A Power Efficient Trust Based SecureRouting Scheme for Mobile Ad-Hoc Networks (original) (raw)

T-SEA: trust based secure and energy aware routing protocol for mobile ad hoc networks

International Journal of Information Technology, 2019

A trust based secure and energy aware (T-SEA) routing protocol for detection and isolation of black/gray hole nodes in mobile ad hoc networks (MANETs) is proposed in this paper. Energy aware characteristic is a vital requirement for prolonging MANET lifespan. Intrusion detection systems (IDSs) are used to monitor and catch black/gray hole nodes. Nodes having sufficient energy, high value of trust and maximum connections are selected as IDS capable nodes. T-SEA first detects suspicious nodes during data transfer phase without requiring any node to activate in sniff mode. Only few nodes (IDS nodes) out of IDS capable nodes function in sniff manner for monitoring during data transmission phase. During monitoring, IDS nodes detect a node as malicious based on nodes' current behavior, current trust and behavior recorded during previous transmissions. The detection technique is energy aware since IDS executes only on few nodes at a time subsequent to the discovery of attack. This paper employs NS-2 to validate the proposed protocol. Keywords Mobile ad hoc networks Á Intrusion detection system Á Energy aware Á Black hole attack Á Gray hole attack Á Security Á Trust Á Dynamic source routing protocol

Energy Efficient Secure Routing Framework Based on Multidimensional Trust Evaluation for MANET

Journal of Network and Information Security, 2019

Very popular MANET works with some functions like data exchange, communication management and routing etc. based on the cooperation. Assess the trustworthiness of the nodes became important since trust is the pillar for cooperation. For secure routing, an efficient trust management mechanism should be implemented in such a way that it could not change the basic nature of network. Mobility, battery limitation and the computational complexities make the trust evaluation a challenging task. To manage the energy during inside attack this paper proposes a trust based energy efficient routing approach, as the extension of our previous work [10] by including various dimensions of trust such as initial trust, behavioral and recommended trust. Most favourite Ad-hoc On-demand Distance Vector (AODV) Routing protocol is used as a representative in the proposed framework. In this paper, a multidimensional trust evaluation security solution is proposed to make minimal changes to the functioning of AODV and achieved an increased level of security and reliability.

A relationship-based approach for energy aware secure routing in MANETs

International Journal of Smart Grid and Green Communications, 2016

Secure routing is one of the major issues which is affecting the widespread use of MANETs. To address this issue several methodologies have been proposed and some of them were able to achieve a considerable amount of success but with a considerable amount of computational overhead. In this paper, we propose a new secure routing mechanism for MANETS. This mechanism uses trust-based method to establish secure routes. It is a family relationship-based approach in which security is established by considering certain parameters which can be used to determine the ingenuity of the nodes. It also considers the parameters like energy consumption and signal strength of the node. The proposed method does not use any protocol specific parameter and thus can be used over any on demand routing protocol like AODV or DSR. As components of MANETs have several resource constraints, this paper aims at providing an improved AODV protocol called secure family-based routing protocol (SFRP) with reduced resource consumption and security enabled.

TRUST BASED ROUTING PROTOCOL FOR AD-HOC AND SENSOR NETWORKS

Routing protocols in mobile ad hoc and sensor networks discover usable multi-hop routes between source and destination nodes. However, some of the routes found and used may not be as reliable or trustable as expected. Thus, finding a trusted route is an important component for enhancing the security of communication. This paper presents a trust-based routing protocol for enhanced security of communication in mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). Enhanced trust and security are achieved by the maintenance of a trust factor by the nodes in the network. This factor is established and refined over time and it increases for each node when it participates successfully in data transmissions. Simulation experiments are performed to verify the operation of the proposed protocol and evaluate its performance. The results show an improvement in the trust potential of the discovered path with the proper choice of certain important trust parameters.

Light-weight trust-based routing protocol for mobile ad hoc networks

IET Information Security, 2012

Mobile ad hoc networks (MANETs) were originally designed for a cooperative environment. To use them in hostile environments, trust-based routing can be used, where instead of establishing the shortest routes as done in traditional routing protocols, most trusted routes are established. In this study, the authors present a lightweight trust-based routing protocol. It is lightweight in the sense that the intrusion detection system (IDS) used for estimating the trust that one node has for another, consumes limited computational resource. Moreover, it uses only local information thereby ensuring scalability. Our lightweight IDS takes care of two kinds of attacks, namely, the blackhole attack and the grey hole attack. Whereas our proposed approach can be incorporated in any routing protocol, the authors have used AODV as the base routing protocol to evaluate our proposed approach and give a performance analysis.

Evaluation of the Energy Consumption Introduced by a Trust Management Scheme on Mobile Ad-hoc Networks

Journal of Networks, 2015

Nodes in mobile ad-hoc networks communicate each other using the wireless transmission. Many protocols have been proposed allowing the establishment of multi-hop paths to connect source and destination nodes. The absence of a physical link between the nodes and the multi-hop routing lead to a lack of security. Different typologies of attack effective against MANETs have been investigated thoroughly, and many solutions have been proposed to take the required countermeasures. Many of them are based on the cryptography, protecting data with digital signatures and hash chains, but they are not useful when a fair node is compromised later in time. Using a Trust Management Scheme can help in these situations, allowing to evaluate dynamically if a node is trustworthy or not. The computation of a trust value requires the monitoring of the interactions between nodes, therefore it has an effect on the energy consumption, which is an important issue of ad-hoc networks. Energy availability is limited for the nodes in a MANET, so the security measures that they adopt must not excessively increase the consumption.

A Survey of Trust Based Routing Protocols in MANETs

Journal of Advances in Computer Networks, 2014

Mobile Adhoc Networks are type of wireless network which are infrastructure less, self organizing, highly mobile and quickly deployable. There is no central authority, the communication occur hop by hop based on cooperation among the nodes. Thus, secure routing protocols are needed which are robust and ensure that the nodes in the network behave in trustworthy manner otherwise detect and eliminate the untrustworthy nodes which degrade the overall network performance. There are several trust based AODV routing protocols given in the past. In this paper, we have given a survey of trust based AODV, in which concept of TRUST is used to ensure secure routing and improved network performance.

A Novel Protocol for Enhanced Energy Efficient and Secure Routing Protocol in MANET

A Wireless Sensor Network (WSN) consists of sensor nodes that perform as source as well as link nodes to send the data to sink node. On the other hand, the nodes in network have restricted computation complication, transmission capability and limited life of the battery. Many routing protocols are there for enhancing the network performance apart from very few focuses on security concerns. The performance of routing along with security protocol in WSN have an effect on due to untrustworthy low power links, insecure communication, threats, and resource restrictions that limits of an effective routing design in addition to security algorithm in WSNs. In this paper, we propose a fuzzy with trust management and Enhanced Energy Efficient Secure Routing Protocol (EEESRP) with Security using less consumption of energy. The proposed scheme comprises of securing data transmission with distribution of keys using very less amount of energy as the mobile nodes are having limited power resources. In key generation cluster head distributes the keys among nodes. This model calculates trust value of the nodes with the help of node's energy value It enables end-to-end communication among nodes. Proposed algorithm is tested and evaluated in Network Simulator-2 then compared the outcomes like throughput, Packet Delivery Ratio (PDR), energy consumption, End-to-End (E2E) delay and normalized overhead with some algorithms and graphs are obtained.

An energy and trust-aware routing protocol for large wireless sensor networks

2009

Efficient defense against security attacks is a challenging task in the wireless sensor network environment. Although significant research effort has been spend on the design of trust models to detect malicious nodes based on direct and indirect evidence, this comes at the cost of additional energy consumption. The situation is further aggravated as the next generation wireless sensor network will be larger and larger. To face this problem, we propose a secure routing protocol (Ambient Trust Sensor Routing, ATSR) which adopts the geographical routing principle to cope with the network dimensions and relies on a distributed trust model for the detection of malicious nodes. Both direct and indirect trust information is taken into account to evaluate the trustworthiness of each neighbour. An important feature of the proposed routing solution is that it takes into account the remaining energy of each neighbour, thus allowing for better load balancing and network lifetime extension. Based on computer simulation results we evaluate the additional energy consumption caused by the exchange of indirect trust information and the benefits stemming from the adoption of our algorithm

Knowledge Based Trust for Secure Routing Process in Mobile Ad-hoc Networks

2014

In recent years, there has been a huge use of mobile computing devices and those led to the development of ad-hoc networking standards and provide the mobile nodes to set up self-organizing, adaptive, and short-lived networks. A mobile ad hoc network consists of wireless mobile nodes forming a temporary network without the help of centralized infrastructure, and where nodes communicate through multi-hops. Trust should be derived under time-critical conditions, and in a distributed way. Trust management in MANETs is needed when participating nodes establish a network, without any interactions previously, with an acceptable level of trust themselves. Trust system can be used to provide network security services like access control, malicious node detection, secure resource sharing, and authentication. So, evaluate the trust value of the nodes periodically based on trust metrics and computational methods. Trust management and computations are challenging issues in MANETs due to independent movement of nodes and computational complexity constraints. Trust management is a multifunctional control mechanism in which the most important task is to establish trust between nodes who are neighbors and making a routing path. A key concept of this project is to propose a trust based secure routing process scheme in MANETs without using any centralized infrastructure. We designed a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. The proposed scheme minimizes the overhead using transiting packets on the network to update nodes knowledge about other nodes trustworthiness and select a secured routing path based on trust knowledge of nodes.