Advertisement

Mobile Networks and Applications

, Volume 18, Issue 5, pp 666–677 | Cite as

Trust-Based Routing Mechanism in MANET: Design and Implementation

  • Tameem Eissa
  • Shukor Abdul Razak
  • Rashid Hafeez Khokhar
  • Normalia Samian
Article

Abstract

Mobile Ad hoc Network (MANET) is a self-organizing wireless network for mobile devices. It does not require any fixed infrastructure to be configured which makes it more suitable to be used in environments that require on-the-fly setup. This paper discusses the challenging issues in MANET routing security. It presents FrAODV, a trust-based scheme for securing AODV routing protocol in MANET using the friendship mechanism. The nodes can evaluate the routing paths according to some selected features (such as node reputation and identity information) before forwarding the data through these routes. We have used two types of implementation in our scheme, simulation (using NS2) and real test-bed (using JADHOC). This scheme is believed to provide a robust environment where MANET nodes can trust each other in a secure community.

Keywords

mobile ad hoc network security trust feature 

Notes

Acknowledgment

This research has been supported by the Ministry of Science, Technology and Innovation (MOSTI) Malaysia under E-Science Project vote No. 79261.

References

  1. 1.
    Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE International Conference on Network Protocols, ICNP ’02, pp 78–89, Washington, DC, USA, 2002. IEEE Computer SocietyGoogle Scholar
  2. 2.
    Hu Y-C, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2nd ACM workshop on Wireless security,WiSe ’03, pp 30–40, New York, NY, USA. ACMGoogle Scholar
  3. 3.
    Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security, WiSE ’02, pp 1–10, New York, NY, USA. ACMGoogle Scholar
  4. 4.
    Al-Shurman M, Yoo S-M, Park S (2004) Black hole attack in mobile ad hoc networks. In Proceedings of the 42nd annual Southeast regional conference, ACM-SE 42, pp 96–97, New York, NY, USA. ACMGoogle Scholar
  5. 5.
    Hu Y-C, Perrig A, Johnson DB (2003) Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, volume 3, pp 1976–1986, march-3 April 2003Google Scholar
  6. 6.
    Johnson DB, Maltz DA (1996) Dynamic Source Routing in Ad HocWireless Networks. Kluwer Academic PublishersGoogle Scholar
  7. 7.
    Perkins CE, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In Proceedings of the conference on Communications architectures, protocols and applications, SIGCOMM ’94, pp 234–244, New York, NY, USA. ACMGoogle Scholar
  8. 8.
    Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA ’99. Second IEEE Workshop on, pp 90–100, Feb 1999Google Scholar
  9. 9.
    Zhou L, Haas ZJ (1999) Securing ad hoc networks. Network, IEEE 13(6):24–30CrossRefGoogle Scholar
  10. 10.
    Buttýan L, Hubaux J-P (2003) Stimulating cooperation in self-organizing mobile ad hoc networks. Mob Netw Appl 8:579–592CrossRefGoogle Scholar
  11. 11.
    Kong J, Luo H, Xu K, Gu DL, Gerla M, Lu S (2002) Adaptive security for multilevel ad hoc networksGoogle Scholar
  12. 12.
    Hu Y-C, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11:21–38CrossRefGoogle Scholar
  13. 13.
    Yang H, Meng X, Lu S (2002) Scane: Selforganized network-layer security in mobile ad hoc networks. In Proceedings of the 1st ACM workshop on Wireless security, WiSE ’02, pp 11–20, New York, NY, USA. ACMGoogle Scholar
  14. 14.
    Saxena N, Tsudik G, Yi JH (2009) Efficient node admission and certificateless secure communication in short-lived manets. Parallel and Distributed Systems, IEEE Transactions 20(2):158–170CrossRefGoogle Scholar
  15. 15.
    Frankel Y, Yung M, Desmedt Y (1994) How to share a function securely (extended summary (1994)). In Symposium on the Theory of Computation (STOC)Google Scholar
  16. 16.
    Zhang Y, Lou W, Liu W, Fang Y (2007) A secure incentive protocol for mobile ad hoc networks. Wirel Netw 13:569–582CrossRefGoogle Scholar
  17. 17.
    Saxena N, Tsudik G, Yi JH (2007) Threshold cryptography in p2p and manets: the case of access control. Comput Netw 51:3632–3649MATHCrossRefGoogle Scholar
  18. 18.
    Thakur V, Marshall J, Yasinsac A (2003) Identifying flaws in the secure routing protocol. In Proc. 2003 IEEE Intl. Performance, Computing, and Commun. Conf, p 167174Google Scholar
  19. 19.
    Papadimitratos P, Haas ZJ (2002) Secure routing formobile ad hoc networks. In SCS Communication Networks And Distributed Systems Modeling And Simulation Conference (CNDS 2002), pp 193–204Google Scholar
  20. 20.
    Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRefGoogle Scholar
  21. 21.
    Buttyn L, Vajda I (2004) Towards provable security for ad hoc routing protocols. In In Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN, pp 94–105. ACM PressGoogle Scholar
  22. 22.
    Yi S, Naldurg P, Kravets R (2001) Security-aware ad hoc routing for wireless networksGoogle Scholar
  23. 23.
    Carter S, Yasinsac A (2002) Secure position aided ad hoc routing. In Proc. IASTED Intl. Conf. Commun. And Computer Networks (CCN02), pp 329–334Google Scholar
  24. 24.
    Papadimitratos P, Haas ZJ (2003) Secure link state routing for mobile ad hoc networksGoogle Scholar
  25. 25.
    Andel TR, Yasinsac A (2007) Surveying security analysis techniques in manet routing protocols. Communications Surveys Tutorials, IEEE 9(4):70–84CrossRefGoogle Scholar
  26. 26.
    Weimerskirch A, Thonet G (2002) A distributed light-weight authentication model for ad-hoc networks. In Proceedings of the 4th International Conference Seoul on Information Security and Cryptology, ICISC ’01. Springer-Verlag, London, UK, pp 341–354Google Scholar
  27. 27.
    Wang G, Wang Q, Cao J, Guo M (2007) An effective trust establishment scheme for authentication in mobile ad hoc networks, pp 749–754, OctGoogle Scholar
  28. 28.
    Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In In Proceedings of the Security Protocols Workshop, pp 47–66. Springer-VerlagGoogle Scholar
  29. 29.
    Zhu S, Zhu S, Xu S, Setia S, Jajodia S (2003) Lhap: A lightweight hop-by-hop authentication protocol for ad-hoc. In In Proc. of the 23rd International Conference on Distributed Computing Systems Workshops, p 749755Google Scholar
  30. 30.
    Ren K, Li T, Wan Z, Bao F, Deng RH, Kim K (2004) Highly reliable trust establishment scheme in ad hoc networks. Comput Netw 45:687–699MATHCrossRefGoogle Scholar
  31. 31.
    Samian N, Maarof MA, Razak SA (2008) Towards identifying features of trust in mobile ad hoc network. In Proceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS), pages 271–276, Washington, DC, USA, 2008. IEEE Comput SocGoogle Scholar
  32. 32.
    Abusalah L, Khokhar A, BenBrahim G, ElHajj W (2006) Tarp: trust-aware routing protocol. In Proceedings of the 2006 international conference on Wireless communications and mobile computing, IWCMC ’06, pp 135–140, New York, NY, USA, ACMGoogle Scholar
  33. 33.
    Li H, Singhal M (2006) A secure routing protocol for wireless ad hoc networks. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 09, pages 225.1–, Washington, DC, USA. IEEE Comput SocGoogle Scholar
  34. 34.
    Nekkanti RK, Lee C (2004) Trust based adaptive on demand ad hoc routing protocol. In Proceedings of the 42nd annual Southeast regional conference, ACM-SE 42, pp 88–93, New York, NY, USA, ACMGoogle Scholar
  35. 35.
    Pirzada AA, McDonald C (2004) Establishing trust in pure ad-hoc networks. 27th Conference on Australasian Computer Science (CRPIT 04), January 2004Google Scholar
  36. 36.
    Zhang P, Yan Z, Virtanen T (2003) Trust evaluation based security solution in ad hoc networks. In Proceedings of the 7th Nordic Workshop on Secure IT Systems, pp 1–14Google Scholar
  37. 37.
    Pandey AK (2005) Study of manet routing protocols by glomosim simulator. In International Journal Of Network Management, volume 15, pp 393–410. John Wiley and Sons, LtdGoogle Scholar
  38. 38.
    Rani A, Dave M (2007) Performance evaluation of modified aodv for load balancing 1. J Comput SciGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Tameem Eissa
    • 1
  • Shukor Abdul Razak
    • 1
  • Rashid Hafeez Khokhar
    • 1
  • Normalia Samian
    • 1
  1. 1.Universiti Putra MalaysiaSelangorMalaysia

Personalised recommendations