Abstract
Attaining high security in mobile ad hoc networks (or MANETs) is the utmost concern in the present era of wireless ad-hoc communication and efforts are continuously being made by the researchers, in order to provide a feasible solution for the same. Impervious security has to be ensured in MANETs because of their involvement in transacting highly sensitive information. However, it has been discerned that during the communication process, the decentralized and dynamic nature of MANETs impedes the security of mobile nodes. This study is an attempt to enhance the security in routing techniques of MANETs by overhauling the existing security system after its critical evaluation. It has been observed that the cryptographic techniques in use prove to be inefficient or fail in some of the current scenarios. Therefore, a non-cryptographic method has been put forward that strengthens the process of authenticating nodes in MANETs by taking into account two factors viz. trust and resource, unlike the conventional ones. On analyzing the performance with respect to throughput, packet delivery ratio, end-to-end delay and computational time, the proposed system proves to be better than the previous standard secure routing scheme.
References
Jin, M., Du, Z.: Management innovation and information technology. WIT Trans. Inf. Commun. Technol. 61, 2124 (2014)
Sarkar, S., Datta, R.: A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw. 37, 209–227 (2016)
Sarkar, S.: Wireless sensor and ad hoc networks under diversified network scenarios. Artech House, Boston, Mass. (2012)
Khan, B., Olanrewaju, R.F., Baba, A.M., Mir, R.N., Lone, S.A.: DTASR: dual threshold-based authentication for secure routing in mobile adhoc network. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 22(1), 1–9 (2015)
Vashist, P., Hema, K.: New multicast routing protocol in ad-hoc network. Int. J. Innovations Eng. Technol. (IJIET) 2(2), 108–119 (2013)
Aluvala, S., Sekhar, K.R., Vodnala, D.: An empirical study of routing attacks in mobile ad-hoc networks. Proc. Comput. Sci. 92, 554–561 (2016)
Khan, B., Olanrewaju, R.F., Ali, N.A., Shah, A.: ElePSO: energy aware elephant swarm optimization for mobile adhoc network. Pensee J. 76(5), 88–103 (2014)
McNerney, P.J., Zhang, N.: A study on reservation-based adaptation for QoS in adversarial MANET environments. In: 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 677–682. IEEE (2012)
Lafta, H.A., Al-Salih, A.M.: Efficient routing protocol in the mobile ad-hoc network (MANET) by using genetic algorithm (GA). IOSR J. (IOSR J. Comput. Eng.) 1(16), 47–54 (2014)
Ahmed, M.N., Abdullah, A.H., Chizari, H., Kaiwartya, O.: F3TM: flooding factor based trust management framework for secure data transmission in MANET. J. King Saud Univ.-Comput. Inf. Sci. (2016). https://doi.org/10.1016/j.jksuci.2016.03.004
Loo, L., Mauri, J., Ortiz, J.: Mobile Ad Hoc Networks: Current Status and Future Trends, p. 538. CRC Press, Inc. Boca Raton, FL, USA©2011 (2012)
Kennington, J., Olinick, E., Rajan, D.: Wireless Network Design. Springer, New York (2011)
Sadasivam, K., Yang, T.A.: Evaluation of certificate-based authentication in mobile ad hoc networks. In: IASTED International Conference on Networks and Communication Systems (NCS 2005), Krabi, Thailand (2005)
Aluvala, S., Sekhar, K.R., Vodnala, D.: A novel technique for node authentication in mobile ad hoc networks. Perspect. Sci. 8, 680–682 (2016)
Amine. A,, Ait Mohamed, O., Benatallah, B.: Network Security Technologies: Design and Applications, p. 330. IGI Global (2013)
Pathan, A., Monowar, M., Fadlullah, Z.: Building Next-Generation Converged Networks: Theory and Practice. CRC Press, Boca Raton, FL (2013)
Pathan, A.: Security of self-organizing networks: MANET, WSN, WMN, VANET. Auerbach Pub, Boca Raton (2011)
Thorat, S.A., Kulkarni, P.J.: Uncertainty analysis framework for trust based routing in MANET. Peer-to-Peer Netw. Appl. 1–11 (2016)
Yavuz, A.A., Alagöz, F., Anarim, E.: A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. Turk. J. Electr. Eng. Comput. Sci. 18(1), 1–22 (2010)
O’rourke, C., Johnson, S.B.: Mobile ad hoc networking revamps military communications. Mil. Electron. Comput. (2011)
Sarkar, S., Datta, R.: A game theoretic model for stochastic routing in self-organized MANETs. In: IEEE Wireless Communications and Networking Conference (WCNC), pp. 1962–1967 (2013)
Ji, Z., Yu, W., Liu, K.R.: A game theoretical framework for dynamic pricing-based routing in self-organized MANETs. IEEE J. Sel. Areas Commun. 26(7), 1204–1217 (2008)
Anderegg, L., Eidenbenz, S.: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 245–259. ACM (2003)
Shen, H., Li, Z.: A hierarchical account-aided reputation management system for MANETs. IEEE/ACM Trans. Netw. (TON) 23(1), 70–84 (2015)
Zapata, M.G.: Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mob. Comput. Commun. Rev. 6(3), 106–107 (2002)
Sarkar, S., Kisku, B., Misra, S., Obaidat, M.S.: Chinese remainder theorem-based RSA-threshold cryptography in MANET using verifiable secret sharing scheme. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 258–262 (2009)
Buttyán, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8(5), 579–592 (2003)
Sarkar, S., Datta, R.: AODV-based technique for quick and secure local recovery from link failures in MANETs. Int. J. Commun. Netw. Distrib. Syst. 11(1), 92–116 (2013)
Khan, B., Olanrewaju, R., Habaebi, M.: Malicious behaviour of node and its significant security techniques in MANET-a review. Aust. J. Basic Appl. Sci. 7(12), 286–293 (2013)
Khan, B., Olanrewaju, R., Mir, R., Adebayo, B.: Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. Am. J. Comput. Sci. Eng. 2(3), 10–19 (2015)
Marimuthu, M., Krishnamurthi, I.: Enhanced OLSR for defense against DOS attack in ad hoc networks. J. Commun. Netw. 15(1), 31–37 (2013)
Venkataraman, R., Rama Rao, T., Pushpalatha, M.: Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3), 131–140 (2012)
Lv, X., Li, H.: Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. IET Inf. Secur. 7(2), 61–66 (2013)
Zhang, P., Lin, C., Jiang, Y., Fan, Y., Shen, X.: A lightweight encryption scheme for network-coded mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 2211–2221 (2014)
Dangare, N.N., Mangrulkar, R.S.: Design and implementation of trust based approach to mitigate various attacks in mobile ad hoc network. Proc. Comput. Sci. 78, 342–349 (2016)
Zhao, S., Aggarwal, A., Frost, R., Bai, X.: A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun. Surv. Tutorials 14(2), 380–400 (2012)
Dhanapal, J., Srivatsa, S.: Link quality-based cache replacement technique in mobile ad hoc network. IET Inf. Secur. 7(4), 277–282 (2013)
Xi, S., Liang, S., Jianfeng, M., Zhuo, M.: A trust management scheme based on behavior feedback for opportunistic networks. China Commun. 12(4), 117–129 (2015)
Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)
Tan, S., Li, X., Dong, Q.: Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw. 30, 84–98 (2015)
Wan, Z., Ren, K., Gu, M.: USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks. IEEE Trans. Wirel. Commun. 11(5), 1922–1932 (2012)
Khan, B., Olanrewaju, R.F., Mir, R.N., Baba, A., Adebayo, B.W.: Strategic profiling for behaviour visualization of malicious node in Manets using game theory. J. Theoret. Appl. Inf. Technol. 77(1), 25–43 (2015)
Khan, B., Olanrewaju, R.F., Anwar, F., Shah, A.: Manifestation and mitigation of node misbehaviour in adhoc networks. Wulfenia J. 21(3), 462–470 (2014)
Joshi, S.S., Biradar, S.R.: Communication framework for jointly addressing issues of routing overhead and energy drainage in MANET. Proc. Comput. Sci. 89, 57–63 (2016)
Rajkumar, B., Narsimha, G.: Trust based certificate revocation for secure routing in MANET. Proc. Comput. Sci. 92, 431–441 (2016)
Phu, P., Yi, M., Kim, M.: Securing AODV routing protocol in mobile ad-hoc networks. In: Active and Programmable Networks, vol. 4388, pp. 182–187. Springer, Berlin (2009)
Acknowledgements
I would like to express my sincere gratitude towards Prof. A. G. Lone; I could see myself becoming a researcher just because, coincidently he was teaching mathematics at the same Engineering College from where I graduated.
This work was partially supported by Ministry of Higher Education Malaysia (Kementerian Pendidikan Tinggi) under Research Initiative Grant Scheme number (RIGS15-150-0150).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Khan, B.U.I., Olanrewaju, R.F., Mir, R.N., Yusoff, S.H., Sanni, M.L. (2018). Trust and Resource Oriented Communication Scheme in Mobile Ad Hoc Networks. In: Bi, Y., Kapoor, S., Bhatia, R. (eds) Intelligent Systems and Applications. IntelliSys 2016. Studies in Computational Intelligence, vol 751. Springer, Cham. https://doi.org/10.1007/978-3-319-69266-1_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-69266-1_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69265-4
Online ISBN: 978-3-319-69266-1
eBook Packages: EngineeringEngineering (R0)