An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution
Secure routing of data in MANET (Mobile Ad-hoc Network) is an important concern to save the network from various attacks such as blackhole attack, wormhole attack, and gray-hole attack. MANET handles various sensitive data arrived from different applications in various fields and more prone to diffe...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2022, Vol.124 (1), p.333-348 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Secure routing of data in MANET (Mobile Ad-hoc Network) is an important concern to save the network from various attacks such as blackhole attack, wormhole attack, and gray-hole attack. MANET handles various sensitive data arrived from different applications in various fields and more prone to different attacks due to its dynamic characteristics. Since they are self-configured in nature and nodes in the network can freely move from one location area (LA) to another LA without any central control, the network topology can be varied from time to time. So there is a need for an efficient security framework to improve the performance of the network with three performance metrics such as throughput, packet delivery rate, and end-end delay. This paper presents a detailed security analysis of routing in MANET and proposed an efficient security framework to detect and isolate blackhole attack, wormhole attack, and grayhole attack from the network. These attacks harms the network than any other attacks in the environment during the routing process. The paper also presents an efficient detection scheme based on three QoS parameters such as shortest route, reliability rate, and a capability based protocol. The proposed scheme introduces threshold based countermeasure in each node to provide trustworthy route for the communication between nodes in the network. The threshold value helps to identify the trustworthiness of all the nodes connected in the environment. Throughout this process, the communication channel can be securely connected with source and target nodes to provide high secure environment. The proposed work is compared with the state-of-the art secure routing schemes such as cognitive energy efficient trusted routing technique (CEMT), trust based secure routing protocol (TSRM), trust aware routing framework in terms of throughput, packet delivery rate, and delay. Based on the findings of this study, a trusted based routing solution needs to be deployed, which can effectively isolate the attacks such as blackhole attacks, wormhole attacks, and gray-hole attacks from the network. |
---|---|
ISSN: | 0929-6212 1572-834X |
DOI: | 10.1007/s11277-021-09359-2 |