Performance Analysis Of Implicit Trust Based Security In AODV Routing Protocol

H. Muthukrishnan*, K. Akila**
* Assistant Professor, Department of Information Technology, Kongu Engineering College, Perundurai, Erode, India.
** PG Scholar, Department of Information Technology, Kongu Engineering College, Perundurai, Erode, India.
Periodicity:April - June'2015
DOI : https://doi.org/10.26634/jwcn.4.1.3460

Abstract

In Ad hoc networks, nodes are trusted implicitly based on cooperation between the entities involved in routing operations. As wireless range of nodes are limited, the nodes cooperate with their neighbors in order to extend the entire size of the network. The explicit trust management allows entities to reason with and about trust and to take decisions regarding other entities. In the proposed work, trust is taken as a security solution for AODV protocol, which fits particularly with characteristics of ad hoc networks. Here implicit trust for the AODV protocol has been analyzed using trust specification language and how a trust based reasoning can allow each node to evaluate the behavior of the other nodes, is shown. During route discovery, a node with more trust is selected, based on a router based parameter called 'Trust value'. Route request from the source is accepted by a node only if its trust value is high. Otherwise, the route request is discarded. This approach forms a reliable route from source to destination. The prevention and counter measures have been proposed to resolve the inconsistency for the misbehaving nodes.

Keywords

Ad Hoc Networks, Trust, Routing Protocol, AODV (Ad hoc On-Demand Distance Vector).

How to Cite this Article?

Muthukrishnan, H., and Akila, K. (2015). Performance Analysis Of Implicit Trust Based Security In AODV Routing Protocol. i-manager's Journal on Wireless Communication Networks, 4(1), 24-30. https://doi.org/10.26634/jwcn.4.1.3460

References

[1]. S. Marsh, Formalising, (1994). 'Trust as a Computational Concept', Ph.D. Thesis, Department of Mathematics and Computer Science, University of Stirling.
[2]. C. E. Perkins and E. M. Royer, (1999). “Ad Hoc Ondemand Distance Vector Routing,” In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, 90-100.
[3]. Abolhasan M., Wysocki T., Dutkiewicz E (2004). 'A review of routing protocols for mobile Adhoc networks', Adhoc Networks, 1570-8705, Vol. 2, No. 1, pp. 1-22.
[4]. S. Marti, T.J. Giuli, K. Lai, M. Baker, (2000). Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom '00), ACM, New York, NY, USA, pp. 255–265.
[5]. Pirzada A A, Datta A., McDonald C (2006). 'Incorporating trust and reputation in the DSR protocol for dependable routing ', Elsevier – Computer Communications, 0140-3664, Vol. 29 No. 15, pp. 2806–2821.
[6]. S. Buchegger, J-Y. Le Boudec, (2002). “Performance analysis of the confidant protocol: cooperation of nodes – fairness. Dynamic Ad-hoc networks”, Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), IEEE.
[7]. P. Michiardi, R. Molva, (2002). “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”, in: IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, pp. 107–121.
[8]. Yahalom, B. Klein, T. Beth, (1993). 'Trust relationships in secure systems – a distributed authentication perspective', in: SP'93: Proceedings of the 1993 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, USA, pp. 150–164.
[9]. Zhou C V., Leckie C, Karunasekera S (2010). “A survey of coordinated attacks and collaborative intrusion detection”, Elsevier – Computers & Security, 0167-4048, Vol. 29, No. 1, pp. 124–140.
[10]. S. Buchegger, J-Y. Le Boudec, (2003). “The effect of rumor spreading in reputation systems in mobile ad-hoc networks”, in: Wiopt-03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Sophia-Antipolis, France.
[11]. Laura, (2000). “Energy Consumption Model for performance analysis of routing protocols in MANET”, Journal of mobile networks and application.
[12]. LIXin MIAO Jian –song, (2006). “A new traffic allocation algorithm in AD hoc networks,“ The Journal of China University of Post and Telecommunication, Vol. 13, No. 3.
[13]. Adnane A., BidanC, DeSousa R (2013). 'Trust based security for OLSR routing protocol', Elsevier-Computer and Communication, pp 1159–1171.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.