Trust Enhanced Secure Mobile Ad-hoc Network with Neighbor Collaboration Routing (SMNCR)

Subramani A*, Krishnan A**, A. Muthusamy***
* Professor & Head, Department of MCA, K.S.R. College of Engineering, Tiruchengode, Tamilnadu.
** Dean, K.S.R. College of Engineering, Tiruchengode, Tamilnadu.
*** Lecturer, Department of MCA, K.S.R. College of Engineering, Tiruchengode, Tamilnadu.
Periodicity:July - September'2011
DOI : https://doi.org/10.26634/jse.6.1.1538

Abstract

In recent years, many trust and name models are proposed to reinforce the protection of mobile ad hoc networks. However, they either fail to capture proof of trustworthiness at intervals the restrictions of the network, or introduce further issues whereas capturing the proof. In this paper, we have a tendency to propose a reputation-based trust model referred to as Secure MANET with Neighbor Collaboration Routing (SMNCR). In our model, the proof of trustworthiness is captured in an economical manner and from broader views as well as direct interactions with neighbors, observing interactions of neighbors and thru recommendations. SMNCR captures proof from direct interactions with neighbors so as to spot their benign and malicious behaviors. It conjointly captures proof for misbehavior by observing the interactions of neighbors. Lastly, the proof captured from recommendations is employed to summarize the benign behavior of multi-hop nodes. In contrast to alternative models, we have a tendency to adopt a completely unique approach to capture proof from recommendations that eliminates recommender’s bias, free-riding, and honest elicitation. SMNCR utilizes the captured proof to predict whether or not a node is either benign or misbehaving. It then applies the prediction to reinforce the protection of communications looking on the choice policies, like whether or not to send a packet to or forward a packet on behalf of alternative nodes. Finally, we have a tendency to demonstrate the performance of our model through simulation results.

Keywords

MANET, Routing Protocol, Colloboration.

How to Cite this Article?

A. Subramani, A. Krishnan and A. Muthusamy (2011). Trust Enhanced Secure Mobile Ad-Hoc Network With Neighbor Collaboration Routing (SMNCR). i-manager’s Journal on Software Engineering, 6(1), 45-52. https://doi.org/10.26634/jse.6.1.1538

References

[1]. V. Varadharajan, R. Shankaran and M. Hitchens, (2004). "Security for cluster based ad hoc networks". Computer Communications, Vol-27(5), pp. 488-501.
[2]. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields and E. M.Belding-Royer, (2002). "A Secure Routing Protocol for Ad Hoc Networks". Proceedings of 10th IEEE International Conference on Network Protocols, France, pp. 78 - 89.
[3]. Y.-C. Hu, A. Perrig and D. B. Johnson, (2002). "Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks". Proceedings of International Conference on Mobile Computing and Networking, Atlanta, USA, pp. 12 - 23.
[4]. S. Capkun and J.-P. Hubaux, (2003). "BISS: Building Secure Routing out of an Incomplete Set of Security Associations". Proceedings of ACM Workshop on Wireless Security, San Diego, USA, pp. 21 - 29.
[5]. S. Yan Lindsay, Y. Wei, H. Zhu and K. J. R. Liu, (2006). "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks". IEEE Journal on Selected Areas in Communications, Vol-24(2), pp. 305-317.
[6]. G. Theodorakopoulos and J.S. Baras, (2004). "Trust Evaluation in Ad-hoc Networks". Proceedings of ACM Workshop on Wireless security, Philadelphia, USA, pp. 1- 10.
[7]. P. Michiardi and R. Molva, "Core: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks". Proceedings of IFIP.
[8]. Communication and Multimedia Security Conference, 2002 J. Liu and V. Issarny, "Enhanced Reputation Mechanism for Mobile Ad Hoc Networks". 2nd International Conference on Trust Management, Oxford, UK, pp. 48 - 62, 2004.
[9]. Y. Rebahi, V. E. Mujica-V and D. Sisalem, (2005). "A Reputation-Based Trust Mechanism for Ad hoc Networks". Proceedings of 10th IEEE Symposium on Computers and Communications, Cartagena, Spain, pp. 37-42.
[10]. S. Buchegger and J.-Y. L. Boudec, (2002). "Performance analysis of the CONFIDANT protocol". rd Proceedings of 3 ACM International Symposium on Mobile Ad hoc Networking & Computing, Switzerland, pp. 226-236.
[11]. S. Buchegger and J.-Y. Le Boudee, (2005). "Self- Policing Mobile Ad Hoc Networks by Reputation Systems". IEEE Communications Magazine, Vol-43(7), pp. 101-107.
[12]. D. B. Johnson, D. A. Maltz and J. Broch, (2001). "DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad hoc Networks" in Ad hoc Networking, C. E.Perkins, Ed.: Addison-Wesley Longman Publishing Co., USA.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.