Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs

A routing protocol for detection of malicious nodes and selection of most reliable, secure, close to shortest and trustworthy path for routing data packets in Mobile Ad Hoc Networks (MANETs) is introduced. Dynamic Source Routing (DSR) protocol [1] is extended and termed as Energy Efficient Secure Dynamic Source Routing (EESDSR). The protocol is based on an efficient, power aware and distributed trust model that enhances the security of Dynamic Source Routing (DSR) protocol. The model identifies the nodes exhibiting malicious behaviors like: gray hole, malicious topology change behavior, dropping data packets and dropping control packets. Monitoring mechanism is suitable for MANETs as it focuses on power saving, has distributed nature and adaptable to dynamic network topology. The new routing protocol is evaluated using Network Simulator 2 (NS2). Through extensive simulations, it has been proved that EESDSR protocol performs better than the standard DSR protocol.

[1]  Geoffrey C. Fox,et al.  Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings , 2005, GCC.

[2]  Sudip Misra,et al.  Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008, Comput. Commun..

[3]  Chris McDonald,et al.  Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..

[4]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[5]  Deepika Kukreja,et al.  A Survey of Trust Based Routing Protocols in MANETs , 2014 .

[6]  Azzedine Boukerche,et al.  A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..

[7]  Mohamed H. El-Shafey,et al.  Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad-hoc Networks , 2010 .

[8]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Zhongwei Zhang An intelligent scheme of secure routing for mobile Ad Hoc networks , 2008, 2008 2nd International Conference on Signal Processing and Communication Systems.

[10]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[11]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[12]  Yanheng Liu,et al.  Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..

[13]  Amitava Datta,et al.  Trust-based routing for ad-hoc wireless networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[14]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[15]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[16]  Yuan Gao,et al.  A Routing Protocol Based on Trust for MANETs , 2005, GCC.

[17]  Deepika Kukreja,et al.  Security enhancement by detection and penalization of malicious nodes in wireless networks , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).

[18]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[19]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[20]  Mohammad S. Obaidat,et al.  FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems , 2011, IEEE Systems Journal.

[21]  Syed Asad Hussain,et al.  Identification of malicious nodes in an AODV pure ad hoc network through guard nodes , 2008, Comput. Commun..

[22]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[23]  A.A. Pirzada,et al.  Deploying trust gateways to reinforce dynamic source routing , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[24]  Erman Ayday,et al.  A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks , 2010, Ad Hoc Networks.

[25]  Zhou Hao,et al.  A trusted routing protocol for wireless mobile ad hoc networks , 2007 .

[26]  Shietung Peng,et al.  An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.