Secure and Reliable Routing Protocols for Heterogeneous Trust Management Multihop Wireless Networks
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2017 by IJETT Journal|
|Year of Publication : 2017|
|Authors : Miss Komatwar Tejashwi Deepak, Prof V.R Chirchi
|DOI : 10.14445/22315381/IJETT-V50P249|
Miss Komatwar Tejashwi Deepak, Prof V.R Chirchi "Secure and Reliable Routing Protocols for Heterogeneous Trust Management Multihop Wireless Networks", International Journal of Engineering Trends and Technology (IJETT), V50(5),296-299 August 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
The aim of this paper provides E-STAR used for establishing stable and reliable routes in heterogeneous multihop wireless networks. The payment system in E-STAR used to reward the nodes which relay others’ packets and charges those that send packets from source to destination.The trust values depends on nodes’ public-key certificates and then develop two routing protocols to direct communicate between them and then highly-trusted nodes having sufficient energy to reduce the probability of breaking the route. E-STAR can stimulate the nodes not only to relay packets, but also to maintain route stability. Experimental results show that E-STAR can secure the payment and trust calculation without error. Simulation results show that routing protocols can improve the packet delivery ratio and route stability.
 G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
 C. Chou, D. Wei, C. Kuo, and K. Naik, “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, Jan. 2007.
 S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Mis-behavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom’00, 255-265, Aug. 2000.
 S. Zhong, J. Chen, and R. Yang, “Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM ’03, vol. 3, pp. 1987-1997, Mar./Apr. 2003.
 M. Mahmoud and X. Shen, “PIS: A Practical Incentive System For mobile ad hoc network, sensor network, and delay-tolerant network. Multi-Hop Wireless Networks,” IEEE Trans. Vehicular Technology, vol. 59, no. 8, pp. 4012-4025, Oct. 2010.
 M. Mahmoud and X. Shen, “ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-Hop Wireless Networks,” IEEE Trans. Mobile Computing, vol. 10, no. 7, pp. 997-1010, July 2011.
 G. Theodorakopoulos and J.S. Baras, “On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 318-328, Feb. 2006.
 P. Velloso, R. Laufer, D. Cunha, O. Duarte, and G. Pujolle, “Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model,” IEEE Trans. Network and Service Management, vol. 7, no. 3, pp. 172-185, Sept. 2010.
 S. Lindsay, Y. Wei, H. Zhu, and K. Liu, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 305-317, Feb. 2006.
 M. Yu and K. Leung, “A Trustworthiness-Based QoS Routing Protocol for Wireless Ad Hoc Networks,” IEEE Trans. Wireless Comm., vol. 8, no. 4, pp. 1888-1898, Apr. 2009.
securingheterogeneous multihop wireless networks, packet dropping and selfishness attacks, trust systems, and secure routing protocols.