Anda di halaman 1dari 15

Rajeev Institute of Technology

Department of Computer science and Engineering

“A Trust Based Routing Protocol


For Ad Hoc And Sensor Networks”

PRESENTED BY : UNDER THE GUIDANCE OF :


BHUMIKA JAIN H B 4RA14CS014
DEEPU K 4RA14CS024 Mr. PRAMOD H B
GEETHANJALI S 4RA14CS026 Assistant Professor
MONISHA L GOWDA 4RA14CS044 Dept. of CSE
CONTENTS
•ABSTRACT
• INTRODUCTION
•PROBLEM STATEMENT
•LITERATURE SURVEY
•EXISTING SYSTEM
•PROPOSED SYSTEM
•ARCHITECTURE
•SOFTWARE REQUIREMENT SPECIFICATION
•REFERENCES
ABSTRACT

•The technology of wired network has been changed to the wireless


network . There are many advantages of wireless network over wired
network ,that wireless has better mobility and reliability than wired.
•One of the main advantage is we can walk around freely in a network area
and accesses internet . In the wireless network , Security is one of the major
challenging issues in a mobile ad hoc network(MANET).Wireless sensor and
Ad hoc networks are gaining a lot of attention in research due to there
importance in enabling mobile wireless nodes to communicate routing
protocol in wireless sensor and Ad hoc networks discover a multi hop route
between source and destination nodes.
•The TRAS : A TRUST BASED ROUTING PROTOCOL FOR AD HOC AND
SENSOR NETWORKS.
•In the TRAS protocol a trust is an important factor for successful
communication.
This paper survey on routing protocol and trust in MANETs.
INTRODUCTION

In a mobile ad hoc network (MANET), nodes cooperate to dynamically establish


the network configuration to find and maintain routes for message exchange.
 A similar strategy is used in wireless sensor networks (WSNs) which are
considered a derivative of MANETs with some differences.
In both networks, nodes are responsible for forwarding packets for each other to
facilitate multi-hop communication between other nodes that are not in direct
transmission range.
However the lack of a fixed topology in these networks leads to significant
challenges to the routing process. Particularly, when the issue of trust among the
nodes is in question. Routing protocols designed for ad hoc networks such as the
Dynamic Source Routing protocol (DSR), and the Ad hoc On-Demand Distance
Vector (AODV) protocol are generally effective and efficient.
However, different nodes exhibit different measures of trust and reliability to
effectively and correctly participate in the routing and data transmission process.
 
Infrastructre-less network

A wireless ad hoc network is an autonomous system consisting of nodes,


which may or may not be mobile, connected with wireless links and without
using pre-existing communication infrastructure or central control
MANET
A mobile ad hoc network (MANET) is generally defined as a network that has
many free or autonomous nodes, often composed of mobile devices or other
mobile pieces, that can arrange themselves in various ways and operate
without strict top-down network administration.
Advantages
Multi hop routing
Dynamic topology
PROBLEM STATEMENT

•In multi hop wireless networks, routing protocol is used to transfer packets between
nodes via intermediate nodes.
•Basically routing protocol is divided into three phases: route discovery, packet
forwarding and route maintenance.
•The route discoveries may incur network-wide flooding of routing requests that can
consume a considerable amount of the network resources such as energy.
•Malicious nodes perform malicious activities like packet dropping, flooding, and
packet delaying etc., to utilize the limited resources of a node.
• Breaking the routes increases the packet delivery latency and may cause network
partitioning resulting in failure of the multi hop communications.
LITERATURE SURVEY

Deepika Kukreja , Umang Singh , and B. V. R. Reddy proposed Index term


CONFIDANT (Cooperation of Nodes, Fairness In Dynamic Ad hoc Networks)
Limitations : The protocols fail to work when malicious nodes collude.

Mrs. S. Geetha Dr. G. Geetha Ramani proposed Trusted Destination Sequenced


Distance Vector (TDSDV) Routing Protocol
Limitations : Lack of security
EXISTING SYSTEM
Routing protocols were investigated and modified and new protocols were
introduced to enhance the routing process in such networks . Many of these
protocols provide some solution to parts of the problem.
1.A trusted AODV (TAODV) routing protocol was proposed . Trust is represented by
an opinion as used in subjective logic.
•The nodes authenticate each other by verifying the certificate, which is an added
overhead. The protocol is unable to detect an internal attack
2 .A trusted routing protocol, called dynamic mutual trust based routing (DMTR),
based on the dynamic source routing (DSR) protocol, was proposed
•Exchanges of trust tables between nodes requires lots of bandwidth, and increases
the overhead
3 . Protocol called CORE (Collaborative Reputation) was proposed that has a
monitoring mechanism complemented by a reputation functionality
•A unique characteristic of this mechanism is that it exchanges only positive
reputation information
•this may limit its reliance on positive reports without the facility to submit negative
feedback
4 . A reputation-based trust management scheme using an incentive mechanism was
introduced (secure and objective reputation-based incentive; SORI).
As these enhancements address the trust problem, they all have some type of
shortcomings that either affect overall performance or significantly increase overhead
PROPOSED
•Our approach provides a routing SYSTEM
protocol based on trust, which is established and
maintained by the nodes in the network.

• In each node, the trust factor is updated based on the successful participation of the
other nodes in previous data transmissions. Our protocol is based on the DSR routing
protocol, and is on-demand. In addition, it is a distributed protocol.

• Unlike other protocols, such as the link-state-based ones, each node only has to
maintain topology and trust information about its immediate neighbors and not the
entire network.
These characteristics enhance the scalability and performance of our proposed
algorithm. Also as an ad hoc networks usually include nodes of varying trust levels, it
becomes necessary to distinguish these nodes using the accumulated trust levels for
each node.

•As a result, TRAS becomes more effective and more capable of selecting paths with
higher trust levels.
ARCHITECTURE
CONCLUSION

These characteristics enhance the scalability and performance of our proposed


algorithm. Also as an ad hoc networks usually include nodes of varying trust
levels, it becomes necessary to distinguish these nodes using the accumulated
trust levels for each node. As a result, TRAS becomes more effective and more
capable of selecting paths with higher trust levels.
SOFTWARE REQUIREMENTS AND SPECIFICATION
System Requirements :

IDE :Visual Studio .Net (Framework 4.0 or later)


Programming Language : C#
Technology :Windows Form .Net

Hardware Requirements :
Minimum 4 to 5 Physical Machines/Virtual Machines in Network
REFERENCES
 
[1] Q. He, D. Wu and P. Khosla, "SORI: A Secure and Objective Reputation-based Incentive Scheme for
Ad-hoc Networks," in Wireless Communications and Networking Conference, 2004.

[2] Abusalah, A. Khokhar and M. Guizani, "TARP: Trust Aware Routing Protocol," 2006.

[3] M. A. Ayachi, C. Bidan, T. Abbes and A. Bouhoula, "Misbehavior Detection using Implicit Trust
Relations in the AODV Routing Protocol," in International Conference on Computaional Science and
Engineering, 2009.

[4] S. Hadim, J. Al-Jaroodi and N. Mohammed, Middleware Issues and Approaches for Mobile Ad
Hoc Networks, in proc. of IEEE Consumer Communications and Networking Conference (CCNC
2006), Las Vegas, Nevada, January 2006.

[5] Z. Liu, A.W. Joy and R.A. Thompson, A Dynamic Trust Model for Mobile Ad Hoc Networks, Proc.
of IEEE International Workshop on Future Trends of Distributed Computing Systems, 2010.

[6] C. Wang, X. Yang and Y. Gao, A Routing Protocol Based on Trust for MANETs, Springer, 2005.
THANK YOU

Anda mungkin juga menyukai