Abstract

Due to recent advances in computing and communication technologies, Mobile Ad hoc Networks (MANETs) are becoming networks of choice for various applications such as emergencies [sic] preparedness and response, military and crisis management, and healthcare, to name a few. The main reason for this is that in MANET, information exchange between nodes can happen dynamically without pre-exisiting fixed network infrastructure with designated centralized access points. However, this privilege also comes with some security drawbacks, especially from a message security viewpoint because the implementation of hard-cryptographic security now becomes a challenging prospect. In this thesis, we improve a recently proposed method of message security in MANET (so called benchmark scheme, also referred to as trust-based multipath DSR routing scheme), by introducing a trust model that makes multi-path routing flexible enough to avoid non-trusted routes that may use brute force attacks to decrypt messages travelling through the network en route to their destinations. Simulation results, coupled with theoretical justification, affirm that the proposed solution is much more secured than the above-mentioned benchmark method and traditional multi-path routing algorithms.

Highlights

  • 4.2.1 Varying the number of nodes under one fixed mobility scenario In this scenario, the terrain dimension is fixed to 1000 m x1000 m and the maximum speed of nodes is fixed. 4.2.1.1 Effect of the network size on the route selection time The network size is varied and we study the impact of this variation on the route selection time for the four studied algorithms, for a given proportion of malicious nodes present in the network

  • Our results show that there is a compromise between message security and routing time, which is generally the 73 case with most of the security algorithms

  • We have proposed an enhancement to a recently introduced routing strategy towards message security in Mobile Ad hoc Networks (MANETs)

Read more

Summary

Mobile Ad Hoc Networks

Wireless technology is undoubtedly one of the most promising technologies in the last decade because it can allow users to utilize devices that enable the access to information at any place and time. A MANET is a type of wireless ad hoc network that consists of a dynamic set of wireless mobile routers (with associated hosts), referred to as nodes. These nodes are interconnected using radio links. With the advent of new consumer products such as laptops, mobile phones, PDAs, to name a few, that can act as wireless mobile routers, MANETs are becoming increasingly popular and resources are shifting away from wired backbone routers With this growth, there is a clear demand for effective and secure multi-hop and multi-path routing protocols [2]. The solution proposed in this thesis follows this guideline by using the Dynamic Source Routing (DSR) protocol as underlying multi-path routing mechanism in MANETs

Benefit of Multi-Path Routing
Context of Our Study
Research Problem
Our Approach
Contributions
Chapter 2: Background Research
Credit-Based Systems
Limitations of Credit-Based Systems
Reputation Systems
Local reputation systems
Limitations of Reputation-Based Systems
TFT-Based Systems
Cryptography-Based Systems
Methods
Motivation
Message Encryption
Trust Establishment
Definition of Trust
Trust Management Model
Trust Management Scheme Architecture
Trust Management Scheme Operations
Trust Levels Assignment
Message Encryption and Routing (9)
Trust Defined Strategy
Overview of DSR In this
Theoretical Foundation
Simulation Setup and Scenarios
Simulation Results
Varying the number of nodes under one fixed mobility scenario
Effect of the network size on the trust compromise
Effect of the maximum speed of nodes on the route selection time
Effect of the maximum speed of nodes on the trust compromise
Effect of the percentage of malicious nodes on the route selection time
Effect of the terrain dimension on the route selection time
Effect of the terrain dimension on the trust compromise
Summary In general, from our simulation study, we can conclude that
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.