Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs
نویسنده
چکیده
Distributed wireless systems present many security issues, and offering security preserving network resources is often a challenging effort. Offering security through only cryptography is not always a suitable solution if the high dynamic context of MANET is considered and the trust mechanism that reduces the computationally intensive number of security operations becomes strategic. In this work, a well-known routing protocol, called SAODV, has been considered. To improve its performance and offer more resilience to attack from malicious nodes authenticated by the network, some additional features are added. A preventive approach based on a cryptographic mechanism and a reactive approach to detect anomalous and malicious nodes are considered. An extension of SAODV offering an Intrusion Detection Mechanism (IDM) and a Trust-based Mechanism (TBM) to promote the collaboration of the cooperating nodes and penalize the selfish nodes are proposed. Simulation results were performed under a NS-2 simulator to show the effectiveness of our proposal compared with AODV and SAODV. Simulation parameters, such as Normalized Routing Overhead, Data Packet Delivery Ratio, average number of signatures and throughput of collaborating and malicious nodes, have been considered. DOI: 10.4018/978-1-60960-505-6.ch015
منابع مشابه
Security threats and solutions in MANETs: A case study using AODV and SAODV
Mobile ad hoc network (MANET) security has become the focus of prolific research efforts. Driven by the unique and considerable difficulties of providing security arising from the dynamic nature of MANETs, many security schemes have been proposed. Rather than trying to encompass the entire field of MANET security, this paper focuses on networks using the popular Ad-hoc On-demand Distance Vector...
متن کاملNovel Intrusion Detection in MANETs based on Trust
Mobile Ad hoc Network is comprised of several mobile nodes without any centralized infrastructure. MANETs are lack of boundaries due to wireless communication medium. Due to the absence of centralized infrastructure, changing topology and distributed nature, MANETs is prone to several security threats and intruders. Thus, it is necessary to safeguard the network from malicious nodes. Thus to ov...
متن کاملImplementation of SAODV and TAODV Adhoc Secure Routing Protocols
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues into account. Subsequent proposals used strong cryptographic methods to secure the routing information. In the process, however, these protocols created new avenues for denial of service (DoS). Consequently, the trade-...
متن کاملA game theoretic trust model for on-line distributed evolution of cooperation inMANETs
Cooperation among nodes is fundamental for the operation of mobile ad hoc networks (MANETs). In such networks, there could be selfish nodes that use resources from other nodes to send their packets but that do not offer their resources to forward packets for other nodes. Thus, a cooperation enforcement mechanism is necessary. Trust models have been proposed as mechanisms to incentive cooperatio...
متن کاملDynamic CH selection and Intrusion Detection in WSN using Reinforced Weighted Approximation based Adaptive SEECH: An Optimized Routing framework
We propose a highly scalable adaptive cluster-based hierarchical trust management protocol for wireless sensor networks (WSNs) to effectively deal with selfish or malicious nodes. Unlike prior work, we consider multidimensional trust attributes derived from communication and social networks to assess the overall trust of a sensor node. In this paper the Adaptive Scalable Energy Efficient Cluste...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJITN
دوره 1 شماره
صفحات -
تاریخ انتشار 2009