6 research outputs found

    Maintaining Path Stability with Node Failure in Mobile Ad Hoc Networks

    Get PDF
    AbstractAs the demand for mobile ad hoc wireless network (MANET) applications grows, so does their use for many important services where reliability and stability of the communication paths are of great importance. Therefore, a MANET must be able to establish reliable communication channels which are protected by failure recovery protocols. One approach for existing failure recovery protocols is based on using backup paths, or multi-paths. This technique provides for more stable communication channels for wireless services, in particular for MANET applications. But work on such multi-path protocols has focused on stability in the presence of link failure for MANETs. In this paper, we extend such protocols to maintain connection stability in the presence of node failure. Our work is focused on protecting the route of mobile wireless communications in the presence of node failure in order to improve their use in MANETs applications by discovering efficient stable communication channels with longer lifetimes and increased number of packets delivered

    A secure method to detect wormhole attack in mobile adhoc network

    Get PDF
    According to recent advances in wireless telecommunications, the performance and use of wireless technologies has increased extremely. In this study concerned on the Mobile Ad-hoc Network (MANET) is a collection of self-configuring mobile node without any infrastructure. There are different security flaws and attacks on the routing protocols in the MANET. One of the critical threats is the wormhole attacks, which have attracted a great deal of attention over the years. The wormhole attack can affect the performance of different routing protocols. During this attack, a malicious node captures packets from one location in the network, and “tunnels” them to another malicious node at a distant point, which replays them locally. This study presents a review of the most important solutions for counteracting wormhole attacks, as well as presents proposed method on DSR routing protocol for detecting them. The performance of the proposed method was examined through ns-2 simulations. Hence, the results show that proposed method can detect this serious attack in a Mobile Adhoc Network

    Evaluated reputation-based trust for WSN security

    Get PDF
    During the last years, Wireless Sensor Networks (WSNs) and its applications have obtained considerable momentum. However, security and power limits of WSNs are still important matters. Many existing approaches at most concentrate on cryptography to improve data authentication and integrity but this addresses only a part of the security problem without consideration for high energy consumption. Monitoring behavior of node neighbors using reputation and trust models improves the security of WSNs and maximizes the lifetime for it. However, a few of previous studies take into consideration security threats and energy consumption at the same time. Under these issues Modified Reputation-Based Trust model proposed and optimized for security strength. During evaluation of the model with well-known models two security threats (oscillating and collusion) were applied in order to measure the accuracy, scalability, trustworthiness and energy consumption. As a result, the effects of collusion and oscillating on proposed model are minimized and energy consumption for dynamic networks reduced. Also, simulation results show that MRT has better average accuracy and less average path length than other mechanisms, due to the security and energy aware. Keywords: Wireless Sensor Networks (WSNs), Collusion, Oscillating, Power Consumption, Trust and Reputation Model

    Node activity based trust and reputation estimation approach for secure and QoS routing in MANET

    Get PDF
    Achieving safe and secure communication in MANETs is a key challenge due to its dynamic nature. A number of security studies disclose that reputation management systems are able to be effectual with less overhead. The reputation of a node is calculated by using automated assessment algorithms depend on predefined trust scheme. This paper proposes a Node Activity-based Trust and Reputation estimation (NA-TRE) approach for the security and QoS routing in MANET. NA-TRE aims to find trust estimation and reputation of a node. The NA-TRE approach monitors the activity changes, packet forwarding or dropping in a node to find the status of the node. The various activities of a node like Normal State (NS), Resource Limitation State (RS) and Malicious State (MS) are monitored. This status of a node is helpful in computing trust and reputation. In this paper NA-TRE approach compared with existing protocols AODV, FACE and TMS to evaluate the efficiency of MANET. The experiment results show that 20% increasing of throughput, 10% decrease of overhead and end to end delay

    ActiveTrust : Secure and Trustable Routing in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To conquer that challenge, an active detection-based security and trust routing scheme named ActiveTrust is proposed for WSNs. The most important innovation of ActiveTrust is that it avoids black holes through the active creation of a number of detection routes to quickly detect and obtain nodal trust and thus improve the data route security. More importantly, the generation and the distribution of detection routes are given in the ActiveTrust scheme, which can fully use the energy in non-hotspots to create as many detection routes as needed to achieve the desired security and energy efficiency. Both comprehensive theoretical analysis and experimental results indicate that the performance of the ActiveTrust scheme is better than that of the previous studies. ActiveTrust can significantly improve the data route success probability and ability against black hole attacks and can optimize network lifetime
    corecore