Performance Analysis Of Implicit Trust Based Security In OLSR Routing Protocol

H. Muthukrishnan*, K. Akila**
* Assistant Professor, Department of Information Technology, Kongu Engineering College, Perundurai, Erode, India.
** PG Scholar, Department of Information Technology, Kongu Engineering College, Perundurai, Erode, India.
Periodicity:October - December'2014
DOI : https://doi.org/10.26634/jwcn.3.3.3081

Abstract

In Adhoc networks, nodes will be trusted implicitly based on cooperation between the entities involved in routing operations. As wireless ranges of nodes are limited, the nodes cooperate with their neighbors in order to extend the entire size of the network. Trust is taken as security solution for OLSR protocol which fits particularly with characteristics of ad hoc networks. The explicit trust management allows entities to reason with about trust and to take decisions regarding other entities. In this paper, analysis of implicit trust for the OLSR protocol using trust specification language have been done and it is shown how trust based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, the prevention and countermeasure have been proposed to resolve the inconsistency. The same analysis of implicit trust using trust specification language can be implemented in other protocols.

Keywords

Adhoc Networks, Trust, Routing Protocol ,OLSR (Optimized Link State Routing).

How to Cite this Article?

Muthukrishnan, H., and Akila, K. (2014). Performance Analysis Of Implicit Trust Based Security In OLSR Routing Protocol. i-manager's Journal on Wireless Communication Networks, 3(3), 18-24. https://doi.org/10.26634/jwcn.3.3.3081

References

[1]. S. Marsh, Formalising, (1994). ‘Trust as a Computational Concept', Ph.D. Thesis, Department of Mathematics and Computer Science, University of Stirling,
[2]. Clausen T., Jacquet P. (2003). 'Optimized Link State Routing Protocol OLSR', IETF RFC-3626.
[3]. Abolhasan M., Wysocki T., Dutkiewicz E 'A (2004). Review of routing protocols for mobile Adhoc networks', Adhoc Networks, ISSN1570-8705 Vol. 1 No. 1pp. 1–22.
[4]. S. Marti, T.J. Giuli, K. Lai, M. Baker, (2000). Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom '00), ACM, New York, NY, USA, pp. 255–265.
[5]. Pirzada A A, Datta A., McDonald C (2006) 'Incorporating trust and reputation in the DSR protocol for dependable routing ',Elsevier – Computer Communications, 0140-3664 Vol. 29 No. (15) pp 2806–2821.
[6]. S. Buchegger, J-Y. Le Boudec, (2002). Performance analysis of the confidant protocol: cooperation of nodes – fairness. Dynamic Ad-hoc networks, Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC),ISSN:1-58113-501-7 pp. 226-236.
[7]. P. Michiardi, R. Molva, (2002). Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, Vol 228. pp. 107–121.
[8]. Yahalom, B. Klein, T. Beth, (1993). 'Trust relationships in secure systems – a distributed authentication perspective', in: SP'93: Proceedings of the 1993 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, USA, pp. 150–164.
[9]. Zhou C V., Leckie C, Karunasekera S (2010). 'A survey of coordinated attacks and collaborative intrusion detection', Elsevier – Computers & Security, ISSN: 0167-4048 Vol. 29 No. 1 pp. 124–140.
[10]. S. Buchegger, J-Y. Le Boudec, (2003). The effect of rumor spreading in reputation systems in mobile ad-hoc networks, in: Proceedings of Wiopt-03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Sophia-Antipolis, France.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.