Abstract
Mobile ad hoc networks (MANET) are formed when two or more nodes come within the communication range of each other. Since the wireless range is very short, all the nodes in the network have to extend their complete co-operation for efficient functioning of the network. This paper proposes a generalized trust framework for any ad hoc routing protocol to curb selfish and malicious nodes in a MANET. The trust relationships existing between the nodes determine the routing path to be taken for data transfer. The trust framework is combined with any MANET routing algorithm. The performance analysis of this framework is currently done with two reactive protocols. Jointly, they form a trusted network to curb various attacks originating in the ad hoc network. This type of a trusted framework established in a MANET, would be most suited for tactical environments.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Burbank, J.L., Chimento, P.F., Haberman, B.K., Kasch, W.T.: Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology. IEEE Communications Magazine 44(11), 39–45 (2006)
Buttyán, L., Hubaux, J.-P.: Security and Co-operation in wireless networks. Cambridge University Press, Cambridge (February 2007)
Yoo, Y., Agrawal, D.P.: Why Does It Pay To Be Selfish In A Manet? IEEE Wireless Communications (December 2006)
Conti, M., Giordano, S.: Multihop Ad Hoc Networking: The Reality. IEEE Communications Magazine 45(4), 88–95 (2007)
Li, J., Kato, J.: Future Trust Management Framework for Mobile Ad hoc Networks. IEEE Communications Magazine (April 2008)
Sun, Y., Han, Z., Liu, K.J.R.: Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine (February 2008)
Sun, Y., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Framework of Trust Modeling and Evaluation for ad hoc networks. IEEE JSAC 24(2) (February 2006)
Pirzada, A.A., Datta, A., McDonald, C.: Incorporating Trust and Reputation in the DSR protocol for Dependable Routing. Computer Communications, Special issue on Internet Communications Security 29, 2806–2821 (2006)
Pirzada, A.A., Datta, A., McDonald, C.: Performance Comparison of Trust-based reactive routing protocols. IEEE Transactions on Mobile Computing 5(6) (June 2006)
Papadimitratos, P., Haas, Z.J.: Secure Data Communication in Mobile Ad hoc Networks. IEEE JSAC 24(2) (February 2006)
Papadimitratos, P., Haas, Z.J., Samar, P.: The Secure Routing Protocol (SRP) for Ad Hoc Networks, IETF Internet Draft (March 2004), http://www.potaroo.net/ietf/idref/draft-papadimitratos-secure-routing-protocol
Zhou, L., Haas, Z.J.: Securing Ad hoc Networks. IEEE Networks 13(6), 24–30 (1999)
Yi, P., Dai, Z., Zhong, Y., Zhang, S.: Resisting Flooding Attacks in Ad Hoc Networks. In: International Conference on Information Technology, Coding and Computing, ITCC 2005, April 2005, vol. 2, pp. 657–662 (2005)
Ping, Y., Yafei, H., Yiping, B., Shiyong, Z., Zhoulin, D.: Flooding Attacks and defence in Ad hoc networks. Journal of Systems Engineering and Electronics 17(2), 410–416 (2006)
Balakrishnan, V., Varadharajan, V., Tapakula, U., Gaup Moe, M.E.: Mitigating Flooding attacks in Mobile Ad hoc Networks Supporting Anonymous Communications. In: Proceedings of the 2nd International Conference on Wireless and Ultra Wideband Communications, Auswireless, p. 29 (2007)
Theodorakopoulos, G., Baras, J.S.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 318–328 (2006)
Theodorakopoulos, G., Baras, J.S.: A Testbed for Comparing Trust Computation Algorithms. In: Proceedings of the 25th Army Science Conference, Orlando, FL, November 27-30 (2006)
Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: WiSe 2004: Proceedings of the 3rd ACM workshop on Wireless security, PA, pp. 1–10 (2004)
Venkataraman, R., Pushpalatha, M.: Security in Ad Hoc Networks: An extension of dynamic Source Routing in Mobile Ad Hoc Networks. In: Proceedings of the 10th IEEE International Conference on Communication Systems (2006)
Venkataraman, R., Pushpalatha, M., Khemka, R., Rao, T.R.: Prevention of Flooding attacks in Mobile Ad hoc Networks. In: ICAC3 2009: Proceedings of the International Conference on Advances in Computing, Communication and Control, January 2009, pp. 525–529 (2009) ISBN:978-1-60558-351-8
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Venkataraman, R., Pushpalatha, M., Rama Rao, T. (2010). A Generalized Trust Framework for Mobile Ad Hoc Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Networks and Communications. WeST VLSI NeCoM ASUC WiMoN 2010 2010 2010 2010 2010. Communications in Computer and Information Science, vol 90. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14493-6_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-14493-6_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14492-9
Online ISBN: 978-3-642-14493-6
eBook Packages: Computer ScienceComputer Science (R0)