Open Access Open Access  Restricted Access Subscription or Fee Access

A New Approach for Trust Calculation in MANET

Amit Chauhan, Maikal Rana

Abstract


Securing a Wireless Ad Hoc Network is one of the major concerns for the researchers. Due to wide-ranging characteristics of the Ad Hoc Networks, it is always at a risk to internal as well as external attacks. Many solutions have been proposed and currently being improved in this area. Most of these solutions involve encryption; secure routing, quality of service etc. Each of them is designed to operate in a particular situation, which may fail to work successfully in other scenarios. This paper offers an alternate approach to improve the trustworthiness of the neighbourhood nodes and secure the routing procedure. It helps in computing the trust in neighbours and selecting the most secured route from the available ones for communication. It also helps detecting the compromised node and virtually removing from the network.

Keywords


MANET, SID, Trust

Full Text:

PDF

References


Hao Yang, Xiaoqiao Meng, Songwu Lu, “Self-organized network-layer security in mobile ad hoc networks”. In Proc3rd ACM workshop on Wireless Security.

Kortuem G., Schneider J., Preuitt D., Thompson T.G.C., F‟ickas. S., Segall.Z, “Whwn Peer-to-Peer comes Face-toFace: Collaborative Peer-to-Peer Computing in Mobile Adhoc Networks”, 1st International Conference on Peer-to-Peer Computing, August, Linkoping, Swedan, 2001. Pp. 75-91

Alfarez Abdul-Rahman & Stephen Halles, “A Distributed Trust Model”, New Security Paradigms Workshop, Proceedings of the 1997 workshop on New security paradigms. pp. 48-60

Asad Amir Pirzada and Chris McDonald, “Establishing Trust in Pure Ad-hoc Networks”. ACM International Conference Proceeding Series; Vol. 56, Proceedings of the 27th conference on Australasian Computer Science- Volume 26. pp 47-54.

C. Perkins and E. Royer. Ad hoc on-demand distance vector routing. In Proc. IEEE Workshop on Mobile Computing Systems and Applications, 1999.

Catharina Candolin and Hannu H. Kari, “Distributing Incomplete Trust in Wireless Ad Hoc Networks”. In Proceedings of the New Security Paradigms Workshop, ACM, 1997.

Gambetta Diego (2000) „Can We Trust?‟, in Gambetta, Diego (ed.) “Trust Making and Breaking Cooperative Relations” electronic edition, Department of Sociology, University of Oxford, chapter 13, pp. 213-237.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.