Volume 42 Issue 11
Nov.  2016
Turn off MathJax
Article Contents
CHEN Shaohua, FAN Xiaoguang, ZHUO Zhenfu, et al. Secure routing protocol based on optimized trust evaluation in Ad Hoc network[J]. Journal of Beijing University of Aeronautics and Astronautics, 2016, 42(11): 2524-2531. doi: 10.13700/j.bh.1001-5965.2016.0184(in Chinese)
Citation: CHEN Shaohua, FAN Xiaoguang, ZHUO Zhenfu, et al. Secure routing protocol based on optimized trust evaluation in Ad Hoc network[J]. Journal of Beijing University of Aeronautics and Astronautics, 2016, 42(11): 2524-2531. doi: 10.13700/j.bh.1001-5965.2016.0184(in Chinese)

Secure routing protocol based on optimized trust evaluation in Ad Hoc network

doi: 10.13700/j.bh.1001-5965.2016.0184
  • Received Date: 09 Mar 2016
  • Rev Recd Date: 22 Apr 2016
  • Publish Date: 20 Nov 2016
  • Aimed at the attack of selfish nodes in mobile Ad Hoc networks, this paper proposes a secure routing protocol TEAR, which is based on trust evaluation. In order to realize the accuracy and timeliness of trust values, the proposed protocol, which is based on the trust evaluation scheme of node behavior, uses the link trust and path trust to represent the reliability of a node and a path respectively, and introduces the indirect trust evaluation scheme with public neighbors' trust values and variable time window. The trust value table of each node and the new structure of RREQ and RREP provide the quick selection of secure routing. Finally, TEAR protocol was verified by NS2 simulation and compared with AODV and TA-AODV which is based on fixed time window trust evaluation. The simulation results show that the improved trust evaluation scheme has a superior performance, and TEAR can not only detect the selfish nodes correctly but also select secure path, which improves the function of Ad Hoc networks.

     

  • loading
  • [1]
    YANG H,LUO H Y,YE F,et al. Security in mobile Ad Hoc networks:Challenges and solutions[J].IEEE Wireless Communications,2004,11(1):38-47.
    [2]
    GUPTE S,SINGHAL M.Secure routing in mobile wireless Ad Hoc networks[J].Ad Hoc Networks,2003,1(1):151-174.
    [3]
    KANNHAVONG B,NAKAYAMA H,NEMOTO Y,et al.A survey of routing attacks in mobile Ad Hoc networks[J].IEEE Wireless Communications,2007,14(5):85-91.
    [4]
    ZAPATA M G.Secure Ad Hoc on-demand distance vector routing[J].ACM SIGMOBILE Mobile Computing and Communications Review,2002,6(3):106-107.
    [5]
    HU Y C,PERRIG A,JOHNSON D B.Ariadne:A secure on-demand routing protocol for Ad Hoc networks[J].Wireless Networks,2005,11(1):21-38.
    [6]
    HU Y C,JOHNSON D B,PERRIG A.SEAD:Secure efficient distance vector routing for mobile wireless Ad Hoc networks[J].Ad Hoc Networks,2003,1(1):175-192.
    [7]
    付才,洪帆,洪亮,等.基于信任保留的移动Ad Hoc网络安全路由协议TPSRP[J].计算机学报,2007,30(10):1854-1864.FU C,HONG F,HONG L,et al.Mobile Ad Hoc secure routing protocol based on trust preserving[J].Chinese Journal of Computers,2007,30(10):1854-1864(in Chinese).
    [8]
    BALAKRISHNAN V,VARADHARAJAN V,LUCS P,et al.Trust enhanced secure mobile Ad-Hoc network routing[C]//Proceedings of the 21st International Conference on Advanced Networking and Applications.Piscataway,NJ:IEEE Press,2007:27-33.
    [9]
    ABUSALAH L,KHOKHAR A,GUIZANI M.A survey of secure mobile Ad Hoc routing protocols[J].IEEE Communications Surveys and Tutorials,2008,10(4):78-93.
    [10]
    LI X,JIA Z,ZHANG P,et al.Trust-based on-demand multipath routing in mobile Ad Hoc networks[J].IET Information Security,2010,4(4):212-232.
    [11]
    PERRONE L F,NELSON S C.A study of on-off attack models for wireless Ad Hoc networks[C]//Proceedings of 1st Workshop on Operator-Assisted(Wireless Mesh)Community Networks.Piscataway,NJ:IEEE Press,2006:58-67.
    [12]
    USHIKUBO H,TAKEDA S,SHIGENO H.An effective secure routing protocol considering trust in mobile Ad Hoc networks[J].IPSJ Journal,2014,55(2):649-658.
    [13]
    UMEDA S,TAKEDA S,SHIGENO H.Trust evaluation method adapted to node behavior for secure routing in mobile Ad Hoc networks[C]//Proceedings of 2015 8th International Conference on Mobile Computing and Ubiquitous Networking(ICMU).Berlin:Springer,2015:143-148.
    [14]
    KUROSAWA S,NAKAYAMA H,KATO N,et al.Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method[J].International Journal of Network Security,2007,5(3):338-345.
    [15]
    SEN J,CHANDRA M,HARIHARA S,et al.A mechanism for detection of grayhole attack in mobile Ad Hoc networks[C]//Proceedings of 2007 6th International Conference on Information,Communications and Signal Processing.Piscataway,NJ:IEEE Press,2007:1-5.
    [16]
    GHOSH T,PISSINOU N,MAKKI K.Collaborative trust-based secure routing against colluding malicious nodes in multi-hop Ad Hoc networks[C]//Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks(LCN'04).Piscataway,NJ:IEEE Press,2004:224-231.
    [17]
    CHENG Y,HUANG C,SHI W.Trusted dynamic source routing protocol[C]//Proceedings of the 3rd International Conference on Wireless Communications,Networking and Mobile Computing.Piscataway,NJ:IEEE Press,2007:1632-1636.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(789) PDF downloads(476) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return