F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs

Due to the absence of infrastructure support, secure data dissemination is a challenging task in scalable mobile ad hoc networks (MANETs) environment. In most of the traditional routing techniques for MANETs, either security has not been taken into account or only one aspect of security concern has been addressed without optimizing the routing performance. This paper proposes Flooding Factor based Framework for Trust Management (F3TM) in MANETs. True flooding approach is utilized to identify attacker nodes based on the calculation of trust value. Route Discovery Algorithm is developed to discover an efficient and secure path for data forwarding using Experimental Grey Wolf algorithm for validating network nodes. Enhanced Multi-Swarm Optimization is used to optimize the identified delivery path. Simulations are carried out in ns2 to assess and compare the performance of F3TM with the state-of-the-art frameworks: CORMAN and PRIME considering the metrics including delay, packet delivery ration, overhead and throughput. The performance assessment attests the reliable security of F3TM compared to the state-of-the-art frameworks.

[1]  J. J. Garcia-Luna-Aceves,et al.  PRIME: An Interest-Driven Approach to Integrated Unicast and Multicast Routing in MANETs , 2011, IEEE/ACM Transactions on Networking.

[2]  Sundaravalli Narayanaswami,et al.  Mobile adhoc networks: A simulation based security evaluation and intrusion prevention , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[3]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[4]  Yoshiaki Tanaka,et al.  Dempster-Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs , 2014, 16th International Conference on Advanced Communication Technology.

[5]  G. S. Bindra,et al.  Detection and removal of co-operative blackhole and grayhole attacks in MANETs , 2012, 2012 International Conference on System Engineering and Technology (ICSET).

[6]  K D R Assis,et al.  Hybrid Algorithms for Routing and Assignment Wavelengths in Optical Networks , 2010, IEEE Latin America Transactions.

[7]  Zehua Wang,et al.  CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks , 2012, IEEE Journal on Selected Areas in Communications.

[8]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[9]  Hussein A. Lafta,et al.  Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Genetic Algorithm (GA) , 2014 .

[10]  R. Jaiswal,et al.  Relative Cluster Entropy Based Wormhole Detection Using AOMDV in Adhoc Network , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.

[11]  Ji Guo,et al.  A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[12]  Ning Zhang,et al.  A study on reservation-based adaptation for QoS in adversarial MANET environments , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[13]  Vijay T. Raisinghani,et al.  Load eqUilibrium Neighbor Aware Routing in Mobile Ad Hoc Network , 2014, 2014 Annual IEEE India Conference (INDICON).

[14]  Dang Quan Nguyen,et al.  A trust-based security architecture for tactical MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[15]  Lyes Khoukhi,et al.  Denial of Service (DoS) attacks detection in MANETs through statistical models , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).

[16]  Basit Qureshi,et al.  Collusion Detection and Prevention with FIRE+ Trust and Reputation Model , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[17]  K P Manikandan,et al.  A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks , 2011 .

[18]  Kalyani Handal,et al.  Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning , 2018 .

[19]  Miao Pan,et al.  A Fair QoS-Aware Resource-Allocation Scheme for Multiradio Multichannel Networks , 2013, IEEE Transactions on Vehicular Technology.

[20]  M.A. Gorlatova,et al.  Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[21]  Rahul Johari,et al.  VAST: Volume adaptive searching technique for optimized routing in mobile ad-hoc networks , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[22]  B. Narasimhan,et al.  A Reliable Flooding Mechanism for Mobile Ad-Hoc Networks , 2014, 2014 International Conference on Intelligent Computing Applications.

[23]  Ben-Jye Chang,et al.  Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[24]  Lyes Khoukhi,et al.  Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers , 2014, 2014 IEEE 21st Symposium on Communications and Vehicular Technology in the Benelux (SCVT).