New trust based security approach for ad-hoc networks

Secure routing is the milestone in mobile ad hoc networks. Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own a fixed infrastructure. It also has a certain number of characteristics which make the security difficult. Routing is always the most significant part for any networks. We design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. This paper gives an overview about trust in MANETs and current research in routing on the basis of trust. It uses trust values to favor packet forwarding by maintaining a trust counter for each node. A node will be punished or rewarded by decreasing or increasing the trust counter. If the trust counter value falls below a trust threshold, the corresponding intermediate node is marked as malicious.

[1]  N. Bhalaji,et al.  Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks , 2009 .

[2]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[3]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[4]  Li Zhao,et al.  MARS: Misbehavior Detection in Ad Hoc Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[5]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[6]  Evangelos Kranakis,et al.  Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks , 2003, ADHOC-NOW.

[7]  Chung-wei Lee,et al.  Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.

[8]  Marc Branchaud,et al.  xTrust: A Scalable Trust Management Infrastructure , 2004, PST.

[9]  Loay Abusalah,et al.  TARP: trust-aware routing protocol , 2006, IWCMC '06.

[10]  Prahlad Kilambi,et al.  SAFAR: An Adaptive Bandwidth-Efficient Routing Protocol for Mobile Ad Hoc Networks , 2003, ADHOC-NOW.

[11]  Futai Zou,et al.  A Survey on Security in Wireless Mesh Networks , 2010 .

[12]  Saswati Sarkar,et al.  Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[13]  Karl N. Levitt,et al.  Distributed intrusion detection models for mobile ad hoc networks , 2006 .

[14]  Ernesto Jiménez Caballero Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem , 2006 .