skip to main content
10.1145/1143549.1143578acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
Article

TARP: trust-aware routing protocol

Published: 03 July 2006 Publication History

Abstract

Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a Trust-Aware Routing Protocol (TARP) for secure-trusted routing in mobile ad hoc networks. In TARP, security is inherently built into the routing protocol where each node evaluates the trust level of its neighbors based on a set of attributes and determines the route based on these attributes. This paper evaluates the proposed TARP protocols on two important attributes, the battery power and the software configuration. A secure route between a source and destination is established based on a confidence level prescribed by a user or application in terms of these attributes. Our performance evaluation shows that TARP is a robust and adaptive trust routing algorithm that reacts quickly and effectively to the dynamics of the network while still finding the shortest path to the destination. TARP is able to improve security and at the same time reduce the total routing traffic sent and received in the network by directing the traffic based on the requested sender attributes.

References

[1]
C. Siva Ram Murthy and B. S. Manoj, "Ad Hoc Wireless Networks: Architectures and Protocols," Prentice Hall, Chapter 7, 1994.
[2]
D. B. Johnson and D. A. Maltz, "Dynamic Sources Routing in ad Hoc Wireless Networks," Mobile Computing, 1996
[3]
Don Coppersmith and Markus Jakobsson, "Almost Hash Sequence Traversal," In proceeding of the Fourth Conference on Financial Cryptography (FC '02), Lecture Notes in computer Science, 2002.
[4]
Yih-Chun Hu and D. B. Johonson, "Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks," Proceedings of ACM SASN '04, October 20, 2004.
[5]
Yih-Chun Hu, A. Perrig, and D. B. Johonson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proceedings of ACM MobiCom '02, September 23-26, 2002.
[6]
S. Buchegger and Jean-Yves Le Boudec, "Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes-Fairness In Dynamic Ad-hoc Networks," Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), 2002.
[7]
W. Lou and W. Liu, and Y. Fang, "SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks," Proceedings of IEEE INFOCOM 2004, 2004.
[8]
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," Proceedings of IEEE Network Protocols, 2002, pp. 78--87, November 12-515, 2002.
[9]
S. Yi, P. Naldurg, and R. Kravets, "A Security-Aware Routing Protocol for Wireless Ad Hoc Networks," Proceedings of ACM MobiHoc '01, 2001.
[10]
Yih-Chun Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proceedings of IEEE Mobile Computing Systems and Applications, 2002, pp. 3--13, 2002.
[11]
D. B. Johnson, "Routing in Ad Hoc Networks of Mobile Hosts," Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, 1995.
[12]
A. Murat Fiskiran and Ruby B. Lee, "Performance Impact of Addressing Modes of Encryption Algorithms," IEEE International Conference on Computer Design (ICCD'01), pp. 542--545, 2001.
[13]
V. D. Park and M. S. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," Proceedings of IEEE INFOCOM '97, pp. 1405--1413, 1997.
[14]
C. E. Perkins and E. M. Royer, "Ad-hoc On-Demand Distance Vector Routing," Proceedings of 2nd IEEE Workshop Mobile Computer Systems and Applications, pp. 90--100, 1999.
[15]
OPNETUniversityProgram: http://www.opnet.com/services/university/
[16]
P. Michiardi and R. Molva, "CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks," IFIP-Communicatin and Multimedia Securtiy Conference 2002.
[17]
M. Guerrero Zapata, "Secure Ad hoc On-Demand Distance Vector Routing," Mobile Computing and Communications Review, vol. 6, no. 3.

Cited By

View all
  • (2019)Grid Base Energy Efficient Coverage Aware Routing Protocol for Wireless Sensor NetworkProceedings of the 2nd International Conference on Software Engineering and Information Management10.1145/3305160.3305199(49-53)Online publication date: 10-Jan-2019
  • (2018)SensoTrustInternational Journal of Distributed Sensor Networks10.5555/2836620.28366232015(3-3)Online publication date: 23-Dec-2018
  • (2018)Trust-Based Routing Mechanism in MANETMobile Networks and Applications10.1007/s11036-011-0328-018:5(666-677)Online publication date: 26-Dec-2018
  • Show More Cited By

Index Terms

  1. TARP: trust-aware routing protocol

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IWCMC '06: Proceedings of the 2006 international conference on Wireless communications and mobile computing
      July 2006
      2006 pages
      ISBN:1595933069
      DOI:10.1145/1143549
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 July 2006

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. ad hoc
      2. aware routing
      3. encryption
      4. power
      5. trust

      Qualifiers

      • Article

      Conference

      IWCMC06
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)Grid Base Energy Efficient Coverage Aware Routing Protocol for Wireless Sensor NetworkProceedings of the 2nd International Conference on Software Engineering and Information Management10.1145/3305160.3305199(49-53)Online publication date: 10-Jan-2019
      • (2018)SensoTrustInternational Journal of Distributed Sensor Networks10.5555/2836620.28366232015(3-3)Online publication date: 23-Dec-2018
      • (2018)Trust-Based Routing Mechanism in MANETMobile Networks and Applications10.1007/s11036-011-0328-018:5(666-677)Online publication date: 26-Dec-2018
      • (2018)An energy-efficient and security aware route selection protocol for wireless sensor networksSecurity and Communication Networks10.1002/sec.9157:11(2015-2038)Online publication date: 20-Dec-2018
      • (2017)Trust-BZB: Towards a Trust-Driven Routing in Vehicular NetworksVehicular Ad-Hoc Networks for Smart Cities10.1007/978-981-10-3503-6_7(85-96)Online publication date: 22-Mar-2017
      • (2015)SensoTrust: Trustworthy Domains in Wireless Sensor NetworksInternational Journal of Distributed Sensor Networks10.1155/2015/48482011:7(484820)Online publication date: Jan-2015
      • (2010)New trust based security approach for ad-hoc networks2010 3rd International Conference on Computer Science and Information Technology10.1109/ICCSIT.2010.5565146(428-431)Online publication date: Jul-2010
      • (2009)Securing data through avoidance routingProceedings of the 2009 workshop on New security paradigms workshop10.1145/1719030.1719046(115-124)Online publication date: 8-Sep-2009
      • (2008)Towards Identifying Features of Trust in Mobile Ad Hoc NetworkProceedings of the 2008 Second Asia International Conference on Modelling & Simulation (AMS)10.1109/AMS.2008.113(271-276)Online publication date: 13-May-2008
      • (2007)Trust-based Framework for Security Enhancement of Wireless Sensor Networks2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications10.1109/IDAACS.2007.4488496(623-627)Online publication date: Sep-2007

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media