T2AR: trust-aware ad-hoc routing protocol for MANET

被引:17
作者
Dhananjayan, Gayathri [1 ]
Subbiah, Janakiraman [2 ]
机构
[1] Bharathiar Univ, Dept Comp Sci, Coimbatore 641046, Tamil Nadu, India
[2] Pondicherry Univ, Dept Banking Technol, Pondicherry, India
关键词
Mobile ad-hoc network (MANET); Ad hoc on-demand distance vector (AODV); Trust management; Neighbor estimation algorithm; MANAGEMENT; SCHEME; MODEL;
D O I
10.1186/s40064-016-2667-6
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.
引用
收藏
页数:16
相关论文
共 25 条
[11]   A Survey on Trust Management for Mobile Ad Hoc Networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04) :562-583
[12]   Link-Stability and Energy Aware Routing Protocol in Distributed Wireless Networks [J].
De Rango, Floriano ;
Guerriero, Francesca ;
Fazio, Peppino .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (04) :713-726
[13]   Trust management in ubiquitous computing: A Bayesian approach [J].
Denko, Mieso K. ;
Sun, Tao ;
Woungang, Isaac .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :398-406
[14]   Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection [J].
Bao, Fenye ;
Chen, Ing-Ray ;
Chang, MoonJeong ;
Cho, Jin-Hee .
IEEE Transactions on Network and Service Management, 2012, 9 (02) :169-183
[15]   TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks [J].
Gunasekaran, Muthumanickam ;
Premalatha, Kandhasamy .
IET INFORMATION SECURITY, 2013, 7 (03) :203-211
[16]   Towards more reliable and secure source routing in mobile ad hoc and sensor networks [J].
Jawhar, Imad ;
Trabelsi, Zouheir ;
Al-Jaroodi, Jameela .
TELECOMMUNICATION SYSTEMS, 2014, 55 (01) :81-91
[17]   LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks [J].
Li, Xiaoyong ;
Zhou, Feng ;
Du, Junping .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) :924-935
[18]   Recommendation Based Trust Model with an Effective Defence Scheme for MANETs [J].
Shabut, Antesar M. ;
Dahal, Keshav P. ;
Bista, Sanat Kumar ;
Awan, Irfan U. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (10) :2101-2115
[19]   Trust based routing mechanism for securing OSLR-based MANET [J].
Tan, Shuaishuai ;
Li, Xiaoping ;
Dong, Qingkuan .
AD HOC NETWORKS, 2015, 30 :84-98
[20]  
Thanigaivel G., 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP), P261, DOI 10.1109/DICTAP.2012.6215430