A trusted security approach to detect and isolate routing attacks in mobile ad hoc networks

IF 0.9 4区 工程技术 Q3 ENGINEERING, MULTIDISCIPLINARY
{"title":"A trusted security approach to detect and isolate routing attacks in mobile ad hoc networks","authors":"","doi":"10.1016/j.jer.2023.100149","DOIUrl":null,"url":null,"abstract":"<div><h3>Background</h3><div>Secure routing is of utmost importance in protecting mobile devices from external threats. However, the dynamic characteristics of Mobile Ad hoc Networks (MANETs) pose significant challenges in achieving a secure routing path.</div></div><div><h3>Objectives</h3><div>This paper aims to propose a Trust and Anonymous Model (TAM) for efficient and secure data routing in MANETs. The objective is to address the limitations of existing routing approaches and enhance the security of the network.</div></div><div><h3>Methods</h3><div>The TAM protocol is designed with a Two-Tier Security Mechanism (TTSM). In the first level of security, trustable nodes are selected based on their ability to process control messages. The recommended trust value of a node is determined by estimating the speed at which it processes control messages, with higher energy nodes being considered more trustable. In the second level of security, the original node identity is concealed, and data is transmitted through selected trusted nodes with duplicate identities generated using a factorial recursive function. This ensures secure transmission, as malicious observers are unable to identify participating nodes in the routing operation.</div></div><div><h3>Results</h3><div>The proposed TAM model is evaluated and compared with state-of-the-art schemes such as A Multi-attribute-based Trusted Routing for Embedded devices (EMBTR) and a cognitive energy-efficient-based trusted model (CEMT). Experimental evaluation demonstrates that the TAM model achieves better performance in terms of energy consumption, delay, packet delivery rate, and false node detection rate, thereby improving network optimality.</div></div><div><h3>Conclusion</h3><div>The Trust and Anonymous Model (TAM) with its Two-Tier Security Mechanism (TTSM) presents a promising approach for secure data routing in MANETs. By selecting trustable nodes and utilizing duplicate identities, the TAM model enhances network security while achieving improved performance compared to existing schemes. The findings of this study contribute to the advancement of secure routing techniques in MANETs and provide insights for future research in this domain.</div></div>","PeriodicalId":48803,"journal":{"name":"Journal of Engineering Research","volume":null,"pages":null},"PeriodicalIF":0.9000,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering Research","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2307187723001578","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

Abstract

Background

Secure routing is of utmost importance in protecting mobile devices from external threats. However, the dynamic characteristics of Mobile Ad hoc Networks (MANETs) pose significant challenges in achieving a secure routing path.

Objectives

This paper aims to propose a Trust and Anonymous Model (TAM) for efficient and secure data routing in MANETs. The objective is to address the limitations of existing routing approaches and enhance the security of the network.

Methods

The TAM protocol is designed with a Two-Tier Security Mechanism (TTSM). In the first level of security, trustable nodes are selected based on their ability to process control messages. The recommended trust value of a node is determined by estimating the speed at which it processes control messages, with higher energy nodes being considered more trustable. In the second level of security, the original node identity is concealed, and data is transmitted through selected trusted nodes with duplicate identities generated using a factorial recursive function. This ensures secure transmission, as malicious observers are unable to identify participating nodes in the routing operation.

Results

The proposed TAM model is evaluated and compared with state-of-the-art schemes such as A Multi-attribute-based Trusted Routing for Embedded devices (EMBTR) and a cognitive energy-efficient-based trusted model (CEMT). Experimental evaluation demonstrates that the TAM model achieves better performance in terms of energy consumption, delay, packet delivery rate, and false node detection rate, thereby improving network optimality.

Conclusion

The Trust and Anonymous Model (TAM) with its Two-Tier Security Mechanism (TTSM) presents a promising approach for secure data routing in MANETs. By selecting trustable nodes and utilizing duplicate identities, the TAM model enhances network security while achieving improved performance compared to existing schemes. The findings of this study contribute to the advancement of secure routing techniques in MANETs and provide insights for future research in this domain.
检测和隔离移动特设网络中路由攻击的可信安全方法
背景安全路由对于保护移动设备免受外部威胁至关重要。然而,移动 Ad hoc 网络(MANET)的动态特性给实现安全路由路径带来了巨大挑战。方法 TAM 协议采用双层安全机制(TTSM)设计。在第一层安全机制中,根据节点处理控制信息的能力来选择可信任的节点。节点的推荐信任值通过估算其处理控制信息的速度来确定,能量越高的节点越值得信任。在第二级安全中,原始节点身份被隐藏起来,数据通过选定的受信任节点传输,并使用阶乘递归函数生成重复身份。结果对提出的 TAM 模型进行了评估,并与嵌入式设备基于多属性的可信路由(EMBTR)和基于认知能效的可信模型(CEMT)等最先进的方案进行了比较。实验评估表明,TAM 模型在能耗、延迟、数据包交付率和错误节点检测率等方面都取得了更好的性能,从而提高了网络的优化性。通过选择可信任的节点和利用重复身份,TAM 模型增强了网络安全性,同时与现有方案相比性能得到了提高。本研究的发现有助于促进城域网安全路由技术的发展,并为该领域的未来研究提供了启示。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Engineering Research
Journal of Engineering Research ENGINEERING, MULTIDISCIPLINARY-
CiteScore
1.60
自引率
10.00%
发文量
181
审稿时长
20 weeks
期刊介绍: Journal of Engineering Research (JER) is a international, peer reviewed journal which publishes full length original research papers, reviews, case studies related to all areas of Engineering such as: Civil, Mechanical, Industrial, Electrical, Computer, Chemical, Petroleum, Aerospace, Architectural, Biomedical, Coastal, Environmental, Marine & Ocean, Metallurgical & Materials, software, Surveying, Systems and Manufacturing Engineering. In particular, JER focuses on innovative approaches and methods that contribute to solving the environmental and manufacturing problems, which exist primarily in the Arabian Gulf region and the Middle East countries. Kuwait University used to publish the Journal "Kuwait Journal of Science and Engineering" (ISSN: 1024-8684), which included Science and Engineering articles since 1974. In 2011 the decision was taken to split KJSE into two independent Journals - "Journal of Engineering Research "(JER) and "Kuwait Journal of Science" (KJS).
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信