets, R.: A Security-Aware Routing Protocol for Wireless AdHoc Networks. In: ACM Symposium on Mobile Ad Hoc Networking & Computing (ACM Mobihoc 2001), Short paper, Long Beach, CA, USA (October 2001)
  9. M Abolhasan, B Hagelstein & JC-P Wang, Real-world performance of current proactive multi-hop mesh protocols, IEEE APCC, Shanghai, China, 8-10th October 2009
  10. Perkins, Charles E. and Bhagwat, Pravin. “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”,1994.
  11. Akhlaq, M., Noman Jafri, M., Khan, M.A., Aslam, B.: Addressing Security Concerns of Data Exchange in AODV. Transactions on Engineering, Computing and Technology 16, 29–33 (2006) ISSN 1305-5313
  12. Cerri, D., Ghioni, A.: Securing AODV: The A-SAODV Secure Routing Prototype. IEEE Communications Magazine 46(2), 120–125 (2008)
  13. Eichler, S., Roman, C.: Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC. In: 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 481–484 (October 2006)
  14. Pirzada, A.A., Datta, A., McDonald, C.S.: Trustworthy Routing with the AODV Protocol. In: The International Networking and Communications Conference (INCC 2004), pp. 19–24. IEEE Communications Society, Lahore (2004)
  15. Menaka, A., Pushpa, M.E.: Trust Based Secure Routing in AODV Routing Protocol. In: IMSAA 2009 Proceedings of the 3rd IEEE International Conference on InternetMultimedia Services Architecture and Applications. IEEE Press, Piscataway (2009)
  16. Zhe, L., Jun, L., Dan, L., Ye, L.: A Security Enhanced AODV Routing Protocol. In: Jia,,X., Wu, J., He, Y. (eds.) MSN 2005. LNCS, vol. 3794, pp. 298–307. Springer, Heidelberg (2005).
  17. Kurosawa, S., Nakayama, H., Kato, N., Nemoto, Y., Jamalipour, A.: Detecting blackhole attack on aodv-based mobile ad hoc networks by dynamic learning method. International. Journal of Network, Security 5(3), 338–346 (2007).
Index Terms

Computer Science
Information Sciences

Keywords

WSN AODV TRUST Security Protocol