Analytical models for trust based routing protocols in wireless ad hoc networks

  • Authors:
  • Deepika Kukreja;Umang Singh;B. V.R. Reddy

  • Affiliations:
  • USIT, G.G.S.I.P.U., Delhi, India;USIT, G.G.S.I.P.U., Delhi, India;USIT, G.G.S.I.P.U., Delhi, India

  • Venue:
  • ACM SIGSOFT Software Engineering Notes
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In Wireless Ad Hoc Network environment, there are three ways to understand a routing protocol: (i) monitoring, (ii) simulation and (iii) modeling. In this paper, the different trust based secure routing protocols used in wireless ad hoc networks are analyzed, modeled and described by incorporating process flow diagrams. These process flow diagrams represent stepwise work flow activities and actions. It shows the overall flow of control of a process, program or a protocol. This paper focuses on the security aspects of routing by incorporating trust parameter into account and also highlights methodology used in secure routing protocols. Such protocols have been categorized based on the model used for enforcing security, methodology and information for making effective routing decisions. In this paper, we model, discuss and analyze trust based secure ad hoc routing schemes which do not require each network node to work in promiscuous mode. We propose and design a new protocol - Trust based Routing using Dominating Set Approach (TRDSA) which overcomes the shortcomings of existing protocols.