Fuzzy Membership Function in a Trust Based AODV for MANET

Security issues have been emphasized in MANET due to its vulnerability to unauthorised access and unshielded broadcasting nature of communication. In this paper we present a trust based AODV for MANET. The trust takes into account the eligible neighbours based on reliability, residual energy, and speed. Thus our algorithm provides a reliable, energy efficient routing technique. The multi-criteria trust values are calculated using fuzzy-logic. This algorithm is capable of putting aside the selfish nodes. As only trusted neighbours are selected for packet delivery, energy consumption also diminishes because the transmitting node does not need to deliver packets to the untrusted neighbours. Less number of transmissions renders low energy consumption. Absence of selfish nodes in the selected neighbours at every hop provides better packet delivery and hence better throughput.

[1]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Yong Chen,et al.  Trust Propagation in Small Worlds , 2003, iTrust.

[3]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[4]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[5]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[6]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[7]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[8]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[9]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[10]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[11]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[12]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[13]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[14]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[15]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[16]  Mario Gerla,et al.  A simulation study of table-driven and on-demand routing protocols for mobile ad hoc networks , 1999, IEEE Netw..

[17]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[18]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.