IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 8    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 8,August 2012
Secure Trust Based Dynamic Source Routing in MANETs
Full Text(PDF, )  PP.874-880  
Yogendra Kumar Jain, Nikesh Kumar Sharma
—MANET, DSR, Security, Black hole, Multi-Party Computation, Trusted Path, Trust Mode
Secure routing is an important issue in MANETs. A particularly devastating attack in wireless networks is the black hole attack. The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. As a result, an efficient algorithm to detect black hole attack is important. In this paper, to improve the quality a modified design of trust based dynamic source routing protocol is proposed. Each node would evaluate its own trusted parameters about neighbors through evaluation of experience, knowledge and recommendations. This protocol discovers multiple loop-free paths which are evaluated by hop count and trust. This judgment provides a flexible and feasible approach to choose a shortest path in all trusted path. The proposed protocol reduces the packet loss due to malicious nodes to a considerable extent thereby enhancing the performance. We also compare the simulation results of with and without the proposed secure trust based model. The simulation results demonstrate that the PDR for STBDSR falls from 92% to 80%.
[1] IETF MANET work group. http://www.ietf.org/dyn/wg/charter/manetcharter.html

[2] D. F. Macedo, A. L. Santos, J. M. S. Nogueira, and G. Pujolle, “A distributed information repository for autonomic context-aware manets," IEEE Trans. Netw. Service Management, vol. 6, no. 1, pp. 45-55, Mar. 2009.

[3] N. C. Fernandes, M. D. D. Moreira, and O. C. M. B. Duarte, “An efficient filter-based addressing protocol for autoconfiguration of mobile ad hoc networks," in IEEE INFOCOM’09, Apr. 2009.

[4] B. Ishibashi and R. Boutaba, “Topology and mobility considerations in mobile ad hoc networks," Ad Hoc Netw. J., vol. 3, no. 6, pp. 762-776, Nov. 2005.

[5] P Narayan, V R. Syrotiuk,”Evaluation of the AODV and DSR Routing Protocols Using the MERIT Tool”, InIn proceeding or ADHOC-NOW 2004, pp25-36

[6] K.Selvavinayaki, K.K.Shyam Shankar, Dr.E.Karthikeyan “Security Enhanced DSR Protocol to Prevent Black Hole Attacks in MANETs” International Journal of Computer Applications (0975 – 8887) Volume 7– No.11, October 2010

[7] Li, Xin; Jia, Zhiping; Wang, Haiyang;”Trust-based Ondemand Multipath Routing in Mobile Ad Hoc Networks” IET Information Security

[8] Sun, Y., Yu, W. ,Han, Z.,and Liu, K.J.R.:’Information Theoretic Framework of Trust Modeling and Evaluation for AdHoc Networks’, IEEE Journal on Selected Areas in Communications, 2006, 24, (2),pp. 305-317

[9] G. Theodorakopoulos and J. S. Baras, “On trust models and trust evaluation metrics for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 318-328, Feb. 2006.

[10] M. E. G. Moe, B. E. Helvik, and S. J. Knapskog, “TSR: Trustbased Secure MANET Routing using HMMs,” Proc. 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, 27-28 Oct. 2008, pp. 83-90.

[11] Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, Feb. 2006, pp. 305-317. [12] V. Balakrishnnan, V. Varadharajan, U. K. Tupakula, and P. Lucs, “Trust and Recommendations in Mobile Ad Hoc Networks,” Int’l Conf. on Networking and Services, Athens, Greece, 19-25 June 2007, pp. 64-69. [13] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. 6th Annual ACM/IEEE Mobile Computing and Networking, Boston, MA, Aug. 2000, pp.255- 265. [14] J. Sen, P. Chowdhury, and I. Sengupta, “A Distributed Trust Mechanism for Mobile Ad Hoc Networks,” Int’l Symposium on Ad Hoc and Ubiquitous Computing, 20-23 Dec. 2006. Surathkal, India, pp. 62-67. [15] M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya, “Quantifying trust in mobile ad-hoc networks," in Proc. IEEE International Conf. Integration Knowledge Intensive Multi-Agent Syst.,Waltham, USA, Apr. 2005. [16] Wei Gong1 Zhiyang You, Danning Chen, Xibin Zhao, Ming Gu, Kwok-Yan Lam, “Trust Based Malicious Nodes Detection in MANET” IEEE 2006.
Untitled Page