CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Trust Enhanced Secure Multi-Path DSR Routing

by Poonam, K. Garg, M. Misra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 2 - Number 2
Year of Publication: 2010
Authors: Poonam, K. Garg, M. Misra
10.5120/624-886

Poonam, K. Garg, M. Misra . Trust Enhanced Secure Multi-Path DSR Routing. International Journal of Computer Applications. 2, 2 ( May 2010), 63-69. DOI=10.5120/624-886

@article{ 10.5120/624-886,
author = { Poonam, K. Garg, M. Misra },
title = { Trust Enhanced Secure Multi-Path DSR Routing },
journal = { International Journal of Computer Applications },
issue_date = { May 2010 },
volume = { 2 },
number = { 2 },
month = { May },
year = { 2010 },
issn = { 0975-8887 },
pages = { 63-69 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume2/number2/624-886/ },
doi = { 10.5120/624-886 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:49:45.050780+05:30
%A Poonam
%A K. Garg
%A M. Misra
%T Trust Enhanced Secure Multi-Path DSR Routing
%J International Journal of Computer Applications
%@ 0975-8887
%V 2
%N 2
%P 63-69
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Ad-hoc networks establish communication in improvised environments without requiring any fixed infrastructure. These networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. Therefore, it is required that the nodes cooperate for the integrity of network operation. However, nodes may refuse to cooperate by not forwarding packets to others for selfish reasons and/or not wanting to exhaust their resources. Due to high mobility of nodes in the network, detecting misbehavior is a complex problem. Nodes have to share routing information in order for each to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of secure routing protocols based on trust have recently been proposed. However, all these protocols use the traditional route discovery model, where a node drops RREQ packet if its own ID is in the source route of the packet, or if it has previously processed the packet. A misbehaving node takes advantage of this vulnerability and forwards the RREQ fast, so that the RREQ received from other nodes are dropped and the path discovered includes itself (the misbehaving node). In this paper, we present a unique trust based method which is not vulnerable to this behavior. In our method, each node broadcasts a RREQ packet if it is received from different neighbors. A secure and efficient route to the destination is calculated as a weighted average of the trust value of the nodes in the route, with respect to its behavior observed by its neighboring nodes and the number of nodes in the route. We evaluate the misbehaving node detection rate and the efficiency of our method along a number of parameters. Results show that our method increases the throughput of the network while discovering a secure route.

References
  1. Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y.C. and Jetcheva, J. G. 1998 A performance comparison of multihop wireless ad hoc network routing protocols. In proceeding of International Conference Mobile Computing and Networking (MobiCom), ACM Press, 85–97.
  2. Buchegger, S. and Boudec, J. 2002. Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes—Fairness In Distributed Ad hoc NeTworks. In Proceeding ACM Workshop Mobile Ad Hoc Networking and Computing (Switzerland, 2006). 226-236.
  3. Garfinkel, S.1995 PGP: Pretty Good Privacy. O’Reilly and Associates.
  4. Haniotakis, T., Tragoudas, S. and Kalapodas, C. 2004. Security enhancement through multiple path transmission in ad hoc networks. IEEE Communications Society, 4187-4191.
  5. Johnson, D. B., Maltz, D. A., Hu, Y. C. and Jetcheva, J.G. 2003. The dynamic source routing protocol for mobile ad hoc networks (DSR). Internet draft IETF RFC 3561, http://www.ietf.org/rfc/rfc3561.txt.
  6. Marti, S., Giuli, T. J., Lai, K. and Baker, M. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In Proceeding of Sixth Annual International Conference Mobile Computing and Networking (MobiCom). ACM Press, New York, NY, 255-265.
  7. Narula, P., Dhurandher, S. K., Misra, S. and Woungang, I. 2007. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Elsevier Journal of Computer Communications, 760-769.
  8. Pirzada, A. A., Datta, A. and McDonald, C. 2004. Propagating trust in ad-hoc networks for reliable routing. In Proceeding of IEEE International Workshop Wireless Ad Hoc Networks (Finland, 2004). 58-62.
  9. Pirzada, A. A., Datta, A. and McDonald, C. 2004. Trust-based routing for ad-hoc wireless networks. In Proceeding of. IEEE International Conference Networks (Singapore, 2004). 326-330.
  10. Pissinou, N., Ghosh, T. and Makki, K. 2004. Collaborative trust-based secure routing in multihop ad hoc networks. Networking (Athens, Greece 2004). Lecture Notes in Computer Science, vol. 3042, 1446-1451.
  11. Poonam, Garg, K., and Misra, M. 2010. Trust based multi path DSR protocol. In Proceedings of Fifth International Conference on Availability, Reliability and Security, (Poland, February, 2010). 204-209.
  12. Wang, C., Yang, X. and Gao, Y. 2005. A Routing Protocol Based on Trust for MANETs. In Proceeding of Sixth Annual International Conference on Grid and Cooperative Computing (Beijing, China). Lecture notes in computer science, vol. 3795, 959-964.
  13. Yong, C., Chuanhe, H. and Wenming, S. 2007. Trusted Dynamic Source Routing Protocol. IEEE International Conference on Wireless Communications, Networking and Mobile Computing (Athens, Greece 2007), 1632-1636.
  14. Zhou, L. and Haas, Z. J. 1999. Securing ad hoc networks IEEE Network Magazine, vol. 13, no. 6, 1-12.
Index Terms

Computer Science
Information Sciences

Keywords

Trust Misbehaving nodes Dynamic Source Routing Path Trust