Skip to main content

Trust and Resource Oriented Communication Scheme in Mobile Ad Hoc Networks

  • Conference paper
  • First Online:
Book cover Intelligent Systems and Applications (IntelliSys 2016)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 751))

Included in the following conference series:

Abstract

Attaining high security in mobile ad hoc networks (or MANETs) is the utmost concern in the present era of wireless ad-hoc communication and efforts are continuously being made by the researchers, in order to provide a feasible solution for the same. Impervious security has to be ensured in MANETs because of their involvement in transacting highly sensitive information. However, it has been discerned that during the communication process, the decentralized and dynamic nature of MANETs impedes the security of mobile nodes. This study is an attempt to enhance the security in routing techniques of MANETs by overhauling the existing security system after its critical evaluation. It has been observed that the cryptographic techniques in use prove to be inefficient or fail in some of the current scenarios. Therefore, a non-cryptographic method has been put forward that strengthens the process of authenticating nodes in MANETs by taking into account two factors viz. trust and resource, unlike the conventional ones. On analyzing the performance with respect to throughput, packet delivery ratio, end-to-end delay and computational time, the proposed system proves to be better than the previous standard secure routing scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Jin, M., Du, Z.: Management innovation and information technology. WIT Trans. Inf. Commun. Technol. 61, 2124 (2014)

    Google Scholar 

  2. Sarkar, S., Datta, R.: A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw. 37, 209–227 (2016)

    Article  Google Scholar 

  3. Sarkar, S.: Wireless sensor and ad hoc networks under diversified network scenarios. Artech House, Boston, Mass. (2012)

    Google Scholar 

  4. Khan, B., Olanrewaju, R.F., Baba, A.M., Mir, R.N., Lone, S.A.: DTASR: dual threshold-based authentication for secure routing in mobile adhoc network. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 22(1), 1–9 (2015)

    Google Scholar 

  5. Vashist, P., Hema, K.: New multicast routing protocol in ad-hoc network. Int. J. Innovations Eng. Technol. (IJIET) 2(2), 108–119 (2013)

    Google Scholar 

  6. Aluvala, S., Sekhar, K.R., Vodnala, D.: An empirical study of routing attacks in mobile ad-hoc networks. Proc. Comput. Sci. 92, 554–561 (2016)

    Article  Google Scholar 

  7. Khan, B., Olanrewaju, R.F., Ali, N.A., Shah, A.: ElePSO: energy aware elephant swarm optimization for mobile adhoc network. Pensee J. 76(5), 88–103 (2014)

    Google Scholar 

  8. McNerney, P.J., Zhang, N.: A study on reservation-based adaptation for QoS in adversarial MANET environments. In: 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 677–682. IEEE (2012)

    Google Scholar 

  9. Lafta, H.A., Al-Salih, A.M.: Efficient routing protocol in the mobile ad-hoc network (MANET) by using genetic algorithm (GA). IOSR J. (IOSR J. Comput. Eng.) 1(16), 47–54 (2014)

    Article  Google Scholar 

  10. Ahmed, M.N., Abdullah, A.H., Chizari, H., Kaiwartya, O.: F3TM: flooding factor based trust management framework for secure data transmission in MANET. J. King Saud Univ.-Comput. Inf. Sci. (2016). https://doi.org/10.1016/j.jksuci.2016.03.004

    Google Scholar 

  11. Loo, L., Mauri, J., Ortiz, J.: Mobile Ad Hoc Networks: Current Status and Future Trends, p. 538. CRC Press, Inc. Boca Raton, FL, USA©2011 (2012)

    Google Scholar 

  12. Kennington, J., Olinick, E., Rajan, D.: Wireless Network Design. Springer, New York (2011)

    Book  MATH  Google Scholar 

  13. Sadasivam, K., Yang, T.A.: Evaluation of certificate-based authentication in mobile ad hoc networks. In: IASTED International Conference on Networks and Communication Systems (NCS 2005), Krabi, Thailand (2005)

    Google Scholar 

  14. Aluvala, S., Sekhar, K.R., Vodnala, D.: A novel technique for node authentication in mobile ad hoc networks. Perspect. Sci. 8, 680–682 (2016)

    Article  Google Scholar 

  15. Amine. A,, Ait Mohamed, O., Benatallah, B.: Network Security Technologies: Design and Applications, p. 330. IGI Global (2013)

    Google Scholar 

  16. Pathan, A., Monowar, M., Fadlullah, Z.: Building Next-Generation Converged Networks: Theory and Practice. CRC Press, Boca Raton, FL (2013)

    Book  Google Scholar 

  17. Pathan, A.: Security of self-organizing networks: MANET, WSN, WMN, VANET. Auerbach Pub, Boca Raton (2011)

    Google Scholar 

  18. Thorat, S.A., Kulkarni, P.J.: Uncertainty analysis framework for trust based routing in MANET. Peer-to-Peer Netw. Appl. 1–11 (2016)

    Google Scholar 

  19. Yavuz, A.A., Alagöz, F., Anarim, E.: A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. Turk. J. Electr. Eng. Comput. Sci. 18(1), 1–22 (2010)

    Google Scholar 

  20. O’rourke, C., Johnson, S.B.: Mobile ad hoc networking revamps military communications. Mil. Electron. Comput. (2011)

    Google Scholar 

  21. Sarkar, S., Datta, R.: A game theoretic model for stochastic routing in self-organized MANETs. In: IEEE Wireless Communications and Networking Conference (WCNC), pp. 1962–1967 (2013)

    Google Scholar 

  22. Ji, Z., Yu, W., Liu, K.R.: A game theoretical framework for dynamic pricing-based routing in self-organized MANETs. IEEE J. Sel. Areas Commun. 26(7), 1204–1217 (2008)

    Article  Google Scholar 

  23. Anderegg, L., Eidenbenz, S.: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 245–259. ACM (2003)

    Google Scholar 

  24. Shen, H., Li, Z.: A hierarchical account-aided reputation management system for MANETs. IEEE/ACM Trans. Netw. (TON) 23(1), 70–84 (2015)

    Article  Google Scholar 

  25. Zapata, M.G.: Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mob. Comput. Commun. Rev. 6(3), 106–107 (2002)

    Article  Google Scholar 

  26. Sarkar, S., Kisku, B., Misra, S., Obaidat, M.S.: Chinese remainder theorem-based RSA-threshold cryptography in MANET using verifiable secret sharing scheme. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 258–262 (2009)

    Google Scholar 

  27. Buttyán, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8(5), 579–592 (2003)

    Article  Google Scholar 

  28. Sarkar, S., Datta, R.: AODV-based technique for quick and secure local recovery from link failures in MANETs. Int. J. Commun. Netw. Distrib. Syst. 11(1), 92–116 (2013)

    Article  Google Scholar 

  29. Khan, B., Olanrewaju, R., Habaebi, M.: Malicious behaviour of node and its significant security techniques in MANET-a review. Aust. J. Basic Appl. Sci. 7(12), 286–293 (2013)

    Google Scholar 

  30. Khan, B., Olanrewaju, R., Mir, R., Adebayo, B.: Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach. Am. J. Comput. Sci. Eng. 2(3), 10–19 (2015)

    Google Scholar 

  31. Marimuthu, M., Krishnamurthi, I.: Enhanced OLSR for defense against DOS attack in ad hoc networks. J. Commun. Netw. 15(1), 31–37 (2013)

    Article  Google Scholar 

  32. Venkataraman, R., Rama Rao, T., Pushpalatha, M.: Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3), 131–140 (2012)

    Article  Google Scholar 

  33. Lv, X., Li, H.: Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. IET Inf. Secur. 7(2), 61–66 (2013)

    Article  Google Scholar 

  34. Zhang, P., Lin, C., Jiang, Y., Fan, Y., Shen, X.: A lightweight encryption scheme for network-coded mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 2211–2221 (2014)

    Article  Google Scholar 

  35. Dangare, N.N., Mangrulkar, R.S.: Design and implementation of trust based approach to mitigate various attacks in mobile ad hoc network. Proc. Comput. Sci. 78, 342–349 (2016)

    Article  Google Scholar 

  36. Zhao, S., Aggarwal, A., Frost, R., Bai, X.: A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun. Surv. Tutorials 14(2), 380–400 (2012)

    Article  Google Scholar 

  37. Dhanapal, J., Srivatsa, S.: Link quality-based cache replacement technique in mobile ad hoc network. IET Inf. Secur. 7(4), 277–282 (2013)

    Article  Google Scholar 

  38. Xi, S., Liang, S., Jianfeng, M., Zhuo, M.: A trust management scheme based on behavior feedback for opportunistic networks. China Commun. 12(4), 117–129 (2015)

    Article  Google Scholar 

  39. Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)

    Article  Google Scholar 

  40. Tan, S., Li, X., Dong, Q.: Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw. 30, 84–98 (2015)

    Article  Google Scholar 

  41. Wan, Z., Ren, K., Gu, M.: USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks. IEEE Trans. Wirel. Commun. 11(5), 1922–1932 (2012)

    Article  Google Scholar 

  42. Khan, B., Olanrewaju, R.F., Mir, R.N., Baba, A., Adebayo, B.W.: Strategic profiling for behaviour visualization of malicious node in Manets using game theory. J. Theoret. Appl. Inf. Technol. 77(1), 25–43 (2015)

    Google Scholar 

  43. Khan, B., Olanrewaju, R.F., Anwar, F., Shah, A.: Manifestation and mitigation of node misbehaviour in adhoc networks. Wulfenia J. 21(3), 462–470 (2014)

    Google Scholar 

  44. Joshi, S.S., Biradar, S.R.: Communication framework for jointly addressing issues of routing overhead and energy drainage in MANET. Proc. Comput. Sci. 89, 57–63 (2016)

    Article  Google Scholar 

  45. Rajkumar, B., Narsimha, G.: Trust based certificate revocation for secure routing in MANET. Proc. Comput. Sci. 92, 431–441 (2016)

    Article  Google Scholar 

  46. Phu, P., Yi, M., Kim, M.: Securing AODV routing protocol in mobile ad-hoc networks. In: Active and Programmable Networks, vol. 4388, pp. 182–187. Springer, Berlin (2009)

    Google Scholar 

Download references

Acknowledgements

I would like to express my sincere gratitude towards Prof. A. G. Lone; I could see myself becoming a researcher just because, coincidently he was teaching mathematics at the same Engineering College from where I graduated.

This work was partially supported by Ministry of Higher Education Malaysia (Kementerian Pendidikan Tinggi) under Research Initiative Grant Scheme number (RIGS15-150-0150).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Burhan Ul Islam Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khan, B.U.I., Olanrewaju, R.F., Mir, R.N., Yusoff, S.H., Sanni, M.L. (2018). Trust and Resource Oriented Communication Scheme in Mobile Ad Hoc Networks. In: Bi, Y., Kapoor, S., Bhatia, R. (eds) Intelligent Systems and Applications. IntelliSys 2016. Studies in Computational Intelligence, vol 751. Springer, Cham. https://doi.org/10.1007/978-3-319-69266-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69266-1_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69265-4

  • Online ISBN: 978-3-319-69266-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics