A Secure Dominating set based routing and key management scheme in Mobile Ad hoc Network
نویسندگان
چکیده
In Mobile Ad hoc Network (MANET) nodes communicate with each other using shared wireless medium. Due to their distributed nature and dynamic topology, MANET is less secured than wired network. To enhance the security of MANET, it is important to establish routing path based on the trustworthiness of each node in the network. Most existing routing protocols in MANET mainly focus at finding efficient routing path. To deal with the effect of malicious node, trustworthiness of node can be taken into consideration in routing decision making. A routing protocol based on distributed dominating set based clustering algorithm is presented in this paper. The dominator set is formed based on the trust ability of the node and probability of future contact of the node in the network. This paper present a adaptive neuro fuzzy logic controller to evaluate the trust level of each node and a composite key management technique used for effective key management within cluster. Simulation results show that proposed routing protocol provides efficient routing path that bypass malicious nodes in the network. Key-Words: Mobile Ad hoc network, dominating set, fuzzy controller, trust valuation, key management, secure routing.
منابع مشابه
Secure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملResilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks
Unlike traditional networks, the characteristics of mobile wireless devices that can dynamically form a network without any infrastructure and wired line mean that mobile ad hoc networks frequently display partition owing to node mobility or link failures. Consequently, an ad hoc network is difficult to provide on-line access to trusted authorities or centralized servers. Despite the existence ...
متن کاملCreating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks
Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...
متن کاملSecure local algorithm for establishing a virtual backbone in 3D ad hoc network
Due to the limited lifetime of the nodes in ad hoc and sensor networks, energy efficiency needs to be an important design consideration in any routing algorithm. It is known that by employing a virtual backbone in a wireless network, the efficiency of any routing scheme for the network can be improved. One common design for routing protocols in mobile ad hoc networks is to use positioning infor...
متن کاملCreating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks
Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...
متن کامل