Collaborative trust-based shortest secure path discovery in mobile ad hoc networks

被引:0
|
作者
Oh, Seungtak [1 ]
Lee, Chilgee [1 ]
Choo, Hyunseung [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon 440746, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As routes in MANET are composed of only mobile terminals based on a multi-hop mechanism, MANET may encounter severe situations where intermediate nodes disturb delivering packets adversely. Accordingly, the stability of routing protocols is very important for operating the ad hoc networks efficiently and securely. However finding a secure end-to-end path is not easy, since the nodes in MANET are characterized by uncertain trust relationship each other. In this paper, a comprehensive mechanism for discovering the most secure and shortest paths, is proposed. This proposed mechanism is based on the Dijkstra algorithm, and regards distance weight and trust weight highly. The metric value which can determine the routing path is to be extracted from the distance value and the trust level. According to the simulation results, even though the communication cost increases up to about 8%, the security level of the shortest path is improved significantly.
引用
收藏
页码:1089 / 1096
页数:8
相关论文
共 50 条
  • [31] Trust-based security for wireless ad hoc and sensor networks
    Boukerch, A.
    Xu, L.
    El-Khatib, K.
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427
  • [32] Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks
    Janani, V. S.
    Manikandan, M. S. K.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2016, 41 (10): : 1135 - 1154
  • [33] An Efficient Trust-based Reputation Protocol for Wireless and Mobile Ad hoc Networks: Proof and Correctness
    Ren, Yonglin
    Boukerche, Azzedine
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [34] COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks
    Cho, Jin-Hee
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    IEEE ACCESS, 2019, 7 : 92296 - 92313
  • [35] Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks
    Kumar, Sunil
    Dutta, Kamlesh
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2017, 104 (06) : 1034 - 1049
  • [36] Trust-based Fault Tolerance in Mobile Ad-hoc Networks using Adaptive Monitoring
    Madhavi
    Kaur, Inderjeet
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 669 - 674
  • [37] Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks
    V S Janani
    M S K Manikandan
    Sādhanā, 2016, 41 : 1135 - 1154
  • [38] A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks
    Beghriche, Abdesselem
    Bilami, Azeddine
    INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2018, 11 (02) : 309 - 340
  • [39] Friendship Based Trust Model to secure routing protocols in Mobile Ad hoc Networks
    Shabut, Antesar M.
    Dahal, Keshav
    Awan, Irfan
    2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 280 - 287
  • [40] Dynamic Trust Based Secure Multipath Routing for Mobile Ad-Hoc Networks
    Sathiyavathi, V
    Reshma, R.
    Parvin, S. B. Saleema
    SaiRamesh, L.
    Ayyasamy, A.
    INTELLIGENT COMMUNICATION TECHNOLOGIES AND VIRTUAL MOBILE NETWORKS, ICICV 2019, 2020, 33 : 618 - 625