Trusted Greedy Perimeter Stateless Routing

Ad-hoc networks generally comprise of mobile wireless nodes having limited communication and computation resources. These nodes execute special routing protocols, which help to establish multi-hop communication despite a dynamic topology. The greedy perimeter stateless routing (GPSR) protocol is one such routing protocol that is frequently used to establish routes in an ad-hoc or sensor network. However, for its precise execution, it is imperative that all nodes depict sustained benevolent behaviour. However, such an altruistic setting would never work in a wireless environment, which is intrinsically physically insecure. Consequently, participating malicious nodes may launch an array of attacks against the routing protocol leading to route severing, elongation or loop creation. In this paper, we present an improved variant of the GPSR protocol that uses the inherent characteristics of the routing process to assess the trust in the network nodes. These trust levels are then used to influence the routing decisions so as to circumvent malevolent nodes in the network. Extensive simulations indicate that the packet delivery ratio of the trusted GPSR protocol surpasses that of the standard GPSR by as much as 30% when as many as 50% of the nodes are acting maliciously in the network.

[1]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[2]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[3]  Ernesto Damiani,et al.  Security, Privacy, and Trust in Mobile Systems and Applications , 2005 .

[4]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[5]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[6]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[7]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[8]  Andrew S. Tanenbaum,et al.  Computer networks, 4th Edition , 2002 .

[9]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[10]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[11]  Amitava Datta,et al.  Trust-based routing for ad-hoc wireless networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[12]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[13]  Simson L. Garfinkel PGP - pretty good privacy: encryption for everyone (2. ed.) , 1995 .

[14]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[15]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[16]  Brad Karp,et al.  GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.

[17]  A.A. Pirzada,et al.  Propagating trust in ad-hoc networks for reliable routing , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..

[18]  Roy D. Yates,et al.  Inter-relationships of performance metrics and system parameters in mobile ad hoc networks , 2002, MILCOM 2002. Proceedings.

[19]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[20]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[21]  Udo W. Pooch,et al.  Customizing GPSR for wireless sensor networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[22]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[23]  Lalit M. Patnaik,et al.  An address assignment for the automatic configuration of mobile ad hoc networks , 2003, Personal and Ubiquitous Computing.