A Cooperative Trust Bit-Map Routing Protocol Using the GA Algorithm for Reducing the Damages from the InTs in WANETs
نویسندگان
چکیده
The wireless ad hoc network (WANET) is a type of wireless network in which some nodes are decentralized as well as self-organized in a wireless local area network. In recent years, insider threats increasingly damage the works not only in computer information systems, but also many wireless communications systems e.g. WANETs. We must take into consideration that the majority of insider threats come from users who are fully authorized to use the WANET systems they are accessing. Due to these kinds of situations, a Cooperative Trust Bit-Map Routing Protocol (CTBRP) using an n-Bits Cooperative Trust Bit-Map Routing Table (n-CTBRT) is proposed to be used against insider threats in WANETs. This CTBRP proposes using a Generic Algorithm in this paper for establishing cooperative evaluating trust values. Each node evaluates her/his neighboring nodes in order to reduce the untrusted routes. Thus, it could reduce the damage away from the insider threats in a WANET. This approach is one of behavioral-based techniques. In fact, the compromised nodes or selfish nodes or non-honest nodes will be evaluated as having low trust values or scores. Once a relay node had been compromised or damaged by insider threats in this WANET, the communication system will use this approach to find out about it according to its abnormal behaviors. Therefore, the proposed routing protocol in the WANET could evaluate the wrongful behaviors of the compromised node or a selfish node efficiently in order to prevent InTs.
منابع مشابه
An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کاملComparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET
Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....
متن کاملA New Routing Algorithm for Vehicular Ad-hoc Networks based on Glowworm Swarm Optimization Algorithm
Vehicular ad hoc networks (VANETs) are a particular type of Mobile ad hoc networks (MANET) in which the vehicles are considered as nodes. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles. In this paper, a new routing protocol based on glowworm swarm optimization algorithm is provided. Using the g...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملImproving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR
Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Internet Serv. Inf. Secur.
دوره 4 شماره
صفحات -
تاریخ انتشار 2014