Secure routing protocol based on optimized trust evaluation in Ad Hoc network
-
摘要: 针对Ad Hoc网络中自私节点造成的攻击问题,提出了一种基于信任评估的Ad Hoc安全路由协议TEAR。该协议在节点行为信任评估方案的基础上,通过使用链路信任值和路径信任值表示节点和路径的可信度,同时,在链路信任值计算时,引入了基于公共邻居节点的间接信任评估方法和可变时间窗机制,保证了信任值计算的准确性和实效性;协议中每个节点维护一张信任表,并重新定义了路由请求和路由回复消息格式,实现了安全路径的快速选择。使用NS2进行模拟验证,又与AODV以及基于固定时间窗信任评估的安全路由协议TA-AODV进行性能对比。结果表明,改进的信任评估方案具有更好的性能,采用该方案的安全路由协议能较快地发现自私节点,并准确选择安全路径,提高了Ad Hoc网络性能。Abstract: Aimed at the attack of selfish nodes in mobile Ad Hoc networks, this paper proposes a secure routing protocol TEAR, which is based on trust evaluation. In order to realize the accuracy and timeliness of trust values, the proposed protocol, which is based on the trust evaluation scheme of node behavior, uses the link trust and path trust to represent the reliability of a node and a path respectively, and introduces the indirect trust evaluation scheme with public neighbors' trust values and variable time window. The trust value table of each node and the new structure of RREQ and RREP provide the quick selection of secure routing. Finally, TEAR protocol was verified by NS2 simulation and compared with AODV and TA-AODV which is based on fixed time window trust evaluation. The simulation results show that the improved trust evaluation scheme has a superior performance, and TEAR can not only detect the selfish nodes correctly but also select secure path, which improves the function of Ad Hoc networks.
-
Key words:
- Ad Hoc network /
- selfish nodes /
- secure routing /
- trust evaluation /
- variable time window /
- node behavior
-
[1] YANG H,LUO H Y,YE F,et al. Security in mobile Ad Hoc networks:Challenges and solutions[J].IEEE Wireless Communications,2004,11(1):38-47. [2] GUPTE S,SINGHAL M.Secure routing in mobile wireless Ad Hoc networks[J].Ad Hoc Networks,2003,1(1):151-174. [3] KANNHAVONG B,NAKAYAMA H,NEMOTO Y,et al.A survey of routing attacks in mobile Ad Hoc networks[J].IEEE Wireless Communications,2007,14(5):85-91. [4] ZAPATA M G.Secure Ad Hoc on-demand distance vector routing[J].ACM SIGMOBILE Mobile Computing and Communications Review,2002,6(3):106-107. [5] HU Y C,PERRIG A,JOHNSON D B.Ariadne:A secure on-demand routing protocol for Ad Hoc networks[J].Wireless Networks,2005,11(1):21-38. [6] HU Y C,JOHNSON D B,PERRIG A.SEAD:Secure efficient distance vector routing for mobile wireless Ad Hoc networks[J].Ad Hoc Networks,2003,1(1):175-192. [7] 付才,洪帆,洪亮,等.基于信任保留的移动Ad Hoc网络安全路由协议TPSRP[J].计算机学报,2007,30(10):1854-1864.FU C,HONG F,HONG L,et al.Mobile Ad Hoc secure routing protocol based on trust preserving[J].Chinese Journal of Computers,2007,30(10):1854-1864(in Chinese). [8] BALAKRISHNAN V,VARADHARAJAN V,LUCS P,et al.Trust enhanced secure mobile Ad-Hoc network routing[C]//Proceedings of the 21st International Conference on Advanced Networking and Applications.Piscataway,NJ:IEEE Press,2007:27-33. [9] ABUSALAH L,KHOKHAR A,GUIZANI M.A survey of secure mobile Ad Hoc routing protocols[J].IEEE Communications Surveys and Tutorials,2008,10(4):78-93. [10] LI X,JIA Z,ZHANG P,et al.Trust-based on-demand multipath routing in mobile Ad Hoc networks[J].IET Information Security,2010,4(4):212-232. [11] PERRONE L F,NELSON S C.A study of on-off attack models for wireless Ad Hoc networks[C]//Proceedings of 1st Workshop on Operator-Assisted(Wireless Mesh)Community Networks.Piscataway,NJ:IEEE Press,2006:58-67. [12] USHIKUBO H,TAKEDA S,SHIGENO H.An effective secure routing protocol considering trust in mobile Ad Hoc networks[J].IPSJ Journal,2014,55(2):649-658. [13] UMEDA S,TAKEDA S,SHIGENO H.Trust evaluation method adapted to node behavior for secure routing in mobile Ad Hoc networks[C]//Proceedings of 2015 8th International Conference on Mobile Computing and Ubiquitous Networking(ICMU).Berlin:Springer,2015:143-148. [14] KUROSAWA S,NAKAYAMA H,KATO N,et al.Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method[J].International Journal of Network Security,2007,5(3):338-345. [15] SEN J,CHANDRA M,HARIHARA S,et al.A mechanism for detection of grayhole attack in mobile Ad Hoc networks[C]//Proceedings of 2007 6th International Conference on Information,Communications and Signal Processing.Piscataway,NJ:IEEE Press,2007:1-5. [16] GHOSH T,PISSINOU N,MAKKI K.Collaborative trust-based secure routing against colluding malicious nodes in multi-hop Ad Hoc networks[C]//Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks(LCN'04).Piscataway,NJ:IEEE Press,2004:224-231. [17] CHENG Y,HUANG C,SHI W.Trusted dynamic source routing protocol[C]//Proceedings of the 3rd International Conference on Wireless Communications,Networking and Mobile Computing.Piscataway,NJ:IEEE Press,2007:1632-1636.
点击查看大图
计量
- 文章访问数: 855
- HTML全文浏览量: 190
- PDF下载量: 478
- 被引次数: 0