Analysis of Existing Trust Based Routing Schemes Used in Wireless Network

Analysis of Existing Trust Based Routing Schemes Used in Wireless Network

Kajal S. Patel (Government Engineering College, Rajkot, India) and Jagdish S. Shah (Government Engineering College, Patan, India)
Copyright: © 2016 |Pages: 15
DOI: 10.4018/IJISP.2016040103
OnDemand PDF Download:
No Current Special Offers


Wireless networks are vulnerable to many security attacks as they use wireless media and a node has to depend on unknown intermediate nodes for data transmission. Cryptographic algorithms used for wired network cannot work efficiently in wireless network, as in wireless network nodes are mobile and battery operated. Nodes may also have limited resources available. So, to detect malicious activities on node and improve stability of route while routing in mobile ad hoc network, trust-based routing is used. Communication parameters used in calculating trust value in most of existing trust based protocol (wireless network) are number of successful session or packet forwarded between two nodes, number of packet dropped or delayed, response time, battery life, mobility of node etc. This paper provides analysis of existing trust based routing by surveying current “sate of the art” work in this area. This paper also proposed a new parameter (number of route error message sent by a node) of a wireless node which can affect the network performance and can be used to calculate trust value.
Article Preview

Attacks On Routing And Trust Based Routing

Attacks On Routing Of Wireless Ad Hoc Network

The mobile ad hoc network is vulnerable to many security attacks. They are mainly categorized into two Active attacks and Passive attacks. Active attacks are those which alter the content of packet and thereby disturbing normal functioning of network. Active attacks can be carried out by an external node or an internal compromised node which perform action like impersonation (masquerading or spoofing), modification, fabrication and replication. Passive attacks cannot be easily detected as attacker will not change the content of packet and the network operation is also not affected. These type of attacks violet confidentiality requirement of network communication. The only way to avoid passive attack in MANET is use of encryption to hide the content of packets. These active and passive attacks can be performed at any layer of network. In this paper we are concentrating on attacks on routing in Mobile Ad hoc network. They are Resource Consumption attack, Rushing attack, Black hole attack, Grey hole attack etc. (Singh, 2009).

Attacks On Trust Based Routing Approaches

The Trust based approaches actually not prevent the attack but they detect the attacker node and avoid them in active route. The trust based scheme are also vulnerable to various trust based attacks like Unfair rating attack, unfair rating attack, Sybil attack, new comer attack etc (Lizi Zhang, 2012).

Complete Article List

Search this Journal:
Open Access Articles
Volume 15: 4 Issues (2021): 2 Released, 2 Forthcoming
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing