Font Size: a A A

Enhancing trust aware routing in multi hop wireless ad hoc networks

Posted on:2007-11-28Degree:Ph.DType:Dissertation
University:University of Illinois at ChicagoCandidate:Abusalah, LoayFull Text:PDF
GTID:1448390005465446Subject:Engineering
Abstract/Summary:
In the next generation of wireless communication systems, there will be a tremendous need for the rapid deployment of independent mobile users communicating with each other and infrastructure units over wireless channels. A secure ad hoc network has to meet different security requirements, such as Confidentiality, Integrity, Availability, Authentication and Non-repudiation. Most of the current research work in MANET has focused on confidentiality and integrity.; This study aims at designing trust aware routing protocols for MANETs. We have studied the existing ad hoc wireless networks with a particular focus on their secure versions. The need for a trust mobile ad hoc network routing protocol has been pointed. We introduced the Trust Aware Routing Protocol (TARP) to enhance the trust in mobile Ad Hoc networks. The parameters considered in computing the trust level of a node in a given route include: software configuration, hardware configuration, battery power, credit history, exposure and organizational hierarchy. Each node evaluates its trust level based on the above parameters and includes it in computing the next hop node in the overall shortest route computation.; We based TARP on the basic idea of neighborhood trust where the trust-level of a node is based on its reputation among its neighbors. FL has been perceived to be an excellent choice for many trust control system applications since it mimics human control logic. Tuning the system can be done by changing the rule antecedents or conclusions, changing the centers of the input and/or output membership functions.; We studied TARP performance using different mobility models. Three important mobility models are considered, namely, Random Waypoint, Manhattan Grid and Reference Point Group Mobility (RPGM). We studied TARP performance using different network security attacks, such as black-hole, gray-hole, worm-hole and rushing attacks. TARP performance has been evaluated in OPNET. The results of implementing TARP in different mobile nodes network scenarios have been presented. The study shows that TARP is able to improve the security of an ad hoc network as well as reduce the routing traffic sent, while still maintaining an acceptable route discovery time.
Keywords/Search Tags:Ad hoc, Trust aware routing, Wireless, TARP
Related items