Agent-based trusted on-demand routing protocol for mobile ad-hoc networks

被引:16
作者
Abdel-Halim, Islam Tharwat [1 ]
Fahmy, Hossam Mahmoud Ahmed [1 ]
Bahaa-Eldin, Ayman Mohammad [1 ]
机构
[1] Ain Shams Univ, Dept Comp & Syst Engn, Fac Engn, Cairo, Egypt
关键词
Agent; DSR; MANETs; Routing; Trust; CHALLENGES; SECURITY;
D O I
10.1007/s11276-014-0793-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The routing performance in mobile ad hoc networks (MANETs) relies on the co-operation of the individual nodes that constitute the network. The existence of misbehaving nodes may paralyze the routing operation in MANETs. To overcome this behavior, the trustworthiness of the network nodes should be considered in the route selection process combined with the hop count. The trustworthiness is achieved by measuring the trust value for each node in the network. In this paper, a new protocol based on self monitoring (agent-based) and following the dynamic source routing (DSR) algorithm is presented. This protocol is called agent-based trusted dynamic source routing protocol for MANETs. The objective of this protocol is to manage trust information locally with minimal overhead in terms of extra messages and time delay. This objective is achieved through installing in each participated node in the network a multi-agent system (MAS). MAS consists of two types of agents: monitoring agent and routing agent. A new mathematical and more realistic objective model for measuring the trust value is introduced. This model is weighted by both number and size of routed packets to reflect the "selective forwarding" behavior of a node. The performance evaluation via simulation shows that our protocol is better than standard and trusted DSR. The simulation is done over a variety of environmental conditions such as number of malicious nodes, host density and movement rates.
引用
收藏
页码:467 / 483
页数:17
相关论文
共 30 条
  • [1] [Anonymous], 2002, RSA CRYPTOBYTES
  • [2] [Anonymous], 1996, Mobile Computing
  • [3] A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions
    Attar, Alireza
    Tang, Helen
    Vasilakos, Athanasios V.
    Yu, F. Richard
    Leung, Victor C. M.
    [J]. PROCEEDINGS OF THE IEEE, 2012, 100 (12) : 3172 - 3186
  • [4] Buchegger Buchegger S. S., 2002, Proceedings of ACM International Symposium on Mobile Ad Hoc Net-working and Computing (MobiHoc), P226
  • [5] de GodoyStenico., 2013, COMMUNICATIONS NETWO, V5, P239
  • [6] Dhurandher Sanjay K., 2009, Proceedings of the 2009 International Conference on Advances in Computing, Control, & Telecommunication Technologies (ACT 2009), P189, DOI 10.1109/ACT.2009.55
  • [7] FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems
    Dhurandher, Sanjay K.
    Obaidat, Mohammad S.
    Verma, Karan
    Gupta, Pushkar
    Dhurandher, Pravina
    [J]. IEEE SYSTEMS JOURNAL, 2011, 5 (02): : 176 - 188
  • [8] ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks
    He, Daojing
    Chen, Chun
    Chan, Sammy
    Bu, Jiajun
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (04): : 623 - 632
  • [9] He Q., 2002, P IEEE WCNC ATL US
  • [10] Hu Y., 2002, PROC 8 ACM INT C MOB, P12