Abstract
This research aims to develop an enhanced version of AODV including trust and reputation that will ensure the transmission of messages in a secure way avoiding wormhole attackers in the network. Firstly, wormhole attackers are identified depending on their transmission related misbehavior with respect to other nodes in the network. Next, appropriate trust value is assigned to the misbehaving nodes. Furthermore the measure of trust is calculated by considering the past interaction between the considered node with other nodes in terms of direct and indirect interactions and related trust values. Finally, the trust evaluating node takes the decision to include or not to include the trustee node in discovered route and secures the path from wormhole attacker. The key concept to interpret the misbehavior of a node is based on its responsiveness towards incoming route requests in terms of associated processing time, latency, threshold time duration. To facilitate the trust computation and respective decision, the enhanced version assigns the tasks to different functional components: Context Analyser, Event Analyser, Trust Manager, Trust Repository, Notifier, Decision Manager, Trust Engine and Node Manager. Our analysis and simulation results show the effectiveness of our proposal against wormhole attack in AODV.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alshamrani, A. S.: PTT: packet travel time algorithm in mobile ad hoc networks. Workshops of International Conference on Advanced Information Networking and Applications, IEEE pp. 561–568 (2011)
Alam, M. R., Chan, K. S.: RTT-TC: A topological comparison based method to detect wormhole attacks in MANET, 12th International Conference on Communication Technology, IEEE. pp. 991–994 (2010)
Basagni, S., Conti, M., Giordano, S., Stojmenovic, I.: Mobile Ad Hoc Networking (chapter: 10). Wiley
Huang, W., Yan X., Chen, D.: DAAODV: A secure ad-hoc routing protocol based on direct anonymous attestation. International Conference on Computational Science and Engineering, IEEE pp. 809–816 (2009)
Keer, S., Suryavanshi, A.: To prevent wormhole attacks using wireless protocol in MANET. International Conference on Computer and Communication Technology, IEEE, pp. 159–163 (2010)
Lacharité, Y., Dang Q. N., Wang, M., Lamont, L.: A trust-based security architecture for tactical MANETS. Military Communications Conference, IEEE pp. 1–7 (2008)
Perkins, C.: AODV routing implementation for scalable wireless ad-hoc network simulation (SWANS). http://jist.ece.cornell.edu/docs/040421-swans-aodv.pdf
Qiu, X. F., Liu, J.W., Sangi, A. R.: MTSR: wormhole attack resistant secure routing for ad hoc network. IEEE Youth conference on Information Computing and Telecommunications, pp. 419–422 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dortdrecht
About this paper
Cite this paper
Hazra, S., Setua, S.K. (2012). Trusted Routing in AODV Protocol Against Wormhole Attack. In: J. (Jong Hyuk) Park, J., Leung, V., Wang, CL., Shon, T. (eds) Future Information Technology, Application, and Service. Lecture Notes in Electrical Engineering, vol 164. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-4516-2_26
Download citation
DOI: https://doi.org/10.1007/978-94-007-4516-2_26
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-4515-5
Online ISBN: 978-94-007-4516-2
eBook Packages: EngineeringEngineering (R0)