Trust Based Routing for Misbehavior Detection in Ad Hoc Networks
نویسندگان
چکیده
Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. To deal with misbehavior in MANET, an incentive mechanism should be integrated into routing decision-making. In this paper firstly we review existing techniques for secure routing, and then propose to use trust vector model based routing protocols. Each node would evaluate its own trust vector parameters about neighbors through monitoring neighbors’ pattern of traffic in network. At the same time, trust dynamics is included in term of robustness. Then we integrated trust model into Dynamic Source Routing (DSR) and Ad-hoc On Demand Distance Vector (AODV) which are most typical routing protocols in MANET. We evaluate the performance of those trust routing protocols by comparing the simulation results of with and without the proposed trust mechanism. The simulation results demonstrate that modified routing protocols can effectively detect malicious nodes and mitigate their attacks.
منابع مشابه
A Probabilistic Misbehavior Detection Scheme on Trust Establishment in Manets
Adversary detection in MANETs is very useful for scores of applications such as military, satellite, interplanetary and disaster rescue. Selfish antonyms and malicious behaviors represent a serious threat against routing in Mobile Ad-hoc Networks (MANETs). Due to the unique network characteristic, designing a misbehavior detection scheme in MANET is regarded as a great challenge. In this paper,...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملAn Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks
In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper we investigate the use of an Artificial Immune System (AIS) to detect ...
متن کاملAuthenticated and Efficient Key Management for Wireless Ad Hoc Networks
In this paper we present a key management protocol for wireless ad hoc multi-hop networks. Two objectives were crucial in our design: (1) distributed trust to ensure robustness, and (2) strong authentication to prevent the battery drain attack. We achieve distributed trust by presenting a hierarchical and distributed public key infrastructure for ad hoc networks. Our PKI has been designed to ma...
متن کاملOptimising routing and trustworthiness of ad hoc networks using swarm intelligence
The seminar presents different approaches to address routing and security of MANETs using swarm technology. The mobility and infrastructure-less of MANET as well as nodes misbehavior compose great challenges to routing and security protocols of such a network. The first approach addresses the problem of channel assignment in multichannel ad hoc networks with limited number of interfaces, where ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JNW
دوره 5 شماره
صفحات -
تاریخ انتشار 2010