CFP last date
22 April 2024
Reseach Article

Trust based Routing using Dominating Set Approach (TRDSA) in Wireless Ad-Hoc Networks

Published on November 2012 by Deepika Kukreja, Umang, B. V. R. Reddy
National Conference on Communication Technologies & its impact on Next Generation Computing 2012
Foundation of Computer Science USA
CTNGC - Number 1
November 2012
Authors: Deepika Kukreja, Umang, B. V. R. Reddy
7daba11b-223e-402b-bdb5-6eedf343ac1b

Deepika Kukreja, Umang, B. V. R. Reddy . Trust based Routing using Dominating Set Approach (TRDSA) in Wireless Ad-Hoc Networks. National Conference on Communication Technologies & its impact on Next Generation Computing 2012. CTNGC, 1 (November 2012), 16-24.

@article{
author = { Deepika Kukreja, Umang, B. V. R. Reddy },
title = { Trust based Routing using Dominating Set Approach (TRDSA) in Wireless Ad-Hoc Networks },
journal = { National Conference on Communication Technologies & its impact on Next Generation Computing 2012 },
issue_date = { November 2012 },
volume = { CTNGC },
number = { 1 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 16-24 },
numpages = 9,
url = { /proceedings/ctngc/number1/9048-1004/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%A Deepika Kukreja
%A Umang
%A B. V. R. Reddy
%T Trust based Routing using Dominating Set Approach (TRDSA) in Wireless Ad-Hoc Networks
%J National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%@ 0975-8887
%V CTNGC
%N 1
%P 16-24
%D 2012
%I International Journal of Computer Applications
Abstract

Secure routing protocols for Mobile Ad hoc Networks (MANETs) have been categorized based on the model used for enforcing security, methodology and information they use to make routing decisions. Some protocols are designed from scratch so as to incorporate security solutions and some are designed to provide security mechanisms into the existing routing protocols like DSDV[1], OLSR[2], AODV[3], DSR[4] etc. Several protocols for secure routing in ad-hoc networks have been proposed. But due to their limitations, there is a need to make them robust and more secure so that they can go well with the demanding requirements of ad hoc networks. We propose and design a new protocol - Trust based Routing using Dominating Set Approach (TRDSA) which overcomes the shortcomings of existing protocols.

References
  1. C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," Comp. Commun. Rev. , pp. 234-44, Oct. 1994.
  2. T. Clausen, G. Hansen, L. Christensen, and G. Behrmann, "The optimized link state routing protocol, evaluation through experiments and simulation," In IEEE Symposium on Wireless Personal Mobile Communications, Sept. 2001.
  3. C. E. Perkins and E. M. Royer, "Ad-hoc On-Demand Distance Vector Routing," Proc. 2nd IEEE Wksp. Mobile Comp. Sys. and Apps. , pp. 90-100, Feb. 1999.
  4. D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad-Hoc Wireless Networks," Mobile Computing, T. Imielinski and H. Korth, Eds. , Kluwer, pp. 153-181, 1996.
  5. L. Zhou and Z. Haas, " Securing ad hoc networks," IEEE Netw. . , Vol. 13, Issue 6, pp. 24-30, 1999.
  6. M. Zapata and N. Asokan, " Securing ad hoc routing protocols," in Proceedings of 3rd ACM workshop WiSE, pp. 1-10, Sep. 2002.
  7. P. Papadimitratos and Z. Haas, "Secure data transmission in mobile ad hoc networks," in proceedings of ACM workshop WiSE, pp. 41-50, Sep. 2003.
  8. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in the Proceedings of Sixth Ann. Int'l Conf. Mobile Computing and Networking (MobiCom), pp. 255-265, 2000.
  9. S. Buchegger and J. Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes-Fairness in Distributed Ad Hoc NeTworks," in the Proceedings of IEEE/ACM Workshop Mobile Ad Hoc Networking and Computing (MobiHOC), pp. 226-236, 2002.
  10. K. Sanzgiri, B. Dahill, B. N. Levine, E. M. Royer and C. Shields, "A secure routing protocol for ad hoc networks," In Proceedings of the International Conference on Network Protocols (ICNP), IEEE Press, pp. 78-87, 2002.
  11. Y. C. Hu, D. B. Johnson and A. Perrig," 'SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks", Proc. 4th IEEE Workshop Mobile Comp. Sys. And Applications, pp. 3-13, Callicoon, NY, June 2002.
  12. Y. C. Hu, A. Perrig and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," In Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom), ACM Press, pp. 12-23, 2002.
  13. A. Perrig, R. Canetti, D. Tygar and D. Song," The TESLA broadcast authentication protocol," RSA CryptoBytes 5(2), 2002.
  14. T. Ghosh, N. Pissinou, K. Makki. Collaborative Trust-based Secure Routing Against Colluding Malicious Nodes in Multi-hop Ad Hoc Networks. 29th Annual IEEE International Conference on Local Computer Networks, 2004, 224 - 231.
  15. T. Ghosh, N. Pissinou and K. Makki. Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. Mobile Networks and Applications, Springer Science, 10, 2005, 985-995.
  16. A. A. Pirzada, A. Datta, C. McDonald. TRUST-BASED ROUTING FOR AD-HOC WIRELESS NETWORKS. IEEE, 2004, 326-330.
  17. A. A. Pirzada and C. McDonald. Deploying trust gateways to reinforce dynamic source routing. Proceedings of the 3rd International IEEE Conference on Industrial Informatics, IEEE Press, 2005, 779-784.
  18. A. A. Pirzada and C. McDonald. Trust Establishment In Pure Ad-hoc Networks. Wireless Personal Communications, Springer, 37, 2006, 139-163.
  19. Asad Amir Pirzada, Amitava Datta, Chris McDonald. Incorporating trust and reputation in the DSR protocol for dependable routing. Computer Communications, Vol. 29, Issue 15 (5 September 2006), 2806-282.
  20. A. A. Pirzada and C. McDonald. Dependable Dynamic Source Routing without a Trusted Third Party. Journal of Research and Practice in Information Technology, Vol. 39, Issue 1 (February 2007).
  21. Xiaoqi Li, M. R. Lyu, Jiangchuan Liu. A Trust Model Based Routing Protocol for Secure Ad Hoc Networks. Aerospace Conference, IEEE, Vol. 2, 2004, 1286 - 1295.
  22. S. K. Dhurandher and V. Mehra. Multi-path and message trust-based secure routing in ad hoc networks. Proc. Int. Conf. Advances in Computing, Control and Telecommunication Technologies (ACT 2009), Trivandrum, India (Dec. 28-29, 2009), 189-194.
  23. X. Li, Z. Jia, P. Zhang, R. Zhang, H. Wang. Trust-based on-demand multipath routing in mobile ad hoc networks. Information Security, IET, Vol. 4, Issue 4 (Dec. 2010), 212.
  24. Jian Wang, Yanheng Liu, Yu Jiao. Building a trusted route in a mobile ad hoc network considering communication reliability and path length. Journal of Network and Computer Applications, Vol. 34, Issue 4 (July 2011), 1138-1149.
  25. Hothefa Sh. Jassim, Salman Yussof, Tiong Sieh Kiong, S. P. Koh, Roslan Ismail. A Routing Protocol based on Trusted and shortest Path Selection for Mobile Ad hoc Network. Communications (MICC), 2009 IEEE 9th Malaysia International Conference on Communications (Dec. 2009), 547 - 554.
  26. Imran Raza, S. A. Hussain. Identification of malicious nodes in an AODV pure ad hoc network through guard nodes. Computer Communications, Vol. 31, Issue 9 (Jun. 2008), 1796-1802.
  27. E. Ayday, F. Fekri. A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, Vol. 8, Issue 2 (March 2010), 181-192.
  28. Yamin Li, Shietung Peng, Wanming Chu. An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks. IEEE, 2006, 199-205.
  29. H. Zafar, D. Harle, I. Andonovic, Y. Khawaja. Performance evaluation of shortest multipath source routing scheme. IET Commun, Vol. 3, Iss. 5, 2009, 700–713.
  30. Umang Singh, B. V. R. Reddy, M. N. Hoda. Enhanced Intrusion Detection System for malicious node detection in adhoc routing protocol using minimal energy consumption. IEEE Journal Communications IET, ISSN- 1751-8628, DOI: 10. 1049/iet-com. 2009. 0616, Volume 4, Issue 17 (Nov. 2010), 2084-2094.
  31. Umang Singh, B. V. R. Reddy, M. N. Hoda. GNDA: Detecting Good Neighbor nodes in adhoc routing protocol. IEEE Second International Conference on Emerging Applications of Information Technology, DOI 10. 1109/EAIT. 2011. 62, 235-238.
Index Terms

Computer Science
Information Sciences

Keywords

Routing Protocol Trust Mobile Ad Hoc Networks Secure Routing Protocols