DocumentCode :
2500937
Title :
Trust based secured adhoc On demand Distance Vector Routing protocol for mobile adhoc network
Author :
Mangrulkar, R.S. ; Atique, Mohammad
Author_Institution :
Dept. of Comput. Eng., B.D.Coll. of Eng., Wardha, India
fYear :
2010
fDate :
15-19 Dec. 2010
Firstpage :
1
Lastpage :
4
Abstract :
An ad-hoc network comprises of mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. They are characterized by the use of wireless links, dynamically changing topology, multi-hop connectivity and decentralized routing mechanism and decision-making. The performance of Ad-hoc On Demand Vector (AODV) protocols has been modified by including the source route accumulation feature. As low transmission power of each ad-hoc node limits its communication range, the nodes must assist and trust each other in forwarding packets from one node to another. However, this implied trust relationship can be threatened by malicious nodes that may fabricate, modify or disrupt the orderly exchange of packets. Security demands that all packets be authenticated before being used. A particularly hard problem is to provide efficient broadcast authentication, which is important mechanism for MaNet. In this paper, we propose a routing algorithm which adds a field in request packet which stores trust value indicating node trust on neighbour. Based on level of trust factor, the routing information will be transmitted depending upon highest trust value among all. This not only saves the node´s power by avoiding unnecessary transmitting control information but also in terms of bandwidth (channel utilization), which is very important in case of MaNet. The malicious node can attack on the control packet and misbehave in the network. The malicious node, which may or may not be trusted node. In this paper, we use trusted path irrespective of shortest or longest path which can be used for communication in the network. We are able to calculate route trust value on the complete reply path which can be utilized by source node for next forthcoming communication in the network.
Keywords :
mobile ad hoc networks; routing protocols; telecommunication security; AODV protocol; MANET; ad hoc on demand distance vector routing protocol; channel utilization; decision making; mobile ad hoc network; Ad hoc networks; Communication system security; Mobile communication; Network topology; Routing; Routing protocols; Wireless communication; AODV; Ad-hoc; MaNet; Malicious node; Route trust;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communication and Sensor Networks (WCSN), 2010 Sixth International Conference on
Conference_Location :
Allahabad
Print_ISBN :
978-1-4244-9731-7
Type :
conf
DOI :
10.1109/WCSN.2010.5712310
Filename :
5712310
Link To Document :
بازگشت