CFP last date
20 January 2025
Reseach Article

An Unobservable On-demand Routing Protocol with Trust Management Mechanism

by Rajani B. Patil, Dhanashree Kulkarni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 14
Year of Publication: 2015
Authors: Rajani B. Patil, Dhanashree Kulkarni
10.5120/21766-5019

Rajani B. Patil, Dhanashree Kulkarni . An Unobservable On-demand Routing Protocol with Trust Management Mechanism. International Journal of Computer Applications. 122, 14 ( July 2015), 6-13. DOI=10.5120/21766-5019

@article{ 10.5120/21766-5019,
author = { Rajani B. Patil, Dhanashree Kulkarni },
title = { An Unobservable On-demand Routing Protocol with Trust Management Mechanism },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 14 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number14/21766-5019/ },
doi = { 10.5120/21766-5019 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:10:31.140358+05:30
%A Rajani B. Patil
%A Dhanashree Kulkarni
%T An Unobservable On-demand Routing Protocol with Trust Management Mechanism
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 14
%P 6-13
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network(MANET) is highly challenging network environment due to its own properties like open medium, dynamic topology, distributed cooperation, and capability constraint. MANET is self-directed and infrastructure less network. As network is wireless, routing plays an important part in the security of the whole system. Secure transmission of data in between nodes is an imperative concern. Any attacker get remote node by using transceiver and without being caught. The objective of this paper is to propose new secure unobservable routing protocol with trust management mechanism, where attacker gets blocked while making spoofing or eavesdropping attacks. Only unobservable message could be gathered by attacker. An USOR protocol is implemented on ns2 with its performance is evaluated by comparing with AODV and AMODV. The proposed protocol will also protect privacy information among network and will detect and block compromised nodes through trust-aware routing framework.

References
  1. Pfitzmann and M. Hansen, ?Anonymity, unobservability, and pseudonymity: a consolidated proposal for terminology,? draft, July 2000.
  2. Kui Ren, Ming Gu, and Zhiguo Wan , "USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks,"IEEE Trans. on Wireless Communications, vol. 11, no. 5, pp. 1922-1932, 2012.
  3. J. Kong and X. Hong, "ANODR: aonymous on demand routing with untraceable routes for mobile ad-hoc networks," in Proc. ACM MOBIHOC' 03, pp. 291–302.
  4. Chim T. M, Dong Y, Hui C. K, Li V. O. K. and Yiu S. M. (2009) "ARMR: Anonymous Routing Protocol with Multiple Routes For Communications in Mobile Ad Hoc Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1536– 1550.
  5. K. E. Defrawy and G. Tsudik, "ALARM: anonymous location-aided routing in suspicious MANETs," IEEE Trans. Mobile Comput. , vol. 10, no. 9, pp. 1345–1358, 2011.
  6. Zhu, Z. Wan, F. Bao, R. H. Deng, and M. KankanHalli, "Anonymous secure routing in mobile ad-hoc networks," in Proc. 2004 IEEE Conference on Local Computer Networks, pp. 102–108.
  7. Y. Xiao, X. Shen, and D. -Z. Du (Eds. ), "A survey on attacks and countermeasures in mobile ad hoc networks", Wireless/Mobile Network Security, chapter 12, pp 1-38, Springer, 2006
  8. S. Seys and B. Preneel, "ARM: anonymous routing protocol for mobile ad hoc networks," in Proc. 2006 IEEE International Conference on Advanced Information Networking and Applications, pp. 133–137.
  9. L. Song, L. Korba, and G. Yee, "AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks," in Proc. 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 33–42.
  10. Y. Dong, T. W. Chim, V. O. K. Li, S. -M. Yiu, and C. K. Hui, "ARMR: anonymous routing protocol with multiple routes for communications in mobile ad hoc networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1536– 1550, 2009. A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, "SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks," in Proc. 2004 IEEE LCN, pp. 618–624.
  11. Sy, R. Chen, and L. Bao, "ODAR: on-demand anonymous routing in ad hoc networks," in 2006 IEEE Conference on Mobile Ad-hoc and Sensor Systems.
  12. Y. Zhang, W. Liu, and W. Lou, "Anonymous communications in mobile ad hoc networks," in 2005 IEEE INFOCOM.
  13. Dong, M. Li, Y. Liu, X. -Y. Li, and X. Liao, "Topological detection on wormholes in wireless ad hoc and sensor networks," IEEE/ACM Trans. Netw. , vol. 19, no. 6, pp. 1787–1796, Dec. 2011.
  14. Guoxing Zhan, Weisong Shi, and Julia Deng, 2012 "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs" IEEE Transactions on Dependable and Secure Computing, Volume 9, Issue 2, pp. 184-197.
  15. W. Gong, Z. You, D. Chen, X. Zhao, M. Gu, and K. Lam, "Trust based routing for misbehavior detection in ad hoc networks," Journal of Networks, vol. 5, no. 5, May 2010.
  16. Shao-Shan Chiang, , Chih-Hung Huang, and Kuang-Chiung Chang, "A Minimum Hop Routing Protocol for Home Security Systems Using Wireless Sensor Networks," IEEE Transactions on Consumer Electronics, Vol. 53, No. 4, NOVEMBER 2007.
  17. Xufei Mao Shaojie Tang, Xiaohua Xu Xiang-Yang Li, and Huadong Ma, "Energy-Efficient Op-portunistic Routing in Wireless Sensor Networks," IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 11, NOVEMBER 2011.
  18. A Novel Security Scheme for Wireless Adhoc Network, Abhijit Das Soumya Sankar Basu Atal Chaudhuri, 978-1-4577-0787-2/11 IEEE 2011.
  19. Huei-Wen Ferng,Rachmarini, D. ,"A secure routing protocol for wireless sensor networks with consideration of energy efficiency/Network Operations and Management Symposium (NOMS)," 2012 IEEE .
  20. Anfeng Liu, Zhongming Zheng , Chao Zhang, Zhigang Chen, and Xuemin (Sherman) Shen,"Secure and Energy-Efficient Disjoint Multipath Routing for WSNs," IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER 2012.
  21. Rong Fan, Jian Chen, Jian-Qing Fu, Ling-Di Ping,,"A Steiner-Based Secure Multicast Routing Protocol for Wireless Sensor Network/Parallel and Distributed Systems," IEEE Transactions on (Volume:PP , Issue: 99 ), April 2013.
  22. Salwa Aqeel Mahdi, Mohamed Othman, Hamidah Ibrahim, Jalil Md. Desa and Jumat Sulaiman, "PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW," Journal of Computer Science 9 (5): 607-619, 2013, ISSN 1549-3636
  23. S. Capkun, L. Buttyan, and J. Hubaux, ?Self-organized public-key management for mobile ad hoc networks,? IEEE Trans. Mobile Comput. , vol. 2, no. 1, pp. 52–64, Jan. -Mar. 2003.
  24. K. Marina and R. Samir, "Ad Hoc on-Demand Multipath Distance Vector Routing," Wireless Communications and Mobile Computing, 2006, pp. 969-988. http://dx. doi. org/10. 1002/wcm. 432
Index Terms

Computer Science
Information Sciences

Keywords

Eavesdropping attack secure unobservable routing protocol Trust mechanism trust-aware routing framework