Cargando…

T2AR: trust-aware ad-hoc routing protocol for MANET

Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless con...

Descripción completa

Detalles Bibliográficos
Autores principales: Dhananjayan, Gayathri, Subbiah, Janakiraman
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4937011/
https://www.ncbi.nlm.nih.gov/pubmed/27441127
http://dx.doi.org/10.1186/s40064-016-2667-6
_version_ 1782441631771787264
author Dhananjayan, Gayathri
Subbiah, Janakiraman
author_facet Dhananjayan, Gayathri
Subbiah, Janakiraman
author_sort Dhananjayan, Gayathri
collection PubMed
description Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.
format Online
Article
Text
id pubmed-4937011
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-49370112016-07-20 T2AR: trust-aware ad-hoc routing protocol for MANET Dhananjayan, Gayathri Subbiah, Janakiraman Springerplus Research Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design. Springer International Publishing 2016-07-07 /pmc/articles/PMC4937011/ /pubmed/27441127 http://dx.doi.org/10.1186/s40064-016-2667-6 Text en © The Author(s) 2016 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Research
Dhananjayan, Gayathri
Subbiah, Janakiraman
T2AR: trust-aware ad-hoc routing protocol for MANET
title T2AR: trust-aware ad-hoc routing protocol for MANET
title_full T2AR: trust-aware ad-hoc routing protocol for MANET
title_fullStr T2AR: trust-aware ad-hoc routing protocol for MANET
title_full_unstemmed T2AR: trust-aware ad-hoc routing protocol for MANET
title_short T2AR: trust-aware ad-hoc routing protocol for MANET
title_sort t2ar: trust-aware ad-hoc routing protocol for manet
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4937011/
https://www.ncbi.nlm.nih.gov/pubmed/27441127
http://dx.doi.org/10.1186/s40064-016-2667-6
work_keys_str_mv AT dhananjayangayathri t2artrustawareadhocroutingprotocolformanet
AT subbiahjanakiraman t2artrustawareadhocroutingprotocolformanet