Abstract
Identification of a malicious node in the ad-hoc network is a very challenging issue due to some limitations, such as no base station or centralized server, dynamic topology, low computational capacity and limited battery power. In ad-hoc network each node having a limited range of communication to communicate with remaining nodes. Because of the limited range of communication, source node sends the packet/message with the help of intermediate neighbor nodes to the destination node. Dependency of other nodes poses security threats in ad-hoc networks. In this paper we are using Boneh-Franklin’s IBC authentication scheme before deployments of nodes in MANETs and after setup of ad-hoc network, we are using DSR protocol with trust value of each node to find out a secure route between source and destination nodes. Trust-based DSR protocol will find a route that is free from black hole nodes. From security analysis, we have shown that the proposed scheme is providing the secure communication in MANETs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2015) A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Front Comput Sci 9(2):280–296
Bhalaji N, Kanakeri AV, Chaitanya KP, Shanmugam A (2010) Trust based strategy to resist collaborative blackhole attack in manet. In: Information processing and management. Springer, pp 468–474
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Annual international cryptology conference. Springer, pp 213–229
Bruzgiene R, Narbutaite L, Adomkus T (2017) Manet network in internet of things system. Ad Hoc Netw 66:89–114
Deng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75
Dhanaraj RK, Krishnasamy L, Geman O, Izdrui DR (2021) Black hole and sink hole attack detection in wireless body area networks. Comput Mater Continua 68(2):1949–1965
Farahani G (2021) Black hole attack detection using k-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks. Secur Commun Netw 2021
Hu YC, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11(1–2):21–38
Johnson DB, Maltz DA, Broch J (2006) DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Netw 5(1):139–172
Juneja K (2022) Design of a novel micro-zone adaptive energy-trust evaluation active on-demand vector protocol to optimize communication in challenging and attacked mobile network. Int J Commun Syst e5328
Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y (2007) Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Netw Secur 5(3):338–346
Luo J, Fan M, Ye D (2008) Black hole attack prevention based on authentication mechanism. In: 11th IEEE Singapore international conference on communication systems, 2008. ICCS 2008. IEEE, pp 173–177
Mallarmé (2018)S The impressionists and edouard manet. In: Modern art and modernism: a critical anthology. Routledge, pp 39–44
Mandhare A, Kadam S (2019) Performance analysis of trust-based routing protocol for manet. In: Computing, communication and signal processing. Springer, pp 389–397
Mohanapriya M, Krishnamurthi I (2014) Trust based DSR routing protocol for mitigating cooperative black hole attacks in ad hoc networks. Arab J Sci Eng 39(3)
Ranjan R (2016) Cryptanalysis of secure routing among authenticated nodes in manets. In: Proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications (FICTA) 2016. Springer, pp 1–6
Rao GBN, Veeraiah D, Rao DS (2020) Power and trust based routing for manet using rrrp algorithm. In: 2020 2nd international conference on innovative mechanisms for industry applications (ICIMIA). IEEE, pp 160–164
Raza I, Hussain SA (2008) Identification of malicious nodes in an AODV pure ad hoc network through guard nodes. Comput Commun 31(9):1796–1802
Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM (2002) A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE international conference on network protocols 2002. IEEE, pp 78–87
Sathish M, Arumugam K, Pari SN, Harikrishnan V (2016) Detection of single and collaborative black hole attack in manet. In: International conference on wireless communications, signal processing and networking (WiSPNET). IEEE, pp 2040–2044
Shafi S, Ratnam DV (2022) A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs. Peer-to-Peer Netw Appl 15(1):576–591
Sharma N, Sharma M, Sharma DP (2020) A trust based scheme for spotting malicious node of wormhole in dynamic source routing protocol. In: 2020 4th international conference on I-SMAC (IoT in social, mobile, analytics and cloud)(I-SMAC). IEEE, pp 1232–1237
Srinivasan V (2021) Detection of black hole attack using honeypot agent-based scheme with deep learning technique on manet. Ingénierie des Systèmes d’Information 26(6)
Syed SA, Shahzad A (2022) Enhanced dynamic source routing for verifying trust in mobile ad hoc network for secure routing. Int J Electr Comput Eng 12(1):425
Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: Proceedings of the 1st ACM workshop on wireless security. ACM, pp 1–10
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ranjan, P., Ranjan, R. (2023). Trust-Based DSR Protocol for Secure Communication in Mobile Ad-hoc Networks. In: Das, S., Saha, S., Coello Coello, C.A., Bansal, J.C. (eds) Advances in Data-driven Computing and Intelligent Systems. Lecture Notes in Networks and Systems, vol 653. Springer, Singapore. https://doi.org/10.1007/978-981-99-0981-0_13
Download citation
DOI: https://doi.org/10.1007/978-981-99-0981-0_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-0980-3
Online ISBN: 978-981-99-0981-0
eBook Packages: EngineeringEngineering (R0)