scholarly journals Trust-based secure routing against lethal behavior of nodes in wireless adhoc network

Author(s):  
Jyoti Neeli ◽  
N. K. Cauvery

Offering a secure communication in wireless adhoc network is yet an open-end problem irrespective of archives of existing literatures towards security enhancement. Inclination towards solving specific forms of attack in adhoc network is majorly seen as an existing trend which lowers the applicability of existing security solution while application environment or attack scenario is changed. Therefore, the proposed system implements an analytical secure routing modeling which performs consistent monitoring of the malicious behaviour of its neighboring node and formulates decision towards secure routing by the source nodes. Harnessing the potential ofconceptual probabilistic modeling, the proposed system is capable as well as applicable for resisting maximum number / types of threats in wireless network. The study outcome show proposed scheme offer better performance in contrast to existing secure routing scheme.

Author(s):  
Jyoti Neeli ◽  
N. K. Cauvery

Study towards Wireless Adhoc Network dates two decades back with various researchers evolving up with new solutions towards addressing its problems. Irrespective of various other problems, the issues related to the secure routing is yet unsolved owing to massively increasing fatal strategies of the adversary. Review of existing literature shows that the existing secure routing scheme can only govern over the stated attacks reducing the applicability in case of dynamic attacks. Therefore, this manuscript introduces a novel probabilistic model which offers the capability to wireless nodes to identify the malicious behavior and react accordingly. Different from existing intrusion prevention system, the proposed system allows the malicious node to participate in the data forwarding process and exhaust its resources with no chance of launching an attack. The simulated outcome of the study shows that the proposed secure routing scheme offers better data forwarding characteristic in contrast to the existing system in the aspect of intrusion detection and secure data transmission.


2021 ◽  
Author(s):  
Michael Ryan Sahai

Message security in multi-hop infrastructure-less networks such as Mobile Ad Hoc Net- works has proven to be a challenging task. A number of trust-based secure routing protocols has recently been introduced comprising of the traditional route discovery phase and a data transmission phase. In the latter, the action of relaying the data from one mobile node to another relies on the peculiarity of the wireless transmission medium as well as the capability of the source nodes to keep their energy level at an acceptable and reasonable level, posing another concern which is that of energy efficiency. This thesis proposes an Energy-Aware Trust Based Multi-path secured routing scheme (E-TBM) for MANETs, based on the dynamic source routing protocol (DSR). Results show that the E-TBM scheme outperforms the Trust Based Multi-path (TBM) secured routing scheme [1], chosen as a benchmark, in terms of energy consumption of the selected routing paths, number of dead nodes, trust compromise and route selection time, chosen as performance metrics.


2020 ◽  
Vol 17 (12) ◽  
pp. 5243-5249
Author(s):  
R. Jayaprakash ◽  
B. Radha

The Trusted Key Management Protocol (TKMP) provides one of the most secure communication technologies in MANET cluster-based data protection. For security reasons, TKMP is a trusted key that can be sent to all nodes in the communication cluster. This document introduces the Trusted Key Management Protocol (TKMP) feature to improve the quality of secure communications over a cluster-based wireless network. The proposed TKMP execution process includes CBPPRS (Cluster Based Privacy Preserving Routing Selection), LBCPR (Load Balancing Cluster Based Privacy Routing) and DLBPS (Dynamic Load Balancing Privacy Path Selection) procedure. To lock the data from the malicious node, the Paillier Cryptosystem (PC) encrypts packets with homomorphic encryption. The trust score makes it easier to update routing information and improves network throughput. The experimental results show that the proposed TKMP method works better than the other Trust-ECC method.


Author(s):  
Abdelaziz Amara Korba ◽  
Mohamed Amine Ferrag

This chapter proposes a new cluster-based secure routing scheme to detect and prevent intrusions in ad hoc networks. The proposed scheme combines both specification and anomaly detection techniques to provide an accurate detection of wide range of routing attacks. The proposed secure scheme provides an adaptive response mechanism to isolate malicious nodes from the network. A key advantage of the proposed secure scheme is its capacity to prevent wormhole and rushing attacks and its real-time detection of both known and unknown attacks which violate specification. The simulation results show that the proposed scheme shows high detection rate and low false positive rate compared to other security mechanisms.


Sign in / Sign up

Export Citation Format

Share Document