Abstract

Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.

Highlights

  • Mobile ad hoc network (MANET), a dynamic configured and infrastructure less architecture that contains operating nodes responsible for data transfer

  • The nodes in the MANET are responsible for packet transfer and their join or leave the network without any constraints leads to an unpredictable MANET structure

  • Conclusion and future work This paper proposed a T2AR protocol for the trust level improvement between the nodes in MANET and enhanced the secure data transfer performance

Read more

Summary

Background

Mobile ad hoc network (MANET), a dynamic configured and infrastructure less architecture that contains operating nodes responsible for data transfer. The evolution of detection approaches based on trust management protocols do not consider the malicious behavior observed from direct and indirect schemes. The log collection-based trust computation, observation schemes and the RSSI estimations in the proposed work increases the packet delivery ratio (PDR), throughput with less delay and false positives compared to the traditional trust-based protocols. Zhu et al (2014) proposed the probabilistic-based misbehavior detection scheme called iTrust that introduces the periodical trusting authority (TA) to judge the node behavior with the routing evidence and probability checking The design of trust management depends on the prediction of the relationship between the devices (pervasive computing environment) which is the challenging task. The trust derived from the social networks was combined with the QoS constraints of the network to obtain the metric They provided trust management schemes that were not suitable for packet dropping attacks by selfish nodes. Depends on the velocity parameter, the neighbor node position level with respect to selected node is obtained using, v

The mobility function is obtained from
Trust update
Simulation parameters
Number of packets received
Findings
Conclusion and future work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call