Dynamic Detection of Secure Routes in Ad hoc Networks

Niloofar Movahedian Attar

Abstract


The present paper focused on ad hoc networks with an emphasis on their dynamic nature. After an introduction to ad hoc networks, there are the AODV (Ad hoc On-demand Distance Vector) routing protocol with the node malicious behaviour and consequent damages to ad hoc networks. Then, trust is described as one of the solutions for identifying secure routes when there are malicious nodes in the network. Accordingly, the paper focuses on the proposed solutions that are based on the parameter trust and the prevention of the impact of malicious networks and vulnerable connections to identify a secure route. Then, an equation is presented to calculate trust using packet forwarding rate to select a secure route for sending data packets. The proposed model was implemented on OMNET++ to evaluate the network performance. The feature of the proposed method is better performance than of the methods TVAODV and AODV. Using the proposed method, packet delivery rate increases more significantly when malicious nodes increases than that of the basic method AODV and TVAODV. There is thus a lower packet dropping rate.

Keywords


Adhoc Networks; Secure Routing; Malicious Node; AODV.

References


S.K. Dwivediand M.B. Ahmed, “Performance of Improved Trust Based Mobile Adhoc Network Routing Protocol for MANET’’, International Journal of Innovative Research in Science, Engineering and Technology, Vol.5, Issue 6, June 2016.

R. Haboub and M. Quzzif, “Secure and Reliable Routing In Mobile Adhoc Networks’’, International Journal of Computer Science & Engineering Survey (IJCSES), Vol.3, No.1, 2012.

M. Sardar and K. Majumder, “A New Trust Based Secure Routing Scheme in MANET”, Advances in Intelligent Systems and Computing, pp. 321-328, 2014.

W. Gong, Z. You, D. Chen, X. Zhao, M. Gu and K. Lam, “Trust Based Routing for Misbehavior Detection in Ad Hoc Networks”, Journal of Networks, pp. 551-558, 2010.

R.H. Jhaveri, S.J. Patel, and D.C. Jinwala, “DoS Attacks in Mobile Ad-hoc Networks: A Survey”, Second International Conference on Advanced Computing & Communication Technologies, pp. 535-541, 2012.

M.H. Moustafa, M.A. Youssef, and M.N. El-Derini, “MSR: A Multipath Secure Reliable Routing Protocol for WSNs”, 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 54-59, 2011.

N. Raza, M.U. Aftab, M.Q. Akbar “Mobile Adhoc Networks Applications and Challenges”, Communications and Network, pp. 131-136, July 2016.

H. Xia, Z. Jia, X. Li, L. Ju, and E.H.M. Sha, “Trust prediction and trust-based source routing in mobile ad hoc networks”, Ad hoc Networks, pp. 2096-2114, 2013.

M. Ebrahimi, S. Jamali “ A Survey on Behavior and impact of Blackhole Attack in AODV protocol in Mobile Ad hoc Network”, International journal of Computer Science & Network Solutions, pp. 20-27, mar 2016.

Y.L. Sun, Z. Han, W. Yu, and K.J.R. Liu, “A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense against Attacks”, IEEE INFOCOM, 2006.

H. lie and M. Singhul, “Trust Management in Distributed Systems”, Computers, IEEE Computer Society, pp. 45-53, 2007.

J.H. Cho, A. Swami, and R.Chen, “A Survey on Trust Management for Mobile Ad Hoc Networks”, Comminucations Surveys & Totorials, IEEE, pp. 562-583, 2011.

J. Golbek, “Computing with Trust: Definition, Properties, and Algorithms”, Securecomm and Workshops, pp. 1-7, 2006.

G.S. Mamatha and Dr. S.C. Sharma, “A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS”, International Journal of Computer Science and Security (IJCSS), pp. 275-284, 2010.

D. Singh, A. Singh, “Enhanced Secure Trusted AODV (ESTA) Protocol to Mitigate Black hole Attack in Mobile Ad Hoc Networks”, future internet, pp. 342-362, 2015.

Y. Sun, W. Yu, Z. Han, and K.J.R. Liu, “Trust Modeling and Evaluation for Ad Hoc Networks”, Global Telecommunications Conference, Vol. 3, 2005.

Y. Sun, W. Yu, Z. Han, and K.J.R. Liu, “Attacks on Trust Evaluation in Distributed Networks”, 40th Annual Conference on Information Sciences and Systems, IEEE, pp. 1461-1466, 2006.

http://omnetpp.org, accessed May. 2015.

W. Gong, Z. You, D. Chen, X. Zhao, M. Gu and K. Lam, “Trust Based Routing for Misbehavior Detection in Ad Hoc Networks”, Journal of Networks, pp. 551-558, 2010.


Full Text: PDF

DOI: 10.28991/ijse-01127

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Niloofar Movahedian Attar