Research Article | Open Access | Download PDF
Volume 50 | Number 3 | Year 2017 | Article Id. IJETT-V50P249 | DOI : https://doi.org/10.14445/22315381/IJETT-V50P249
Secure and Reliable Routing Protocols for Heterogeneous Trust Management Multihop Wireless Networks
Miss Komatwar Tejashwi Deepak, Prof V.R Chirchi
Citation :
Miss Komatwar Tejashwi Deepak, Prof V.R Chirchi, "Secure and Reliable Routing Protocols for Heterogeneous Trust Management Multihop Wireless Networks," International Journal of Engineering Trends and Technology (IJETT), vol. 50, no. 3, pp. 296-299, 2017. Crossref, https://doi.org/10.14445/22315381/IJETT-V50P249
Abstract
The aim of this paper provides E-STAR used for establishing stable and reliable routes in heterogeneous multihop wireless networks. The payment system in E-STAR used to reward the nodes which relay others’ packets and charges those that send packets from source to destination.The trust values depends on nodes’ public-key certificates and then develop two routing protocols to direct communicate between them and then highly-trusted nodes having sufficient energy to reduce the probability of breaking the route. E-STAR can stimulate the nodes not only to relay packets, but also to maintain route stability. Experimental results show that E-STAR can secure the payment and trust calculation without error. Simulation results show that routing protocols can improve the packet delivery ratio and route stability.
Keywords
securingheterogeneous multihop wireless networks, packet dropping and selfishness attacks, trust systems, and secure routing protocols.
References
[1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
[2] C. Chou, D. Wei, C. Kuo, and K. Naik, “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, Jan. 2007.
[3] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Mis-behavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom’00, 255-265, Aug. 2000.
[4] S. Zhong, J. Chen, and R. Yang, “Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM ’03, vol. 3, pp. 1987-1997, Mar./Apr. 2003.
[5] M. Mahmoud and X. Shen, “PIS: A Practical Incentive System For mobile ad hoc network, sensor network, and delay-tolerant network. Multi-Hop Wireless Networks,” IEEE Trans. Vehicular Technology, vol. 59, no. 8, pp. 4012-4025, Oct. 2010.
[6] M. Mahmoud and X. Shen, “ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-Hop Wireless Networks,” IEEE Trans. Mobile Computing, vol. 10, no. 7, pp. 997-1010, July 2011.
[7] G. Theodorakopoulos and J.S. Baras, “On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 318-328, Feb. 2006.
[8] P. Velloso, R. Laufer, D. Cunha, O. Duarte, and G. Pujolle, “Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model,” IEEE Trans. Network and Service Management, vol. 7, no. 3, pp. 172-185, Sept. 2010.
[9] S. Lindsay, Y. Wei, H. Zhu, and K. Liu, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 305-317, Feb. 2006.
[10] M. Yu and K. Leung, “A Trustworthiness-Based QoS Routing Protocol for Wireless Ad Hoc Networks,” IEEE Trans. Wireless Comm., vol. 8, no. 4, pp. 1888-1898, Apr. 2009.