Friend-based secure routing through challenges in mobile ad hoc networks

This paper proposes a Friend-based security scheme for efficient routing in mobile ad hoc networks. The idea behind this technique is the establishment of friend networks in the same way as the formation of friends in real life scenarios. The algorithm provides authentication of nodes by sending challenges and creating friend lists of nodes that complete the challenge. Friends are rated on the basis of the amount of data they transfer through themselves and according to the rating of other friends, which is obtained during the friend list sharing process. The data is finally routed through the route with the greatest number of trusted friends. One of the greatest advantages of this technique is that the nodes do not need to work in the promiscuous mode. The information about the malicious nodes is gathered effectively by using challenges. This reduces the overhead on the network significantly. Through various simulation experiments it has been found that the proposed algorithm works very efficiently in terms of detecting the malicious nodes and also allowing lesser number of packets to be routed through these detected malicious nodes.

[1]  Mohammad S. Obaidat,et al.  Security of e-Systems and Computer Networks , 2007 .

[2]  Sudip Misra,et al.  Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008, Comput. Commun..

[3]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[4]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[5]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[6]  Sanjay K. Dhurandher,et al.  Multi-path and Message Trust-Based Secure Routing in Ad Hoc Networks , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[7]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[8]  Dharma P. Agrawal,et al.  Introduction to Wireless and Mobile Systems , 2002 .

[9]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[10]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[11]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[12]  Spyros Tragoudas,et al.  Security enhancement through multiple path transmission in ad hoc networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[15]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[16]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[17]  A.A. Pirzada,et al.  Propagating trust in ad-hoc networks for reliable routing , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..