Trust based routing for misbehavior detection in Ad hoc networks

被引:25
作者
Gong W. [1 ,2 ]
You Z. [1 ,2 ]
Chen D. [2 ]
Zhao X. [2 ]
Gu M. [2 ]
Lam K.-Y. [2 ]
机构
[1] Department of Computer Science and Technology, Tsinghua University, Beijing
[2] Key Laboratory of Information System Security of Ministry of Education, School of Software, Tsinghua University
关键词
MANET; Security; Trust model;
D O I
10.4304/jnw.5.5.551-558
中图分类号
学科分类号
摘要
Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. To deal with misbehavior in MANET, an incentive mechanism should be integrated into routing decision-making. In this paper firstly we review existing techniques for secure routing, and then propose to use trust vector model based routing protocols. Each node would evaluate its own trust vector parameters about neighbors through monitoring neighbors' pattern of traffic in network. At the same time, trust dynamics is included in term of robustness. Then we integrated trust model into Dynamic Source Routing (DSR) and Ad-hoc On Demand Distance Vector (AODV) which are most typical routing protocols in MANET. We evaluate the performance of those trust routing protocols by comparing the simulation results of with and without the proposed trust mechanism. The simulation results demonstrate that modified routing protocols can effectively detect malicious nodes and mitigate their attacks. © 2010 ACADEMY PUBLISHER.
引用
收藏
页码:551 / 558
页数:7
相关论文
共 18 条
  • [1] Bai F., Sadagopan N., Helmy A., Important: A framework to systematically analyze the impact of mobility on performance of routing protocols for ad hoc networks, Ieee Infocom, (2003)
  • [2] Hu Y., Perrig A., A Survey of Secure Wireless Ad Hoc Routing, Ieee Security & Privacy, pp. 28-39, (2004)
  • [3] Sanzgiri K., Et al., A Secure Routing Protocol for Ad Hoc Networks, Ieee Int'l Conf. Network Protocols (icnp'02), pp. 78-87, (2002)
  • [4] Guerrero Z.M., Asokan N., Securing Ad Hoc Routing Protocols, pp. 1-10, (2002)
  • [5] Yi S., Naldurg P., Kravets R., Security aware ad-hoc routing for wireless networks, Acm International Symposium On Mobile Ad Hoc Networking and Computing (mobihoc'01), pp. 299-302, (2001)
  • [6] Perrig A., Hu Y.C., Johnson D.B., Wormhole Protection In Wireless Ad-hoc Networks, (2001)
  • [7] Hu Y.-C., Perrig A., Johnson D.B., Rushing attacks and defense in wireless Ad-Hoc network routing protocols, Proceedings of The 2003 Acm Workshop On Wireless Security, pp. 30-40, (2003)
  • [8] The Network Simulator, (1989)
  • [9] Johnson D.B., Maltz D.A., Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, pp. 152-181, (1996)
  • [10] Hu Y.-C., Johnson D.B., Perrig A., Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks, The 4th Ieee Wksp. Mobile Computing Systems and Applications (wmcsa'02), (2002)