TY - GEN
T1 - Opinion based trust evaluation model in MANETs
AU - Poonam,
AU - Garg, K.
AU - Misra, M.
PY - 2011/8/29
Y1 - 2011/8/29
N2 - A secure routing mechanism is the basis of security in mobile ad hoc networks. Seeing that nodes have to share routing information in order to find the route to the destination, further an ad hoc network is an open setting where everyone can participate, trust is a key concept in secure routing mechanisms. In this paper, we propose a novel opinion based trust evaluation model to detect misbehaving nodes and further securing data transmission by avoiding such node from path selected. Misbehaving nodes are detected based on the node own direct observation, but in the circumstances of network failure as node congestion or collusion a well-behaving node can be misidentified. Therefore we require opinion of other nodes before proceeding to isolation of such misbehaving node. Source nodes maintain a path reliability index associated with each path to the intended destination. The most trustworthy and reliable path is selected by source node for forwarding data packets to the intended destination. We have evaluated the misbehaving node detection rate and the performance of our method along a number of parameters through simulation. Results show that our method increases the throughput of the network while also discovering a secure route.
AB - A secure routing mechanism is the basis of security in mobile ad hoc networks. Seeing that nodes have to share routing information in order to find the route to the destination, further an ad hoc network is an open setting where everyone can participate, trust is a key concept in secure routing mechanisms. In this paper, we propose a novel opinion based trust evaluation model to detect misbehaving nodes and further securing data transmission by avoiding such node from path selected. Misbehaving nodes are detected based on the node own direct observation, but in the circumstances of network failure as node congestion or collusion a well-behaving node can be misidentified. Therefore we require opinion of other nodes before proceeding to isolation of such misbehaving node. Source nodes maintain a path reliability index associated with each path to the intended destination. The most trustworthy and reliable path is selected by source node for forwarding data packets to the intended destination. We have evaluated the misbehaving node detection rate and the performance of our method along a number of parameters through simulation. Results show that our method increases the throughput of the network while also discovering a secure route.
UR - http://www.scopus.com/inward/record.url?scp=80051968187&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80051968187&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-22606-9_32
DO - 10.1007/978-3-642-22606-9_32
M3 - Conference contribution
AN - SCOPUS:80051968187
SN - 9783642226052
T3 - Communications in Computer and Information Science
SP - 301
EP - 312
BT - Contemporary Computing - 4th International Conference, IC3 2011, Proceedings
T2 - 4th International Conference on Contemporary Computing, IC3 2011
Y2 - 8 August 2011 through 10 August 2011
ER -