A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks

In this paper, we develop a trust based security protocol based on a cross layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding by maintaining a trust counter for each node. A node is punished or rewarded by decreasing or increasing the trust counter. If the trust counter value falls below a trust threshold, the corresponding intermediate node is marked as malicious. In the next phase of the protocol, we provide link layer security using the CBCX mode of authentication and encryption. By simulation results, we show that the proposed cross layer security protocol achieves high packet delivery ratio while attaining low delay and overhead.

[1]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[2]  Panagiotis Papadimitratos,et al.  Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Saswati Sarkar,et al.  Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[4]  Anupam Joshi,et al.  Threshold-based intrusion detection in ad hoc networks and secure AODV , 2008, Ad Hoc Networks.

[5]  Kefei Chen,et al.  Efficient Link Layer Security Scheme for Wireless Sensor Networks ? , 2007 .

[6]  Li Zhao,et al.  MARS: Misbehavior Detection in Ad Hoc Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[7]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[8]  Stefan Fischer,et al.  A Security Architecture for Mobile Wireless Sensor Networks , 2004, ESAS.

[9]  N. Bhalaji,et al.  Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks , 2009 .

[10]  Yuguang Fang,et al.  A secure incentive protocol for mobile ad hoc networks , 2007, Wirel. Networks.

[11]  Carlo Kopp,et al.  A link layer security protocol for Suburban Ad-Hoc Networks , 2004 .

[12]  S. Upadhyaya,et al.  Trust Based Routing Decisions in Mobile Ad-hoc Networks , 2006 .

[13]  Karl N. Levitt,et al.  Distributed intrusion detection models for mobile ad hoc networks , 2006 .

[14]  Syed Rehan Afzal,et al.  RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[15]  Ernesto Jiménez Caballero Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem , 2006 .

[16]  S. Madhavi,et al.  An Intrusion Detection System in Mobile AdHoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).