Trustworthy Routing with the TORA Protocol

Ad-hoc networks are made up of one or more low power mobile wireless nodes. These nodes are able to communicate over a wide range through mutual cooperation. All participating nodes pledge to pass packets for other nodes in accordance to a pre-agreed protocol. Temporally Ordered Routing Algorithm (TORA) is one of the unique routing protocols that can operate in dual mode (passive or active) based upon the mobility of the network. In TORA, heights are assigned to nodes so as to route the flow of data according to a directed acyclic graph. Routes are established in TORA with the assistance of other nodes present in the network. The accuracy of these routes requires that all network nodes depict benevolent behaviour. However, such an altruistic setting is virtually impossible to achieve and consequently a number of malicious nodes also contribute to the TORA route discovery process only to impair the network. In this paper we present a novel and pragmatic mechanism for establishing trust in ad-hoc networks that execute the TORA protocol for route discovery. The proposed mechanism is especially viable for ad-hoc networks that can be created on the fly without a formal trust infrastructure including Certification Authorities and Key Distribution Systems.

[1]  O. Kachirski,et al.  Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.

[2]  V. Park,et al.  An Internet MANET Encapsulation Protocol (IMEP) Specification , 1998 .

[3]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[4]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[5]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[6]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[7]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[8]  Anthony Ephremides,et al.  A distributed routing algorithm for mobile wireless networks , 1995, Wirel. Networks.

[9]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[10]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[11]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[12]  Dimitri P. Bertsekas,et al.  Distributed Algorithms for Generating Loop-Free Routes in Networks with Frequently Changing Topology , 1981, IEEE Trans. Commun..

[13]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[14]  Vincent Park,et al.  Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification , 2001 .

[15]  Chris McDonald,et al.  Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.

[16]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[17]  Chris McDonald,et al.  A Review of Secure Routing Protocols for Ad hoc Mobile Wireless Networks , 2003 .

[18]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.