Secure and Reliable Routing Protocols for Heterogeneous Trust Management Multihop Wireless Networks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-50 Number-5
Year of Publication : 2017
Authors : Miss Komatwar Tejashwi Deepak, Prof V.R Chirchi
DOI :  10.14445/22315381/IJETT-V50P249

Citation 

Miss Komatwar Tejashwi Deepak, Prof V.R Chirchi "Secure and Reliable Routing Protocols for Heterogeneous Trust Management Multihop Wireless Networks", International Journal of Engineering Trends and Technology (IJETT), V50(5),296-299 August 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
The aim of this paper provides E-STAR used for establishing stable and reliable routes in heterogeneous multihop wireless networks. The payment system in E-STAR used to reward the nodes which relay others’ packets and charges those that send packets from source to destination.The trust values depends on nodes’ public-key certificates and then develop two routing protocols to direct communicate between them and then highly-trusted nodes having sufficient energy to reduce the probability of breaking the route. E-STAR can stimulate the nodes not only to relay packets, but also to maintain route stability. Experimental results show that E-STAR can secure the payment and trust calculation without error. Simulation results show that routing protocols can improve the packet delivery ratio and route stability.

Reference
[1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
[2] C. Chou, D. Wei, C. Kuo, and K. Naik, “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, Jan. 2007.
[3] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Mis-behavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom’00, 255-265, Aug. 2000.
[4] S. Zhong, J. Chen, and R. Yang, “Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM ’03, vol. 3, pp. 1987-1997, Mar./Apr. 2003.
[5] M. Mahmoud and X. Shen, “PIS: A Practical Incentive System For mobile ad hoc network, sensor network, and delay-tolerant network. Multi-Hop Wireless Networks,” IEEE Trans. Vehicular Technology, vol. 59, no. 8, pp. 4012-4025, Oct. 2010.
[6] M. Mahmoud and X. Shen, “ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-Hop Wireless Networks,” IEEE Trans. Mobile Computing, vol. 10, no. 7, pp. 997-1010, July 2011.
[7] G. Theodorakopoulos and J.S. Baras, “On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 318-328, Feb. 2006.
[8] P. Velloso, R. Laufer, D. Cunha, O. Duarte, and G. Pujolle, “Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model,” IEEE Trans. Network and Service Management, vol. 7, no. 3, pp. 172-185, Sept. 2010.
[9] S. Lindsay, Y. Wei, H. Zhu, and K. Liu, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 305-317, Feb. 2006.
[10] M. Yu and K. Leung, “A Trustworthiness-Based QoS Routing Protocol for Wireless Ad Hoc Networks,” IEEE Trans. Wireless Comm., vol. 8, no. 4, pp. 1888-1898, Apr. 2009.

Keywords
securingheterogeneous multihop wireless networks, packet dropping and selfishness attacks, trust systems, and secure routing protocols.