A Trust Model for Secure and QoS Routing in MANETS

Due to the dynamic topology, limited and shared bandwidth, limited battery power of the mobile ad hoc network (MANET), providing Quality of Service (QoS) routing is a challenging task in MANET. The presence of malicious nodes in the network cause an internal threat that disobey the standard and degrades the performance of well-behaved nodes significantly. However, little work has been done on quantifying the impact of internal attack on the performance of ad hoc routing protocols using dynamic key mechanism. In this paper, we focus on the impact of Byzantine attack implemented by malicious nodes on AODV routing protocol as an extension of the previous work. Here, we propose a trust model in which the trustworthiness of each node is evaluated based on trust value and remaining energy of each node. Association level of each node is estimated based on the trust value calculated. Route selection is done using the trustworthiness and performance requirement of each route which is calculated based on both link capacity and traffic requirement to achieve QoS.

[1]  S. Upadhyaya,et al.  Trust Based Routing Decisions in Mobile Ad-hoc Networks , 2006 .

[2]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[3]  Huafeng Wu,et al.  A Trust Management Model for P2P File Sharing System , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[4]  Reza Curtmola,et al.  ODSBR: An On-Demand Secure Byzantine Routing Protocol , 2003 .

[5]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[6]  Nidal Nasser,et al.  Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[7]  Sugata Sanyal,et al.  A distributed security scheme for ad hoc networks , 2004, CROS.

[8]  Moumita Deb A Cooperative Blackhole Node Detection Mechanism for ADHOC Networks , 2008 .

[9]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[10]  M. Tamilarasi,et al.  Integrated Energy-Aware Mechanism for MANETs using On-demand Routing , 2008 .

[11]  Samir Ranjan Das,et al.  Energy-Aware On-Demand Routing for Mobile Ad Hoc Networks , 2002, IWDC.

[12]  Sun Choi,et al.  WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[13]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[14]  Rekha Patil Cost Based Power Aware Cross Layer Routing Protocol , 2008 .

[15]  M. Rajaram,et al.  A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET , 2008 .

[16]  David K. Y. Yau,et al.  Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[17]  Zygmunt J. Haas,et al.  Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..

[18]  N. Bhalaji,et al.  Reliable Routing against Selective Packet Drop Attack in DSR based MANET , 2009, J. Softw..