Skip to main content

Trust Management in Ad Hoc Network for Secure DSR Routing

  • Conference paper

Abstract

An ad hoc network is wireless, self-configuring network of mobile routers forming a dynamic topology. In such an environment, any malicious behavior by these routers (nodes) could greatly compromise secured routing. However, just detecting the malicious nodes is not enough to guarantee security. It should be ensured that, only trusted nodes take part in routing. In this paper, we propose a distributed dynamic trust evaluation scheme for securing DSR routing in mobile ad hoc and sensor networks. Each node periodically calculates trust for others based on its direct experience, recommendation and previous knowledge. Extensive simulation studies show that our scheme, unlike most of the previously proposed ones, efficiently adapt to fast changing trust scenario and the trust converges to values, revealed by long term behavior of the nodes. This scheme is resistant to ‘ collusion’ attack and is cautious not to punish nodes when packet is dropped due to ‘ node mobility’

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dave B. Johnson and David A. Maltz, ”The dynamic source routing protocol for mobile ad hoc networks”, Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, October 1999.

    Google Scholar 

  2. Indrajit Ray, Sudip Chakravorty, and Indrakshi Ray, Colorado State University, ”VTrust: A trust management system based on vector model of trust”.

    Google Scholar 

  3. Asad Amir Pirzada and Chris McDonald, School of Computer Science & Software Engineering, The University of Western Australia, ”Establishing Trust in Pure Ad-hoc Networks”.

    Google Scholar 

  4. L. Zhou and Z. J. Haas, ”Securing Ad Hoc networks”, IEEE Networks Special Issue on Network Security, December, 1999.

    Google Scholar 

  5. Fernandez-Gago, M. Carmen; Roman, Rodrigo; Lopez, Javier; ”A Survey on the Applicability of Trust Management Systems for Wireless Sensor”, Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007, SECPerU 2007, Third International Workshop.

    Google Scholar 

  6. Venkatesan Balakrishnan and Vijay Varadharajan, ”Designing Secure Wireless Mobile Ad hoc Networks”, Advanced Information Networking and Applications, 2005, 19th International Conference.

    Google Scholar 

  7. Catharina Candolin and Hannu H. Kari,. ”A Security Architecture for Wireless adhoc networks”, Helsinki university of technology.

    Google Scholar 

  8. Pietro Michiardi and Refik Molva, ”CORE: A Collaborative Reputation mechanism to enforce node cooperation in mobile ad hoc networks”, Proc. IFIP-Communication and Multimedia Security availability in mobile adhoc WANs, Proc. MobiHoc, Conference, 2002.

    Google Scholar 

  9. Sonja Buchegger and Jean-Yves Le Boudec, ”Nodes Bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks”, Proc. 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, January 2002.

    Google Scholar 

  10. Rajiv Misra, and C.R.Mandal, ”Performance Comparison of AODV/ DSR On-Demand Routing Protocols for Ad Hoc Networks in Constrained Situation”.

    Google Scholar 

  11. Ali Aydin, Ersin Uzun, and Mark Pariente, ”A Reputation based trust management system for P2P networks”, 2004 IEEE International Symposium on Cluster Computing and the Grid.

    Google Scholar 

  12. Stephen Weeks., ”Understanding Trust Management Systems”, IEEE 2001.

    Google Scholar 

  13. Edith C.H.Ngai and Michael R.Lyu, ”Trust and Clustering based Authentication Services in Mobile Ad Hoc Networks”, Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCSW’ 04).

    Google Scholar 

  14. Ren, Li, Wan, Bao, Deng, and Kim, ”Highly Reliable Trust Establishment Scheme in Ad hoc Networks”.

    Google Scholar 

  15. Florina Almeńarez, Andŕes Maŕimath n, Daniel ´iaz, and Juan Sanc´ez, ”Developing a Model for Trust Management in Pervasive Devices”, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW’ 06).

    Google Scholar 

  16. Asad Amir Pirzada, Amitava Datta and Chris McDonald. School of Computer Science, The University of Western Australia, ”Trusted Routing in Ad-hoc Networks using Pheromone Trails”, ”Propagating Trust in Ad-hoc Networks for Reliable Routing”.

    Google Scholar 

  17. Yacine Rebahi, Vicente .E Mujica-V, and Dorgham Sisalem, ”A Reputation-Based Trust Mechanism for Ad hoc Networks”.

    Google Scholar 

  18. UC Berkeley and USC ISI, ”The network simulator ns-2”, Part of the VIN T project. Available from http:/ / www.isi.edu/ nsnam/ ns,1998.

    Google Scholar 

  19. http:/ / www.ietf.org, RFC - 177.

    Google Scholar 

  20. http:/ / www.ietf.org, RFC - 2441.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media B.V.

About this paper

Cite this paper

Choudhury, S., Roy, S.D., Singh, S.A. (2008). Trust Management in Ad Hoc Network for Secure DSR Routing. In: Sobh, T., Elleithy, K., Mahmood, A., Karim, M.A. (eds) Novel Algorithms and Techniques In Telecommunications, Automation and Industrial Electronics. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8737-0_89

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-8737-0_89

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-8736-3

  • Online ISBN: 978-1-4020-8737-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics