The Trust-Based MAC - Layer Security Protocol for Mobile Ad Hoc Networks

In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding by maintaining a trust counter for each node. A node is punished or rewarded by decreasing or increasing the trust counter. If the trust counter value falls below a trust threshold, the corresponding intermediate node is marked as malicious. In the next phase of the protocol, we provide link-layer security using the CBC-X mode of authentication and encryption. By simulation results, we show that the proposed MAC-layer security protocol achieves high packet delivery ratio while attaining low delay and overhead

[1]  Kefei Chen,et al.  Efficient Link Layer Security Scheme for Wireless Sensor Networks ? , 2007 .

[2]  Li Zhao,et al.  MARS: Misbehavior Detection in Ad Hoc Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[3]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[4]  Syed Rehan Afzal,et al.  RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[5]  Panagiotis Papadimitratos,et al.  Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[6]  Karl N. Levitt,et al.  Distributed intrusion detection models for mobile ad hoc networks , 2006 .

[7]  Stefan Fischer,et al.  A Security Architecture for Mobile Wireless Sensor Networks , 2004, ESAS.

[8]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[9]  S. Madhavi,et al.  An Intrusion Detection System in Mobile AdHoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[10]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[11]  Carlo Kopp,et al.  A link layer security protocol for Suburban Ad-Hoc Networks , 2004 .

[12]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[13]  N. Bhalaji,et al.  Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks , 2009 .

[14]  Yuguang Fang,et al.  A secure incentive protocol for mobile ad hoc networks , 2007, Wirel. Networks.

[15]  Ernesto Jiménez Caballero Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem , 2006 .

[16]  Mihaela Cardei,et al.  Routing Security in Ad Hoc Wireless Networks , 2010 .

[17]  Saswati Sarkar,et al.  Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[18]  Anupam Joshi,et al.  Threshold-based intrusion detection in ad hoc networks and secure AODV , 2008, Ad Hoc Networks.

[19]  S. Upadhyaya,et al.  Trust Based Routing Decisions in Mobile Ad-hoc Networks , 2006 .