Trust-Based DSR Protocol for Secure Communication in Mobile Ad-hoc Networks

  • Conference paper
  • First Online:
Advances in Data-driven Computing and Intelligent Systems

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 653))

  • 302 Accesses

Abstract

Identification of a malicious node in the ad-hoc network is a very challenging issue due to some limitations, such as no base station or centralized server, dynamic topology, low computational capacity and limited battery power. In ad-hoc network each node having a limited range of communication to communicate with remaining nodes. Because of the limited range of communication, source node sends the packet/message with the help of intermediate neighbor nodes to the destination node. Dependency of other nodes poses security threats in ad-hoc networks. In this paper we are using Boneh-Franklin’s IBC authentication scheme before deployments of nodes in MANETs and after setup of ad-hoc network, we are using DSR protocol with trust value of each node to find out a secure route between source and destination nodes. Trust-based DSR protocol will find a route that is free from black hole nodes. From security analysis, we have shown that the proposed scheme is providing the secure communication in MANETs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Brazil)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (Brazil)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (Brazil)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2015) A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Front Comput Sci 9(2):280–296

    Article  MathSciNet  Google Scholar 

  2. Bhalaji N, Kanakeri AV, Chaitanya KP, Shanmugam A (2010) Trust based strategy to resist collaborative blackhole attack in manet. In: Information processing and management. Springer, pp 468–474

    Google Scholar 

  3. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Annual international cryptology conference. Springer, pp 213–229

    Google Scholar 

  4. Bruzgiene R, Narbutaite L, Adomkus T (2017) Manet network in internet of things system. Ad Hoc Netw 66:89–114

    Google Scholar 

  5. Deng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75

    Article  Google Scholar 

  6. Dhanaraj RK, Krishnasamy L, Geman O, Izdrui DR (2021) Black hole and sink hole attack detection in wireless body area networks. Comput Mater Continua 68(2):1949–1965

    Article  Google Scholar 

  7. Farahani G (2021) Black hole attack detection using k-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks. Secur Commun Netw 2021

    Google Scholar 

  8. Hu YC, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11(1–2):21–38

    Article  Google Scholar 

  9. Johnson DB, Maltz DA, Broch J (2006) DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Netw 5(1):139–172

    Google Scholar 

  10. Juneja K (2022) Design of a novel micro-zone adaptive energy-trust evaluation active on-demand vector protocol to optimize communication in challenging and attacked mobile network. Int J Commun Syst e5328

    Google Scholar 

  11. Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y (2007) Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Netw Secur 5(3):338–346

    Google Scholar 

  12. Luo J, Fan M, Ye D (2008) Black hole attack prevention based on authentication mechanism. In: 11th IEEE Singapore international conference on communication systems, 2008. ICCS 2008. IEEE, pp 173–177

    Google Scholar 

  13. Mallarmé (2018)S The impressionists and edouard manet. In: Modern art and modernism: a critical anthology. Routledge, pp 39–44

    Google Scholar 

  14. Mandhare A, Kadam S (2019) Performance analysis of trust-based routing protocol for manet. In: Computing, communication and signal processing. Springer, pp 389–397

    Google Scholar 

  15. Mohanapriya M, Krishnamurthi I (2014) Trust based DSR routing protocol for mitigating cooperative black hole attacks in ad hoc networks. Arab J Sci Eng 39(3)

    Google Scholar 

  16. Ranjan R (2016) Cryptanalysis of secure routing among authenticated nodes in manets. In: Proceedings of the 5th international conference on frontiers in intelligent computing: theory and applications (FICTA) 2016. Springer, pp 1–6

    Google Scholar 

  17. Rao GBN, Veeraiah D, Rao DS (2020) Power and trust based routing for manet using rrrp algorithm. In: 2020 2nd international conference on innovative mechanisms for industry applications (ICIMIA). IEEE, pp 160–164

    Google Scholar 

  18. Raza I, Hussain SA (2008) Identification of malicious nodes in an AODV pure ad hoc network through guard nodes. Comput Commun 31(9):1796–1802

    Article  Google Scholar 

  19. Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM (2002) A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE international conference on network protocols 2002. IEEE, pp 78–87

    Google Scholar 

  20. Sathish M, Arumugam K, Pari SN, Harikrishnan V (2016) Detection of single and collaborative black hole attack in manet. In: International conference on wireless communications, signal processing and networking (WiSPNET). IEEE, pp 2040–2044

    Google Scholar 

  21. Shafi S, Ratnam DV (2022) A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs. Peer-to-Peer Netw Appl 15(1):576–591

    Article  Google Scholar 

  22. Sharma N, Sharma M, Sharma DP (2020) A trust based scheme for spotting malicious node of wormhole in dynamic source routing protocol. In: 2020 4th international conference on I-SMAC (IoT in social, mobile, analytics and cloud)(I-SMAC). IEEE, pp 1232–1237

    Google Scholar 

  23. Srinivasan V (2021) Detection of black hole attack using honeypot agent-based scheme with deep learning technique on manet. Ingénierie des Systèmes d’Information 26(6)

    Google Scholar 

  24. Syed SA, Shahzad A (2022) Enhanced dynamic source routing for verifying trust in mobile ad hoc network for secure routing. Int J Electr Comput Eng 12(1):425

    MathSciNet  Google Scholar 

  25. Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: Proceedings of the 1st ACM workshop on wireless security. ACM, pp 1–10

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pratik Ranjan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ranjan, P., Ranjan, R. (2023). Trust-Based DSR Protocol for Secure Communication in Mobile Ad-hoc Networks. In: Das, S., Saha, S., Coello Coello, C.A., Bansal, J.C. (eds) Advances in Data-driven Computing and Intelligent Systems. Lecture Notes in Networks and Systems, vol 653. Springer, Singapore. https://doi.org/10.1007/978-981-99-0981-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-0981-0_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-0980-3

  • Online ISBN: 978-981-99-0981-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation