Collaborative trust-based shortest secure path discovery in mobile ad hoc networks

被引:0
|
作者
Oh, Seungtak [1 ]
Lee, Chilgee [1 ]
Choo, Hyunseung [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon 440746, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As routes in MANET are composed of only mobile terminals based on a multi-hop mechanism, MANET may encounter severe situations where intermediate nodes disturb delivering packets adversely. Accordingly, the stability of routing protocols is very important for operating the ad hoc networks efficiently and securely. However finding a secure end-to-end path is not easy, since the nodes in MANET are characterized by uncertain trust relationship each other. In this paper, a comprehensive mechanism for discovering the most secure and shortest paths, is proposed. This proposed mechanism is based on the Dijkstra algorithm, and regards distance weight and trust weight highly. The metric value which can determine the routing path is to be extracted from the distance value and the trust level. According to the simulation results, even though the communication cost increases up to about 8%, the security level of the shortest path is improved significantly.
引用
收藏
页码:1089 / 1096
页数:8
相关论文
共 50 条
  • [11] Trust Modeling for Secure Route Discovery in Mobile Ad-hoc Networks
    Wadhwani, Ganesh Kumar
    Khatri, Sunil Kumar
    Muttoo, S. K.
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 391 - 395
  • [12] A Secure Trust-Based Location-Aided Routing for Ad Hoc Networks
    Wang, Kun
    Wu, Meng
    Xia, Pengrui
    Shen, Subin
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 793 - 797
  • [13] Trust-based on-demand multipath routing in mobile ad hoc networks
    Li, X.
    Jia, Z.
    Zhang, P.
    Zhang, R.
    Wang, H.
    IET INFORMATION SECURITY, 2010, 4 (04) : 212 - 232
  • [14] The Trust-Based MAC - Layer Security Protocol for Mobile Ad hoc Networks
    Rajaram, A.
    Palaniswami, S.
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [15] Trust-based Cluster head Selection Algorithm for Mobile Ad hoc Networks
    Ferdous, Raihana
    Muthukkumarasamy, Vallipuram
    Sithirasenan, Elankayer
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 589 - 596
  • [16] A Trust-based Uncoordinated Checkpointing Algorithm in Mobile Ad hoc Networks (MANETs)
    Saini, Poonam
    Aggarwal, Shefali
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 311 - 317
  • [17] A secure on-demand routing with distributed authentication for trust-based ad hoc networks
    Hsieh, MY
    Huang, YM
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2005, 3779 : 343 - 350
  • [18] A novel fuzzy trust-based secure routing scheme in flying ad hoc networks
    Hosseinzadeh, Mehdi
    Mohammed, Adil Hussein
    Alenizi, Farhan A.
    Malik, Mazhar Hussain
    Yousefpoor, Efat
    Yousefpoor, Mohammad Sadegh
    Ahmed, Omed Hassan
    Rahmani, Amir Masoud
    Tightiz, Lilia
    VEHICULAR COMMUNICATIONS, 2023, 44
  • [19] Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks
    Ghosh, T
    Pissinou, N
    Makki, K
    LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 224 - 231
  • [20] A trust-based routing protocol for ad hoc networks
    Xue, XY
    Leneutre, J
    Ben-Othman, J
    MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2005, 162 : 251 - 262