An Intelligent Efficient Secure Routing Protocol for MANET

نویسندگان

  • Shailender Gupta
  • Chander Kumar
چکیده

The security issues are more complex and challenging in Mobile Ad hoc Networks (MANETs) than other conventional wireless networks due to peer to peer behavior of the participating nodes, absence of centralized routers and routing through intermediate nodes. For successful communication between a pair of source and destination it is vital that the intermediate nodes be trustworthy and don’t drop packets. Nodes in an ad hoc network may not be trustworthy either due to selfishness created by power loss or due to maliciousness relating to rogue intentions. A node that was earlier trust worthy may no longer be so at later stages due to loss of power making the continuous dynamic evaluation of trust a necessity. Also the security requirements may vary as per the conditions on the scenario. This paper proposes an intelligent protocol that takes care of both selfishness and maliciousness by evaluating the trust dynamically. The protocol is able to adjust the trust level requirement as per the demand of the situation and can work in various levels of insecure environments. With the help of exhaustive simulations, the performance of this protocol has been demonstrated and compared with the normal AODV protocol in standard lab environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Power Optimized Secure AODV Routing Protocol Based on Mobile Agents

In Mobile ad-hoc networks (MANET), route optimization and power conservation are the critical issues and a requirement of an efficient routing protocol is always there to make the MANET reliable and tackle these issues. In recent years, researchers have proposed various routing algorithms to save the resources of the node such as energy, bandwidth, and computing power etc. Power Conservation is...

متن کامل

A New Method to Reduce Energy Consumption in Manet Network Routing based on OLSR Protocol and Genetic Algorithm

Mobile Ad Hoc Networks (MANET) can be considered as a class of unstructured networks created by a number of autonomous wireless and sensor nodes. The inherent characteristics of such networks have made specific applications, such as multimedia transfer and challenging. Basically, the functionality of a node and very few resources directly affect the delivery of packets which depends on the ...

متن کامل

Intelligent Framework for Qos Optimization in Manet Using Soft Computing Models

Mobile Adhoc Networks (MANET) is a heterogeneous self configuring networks that changes topology often. Due to mobility nature of wireless nodes, routing information needs to be frequently updated. As nodes are wireless in nature, there exists enormous security threats that disturb the deployment and maintenance of MANET. To alleviate such problems, secure agent based multicast routing protocol...

متن کامل

Energy Efficient, Secure and Stable Routing Protocol for MANET

Mobile Adhoc Network (MANET) is characterized by mobile hosts, dynamic topology, multi-hop wireless connectivity and infrastructureless ad hoc environment. The adhoc environment is accessible to both legitimate network users and malicious attackers. Moreover, as the wireless links are highly error prone and can go down frequently due to mobility of nodes, therefore, energy efficient, secure and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013