Light-weight trust-based routing protocol for mobile ad hoc networks

Mobile ad hoc networks (MANETs) were originally designed for a cooperative environment. To use them in hostile environments, trust-based routing can be used, where instead of establishing the shortest routes as done in traditional routing protocols, most trusted routes are established. In this study, the authors present a light-weight trust-based routing protocol. It is light-weight in the sense that the intrusion detection system (IDS) used for estimating the trust that one node has for another, consumes limited computational resource. Moreover, it uses only local information thereby ensuring scalability. Our light-weight IDS takes care of two kinds of attacks, namely, the blackhole attack and the grey hole attack. Whereas our proposed approach can be incorporated in any routing protocol, the authors have used AODV as the base routing protocol to evaluate our proposed approach and give a performance analysis.

[1]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[2]  Guy Pujolle,et al.  Requirements for survivable routing in MANETs , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.

[3]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[4]  Jung-Shian Li,et al.  Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks , 2006, Comput. Commun..

[5]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[6]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[7]  M. Chandrasekaran,et al.  Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..

[8]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[9]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[10]  Susanne Wetzel,et al.  Cryptographic Versus Trust-based Methods for MANET Routing Security , 2008, STM@ESORICS.

[11]  Mukesh Singhal,et al.  Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[12]  Vijay Varadharajan,et al.  Fellowship: Defense against Flooding and Packet Drop Attacks in MANET , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[13]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[14]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[15]  Amitava Datta,et al.  Incorporating trust and reputation in the DSR protocol for dependable routing , 2006, Comput. Commun..

[16]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[17]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[18]  Himadri Nath Saha,et al.  A Distributed Administration Based Approach for Detecting and Preventing Attacks on Mobile Ad Hoc Networks , 2011 .

[19]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[20]  Milena Radenkovic,et al.  Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).