Energy Efficient Routing Protocol for Mobile Ad hoc Networks using Trust Based Security

MANET is a well known network in which wireless nodes are connected. This is also known as infrastructure less network. MANET might have colluding nodes in the network environment. The colluding nodes cause internal attacks in the wireless network. These results in security problems in the network and finally the MANET performance will go down or even the network breaks down. To overcome this problem, this paper presents mechanisms to detect colluding nodes and defend them. The proposed algorithm works on route detection trust management for the purpose of detecting colluding nodes and defending them from causing internal attacks. The local forwarding nodes discover routes and also involved in calculating trust. In order to calculate trust value of each nodes the trust of its one - hop neighbors is calculated. In cluster heads the information such as trust and route discovery is stored and maintained. The simulation results revealed that the proposed algorithm is effective in secure routing in MANETs.

[1]  Kari Sentz,et al.  Combination of Evidence in Dempster-Shafer Theory , 2002 .

[2]  Edwin Hsing-Mean Sha,et al.  Impact of trust model on on-demand multi-path routing in mobile ad hoc networks , 2013, Comput. Commun..

[3]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[4]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[6]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[7]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[8]  Chris McDonald,et al.  Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..

[9]  Anupam Joshi,et al.  Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..

[10]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[11]  T. Jayanthy,et al.  An Analysis of Various Parameters in Wireless Sensor Networks Using Adaptive FEC Technique , 2010 .

[12]  Nidal Nasser,et al.  The significant impact of a set of topologies on wireless sensor networks , 2012, EURASIP J. Wirel. Commun. Netw..

[13]  Ayman I. Kayssi,et al.  TRACE: A centralized Trust And Competence-based Energy-efficient routing scheme for wireless sensor networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[14]  Chin Choy Chai,et al.  Constrained power allocation algorithm for rate adaptive MIMO system , 2004, Eighth IEEE International Symposium on Spread Spectrum Techniques and Applications - Programme and Book of Abstracts (IEEE Cat. No.04TH8738).

[15]  Ajay koul,et al.  A system level security for Mobile Ad hoc Networks , 2011, 2011 3rd International Conference on Computer Research and Development.

[16]  Li Xu,et al.  Subdividing Hexagon-Clustered Wireless Sensor Networks for Power-Efficiency , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[17]  Nathalie Mitton,et al.  Energy-Aware Georouting with Guaranteed Delivery in Wireless Sensor Networks with Obstacles , 2009, Int. J. Wirel. Inf. Networks.

[18]  D. K. Lobiyal,et al.  THROUGHPUT ANALYSIS OF POWER CONTROL B- MAC PROTOCOL IN WSN , 2012 .

[19]  Taruna Sikka,et al.  Enhance Throughput in Wireless Sensor Network Using Topology Control Approach , 2012 .

[20]  Chong-Kwon Kim,et al.  Flooding in wireless ad hoc networks , 2001, Comput. Commun..

[21]  S. Neelavathy Pari,et al.  Requisite trust-based Secure Routing Protocol for MANETs , 2012, 2012 International Conference on Recent Trends in Information Technology.

[22]  Liu Fang,et al.  An Energy-Efficient Clustering Technique for Wireless Sensor Networks , 2008, 2008 International Conference on Networking, Architecture, and Storage.