• DocumentCode
    2500937
  • Title

    Trust based secured adhoc On demand Distance Vector Routing protocol for mobile adhoc network

  • Author

    Mangrulkar, R.S. ; Atique, Mohammad

  • Author_Institution
    Dept. of Comput. Eng., B.D.Coll. of Eng., Wardha, India
  • fYear
    2010
  • fDate
    15-19 Dec. 2010
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    An ad-hoc network comprises of mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. They are characterized by the use of wireless links, dynamically changing topology, multi-hop connectivity and decentralized routing mechanism and decision-making. The performance of Ad-hoc On Demand Vector (AODV) protocols has been modified by including the source route accumulation feature. As low transmission power of each ad-hoc node limits its communication range, the nodes must assist and trust each other in forwarding packets from one node to another. However, this implied trust relationship can be threatened by malicious nodes that may fabricate, modify or disrupt the orderly exchange of packets. Security demands that all packets be authenticated before being used. A particularly hard problem is to provide efficient broadcast authentication, which is important mechanism for MaNet. In this paper, we propose a routing algorithm which adds a field in request packet which stores trust value indicating node trust on neighbour. Based on level of trust factor, the routing information will be transmitted depending upon highest trust value among all. This not only saves the node´s power by avoiding unnecessary transmitting control information but also in terms of bandwidth (channel utilization), which is very important in case of MaNet. The malicious node can attack on the control packet and misbehave in the network. The malicious node, which may or may not be trusted node. In this paper, we use trusted path irrespective of shortest or longest path which can be used for communication in the network. We are able to calculate route trust value on the complete reply path which can be utilized by source node for next forthcoming communication in the network.
  • Keywords
    mobile ad hoc networks; routing protocols; telecommunication security; AODV protocol; MANET; ad hoc on demand distance vector routing protocol; channel utilization; decision making; mobile ad hoc network; Ad hoc networks; Communication system security; Mobile communication; Network topology; Routing; Routing protocols; Wireless communication; AODV; Ad-hoc; MaNet; Malicious node; Route trust;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless Communication and Sensor Networks (WCSN), 2010 Sixth International Conference on
  • Conference_Location
    Allahabad
  • Print_ISBN
    978-1-4244-9731-7
  • Type

    conf

  • DOI
    10.1109/WCSN.2010.5712310
  • Filename
    5712310