Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks

Nodes in mobile Ad Hoc Network (MANET) do not rely on a central infrastructure but relay packets originated by other nodes. Mobile ad hoc networks can work properly only if the participating nodes collaborate in routing and forwarding. For individual nodes it might be advantageous not to collaborate, though. In this conceptual paper we propose a new approach based on relationship among the nodes which makes them to cooperate in an Adhoc environment. The trust unit is used to calculate the trust values of each node in the network. The calculated trust values are being used by the relationship estimator to determine the relationship status of nodes. The proposed enhanced protocol was compared with the standard DSR protocol and the results are analyzed using the network simulator-2.




References:
[1] C. Siva Ram Murthy and B. S. Manoj, "Ad Hoc Wireless Networks:
Architectures and Protocols" Prentice Hall, 2004.
[2] D. Johnson, D. Maltz, Y. Hu, and J. Jetcheva. The dynamic source
routing protocol for mobile ad hoc networks. Internet Draft, Internet
Engineering Task Force, Mar. 2001.http://www.ietf.org/internetdrafts/
draft-ietf.
[3] C.E.Perkins and E.M.Royer "Ad hoc on demand distance vector
routing", Proceedings of IEEE Workshop on Mobile computing systems
and Applications 1999, pp. 90-100, February 1999.
[4] Richard Dawkins. The selfish Gene. Oxford University press, 1980
edition, 1976..
[5] Yi-Chun Hu, Adrian Perrig, "A Survey of Secure Wireless Ad Hoc
Routing", IEEE Security and Privacy May/June 2004.
[6] S. Murphy, "Routing Protocol Threat Analysis," Internet Draft, draftmurphy-
threat-00.txt, October 2002.
https://forum.eviloctal.com/redirect.php?tid=1992&goto=lastpost.
[7] Adam Burg, "Ad hoc network specific attacks ", Seminar on Ad hoc
networking: concepts, applications, and Security, Technische
Universität München, 2003.
[8] P. Papadimitratos, and Z.J. Haas, "Securing the Internet Routing
Infrastructure," IEEE Communications, vol. 10, no. 40, October 2002,
pp. 60-68. Digital Object Identifier 10.1109/MCOM.2002.1039858
[9] Ernesto Jiménez Caballero, "Vulnerabilities of Intrusion Detection
Systems in Mobile Ad-hoc Networks - The routing problem" TKK T-
110.5290 Seminar on Networksecurity2006-12-11/12.
www.tml.tkk.fi/Publications/C/22/papers/jimenez_final.pdf
[10] Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense
against Wormhole Attacks in Wireless Ad hoc Networks," Proc. 22nd
Annual Joint Conf. IEEE Computer and Communications Societies
(Infocom-03), San Francisco, CA, April 2003, ISSN: 0743-166X,
INSPEC Accession Number: 7853884.
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1209219.
[11] Sonja Buchegger and Jean-Yves Le Boudec. Nodes Bearing Grudges:
Towards Routing Security, Fairness and robustness in Mobile ad hoc
networks. In proceedings of the Tenth Euromicro Workshop on Parallel,
Distributed and Network-based processing, Pages 403 - 410. Canary
Islands, Spain. January 2002. IEEE Computer Society
[12] Sergio Marti.T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing
misbehaviour in Mobile ad hoc networks. In Proceedings of
MOBICOM 2000. Pages 255-265, 2000.
[13] Sonja Buchegger and Jean-Yves Le Boudec: "Performance analysis of
the CONFIDANT protocol" Proceedings of the 3rd ACM international
symposium on Mobile ad hoc networking & computing-02. p.p:226 -
236. http://doi.acm.org/10.1145/513800.513828.
[14] John Keane, "Trust-based Dynamic Source Routing in Mobile Ad Hoc
Networks", MS thesis, Department of Computer Science, Trinity
College Dublin, September 2002.
[15] Kevin Fall, Kannan Varadhan: The ns manual,
http://www.isi.edu/nsnam/ns/ doc/index.html