{"title":"检测和隔离移动特设网络中路由攻击的可信安全方法","authors":"","doi":"10.1016/j.jer.2023.100149","DOIUrl":null,"url":null,"abstract":"<div><h3>Background</h3><div>Secure routing is of utmost importance in protecting mobile devices from external threats. However, the dynamic characteristics of Mobile Ad hoc Networks (MANETs) pose significant challenges in achieving a secure routing path.</div></div><div><h3>Objectives</h3><div>This paper aims to propose a Trust and Anonymous Model (TAM) for efficient and secure data routing in MANETs. The objective is to address the limitations of existing routing approaches and enhance the security of the network.</div></div><div><h3>Methods</h3><div>The TAM protocol is designed with a Two-Tier Security Mechanism (TTSM). In the first level of security, trustable nodes are selected based on their ability to process control messages. The recommended trust value of a node is determined by estimating the speed at which it processes control messages, with higher energy nodes being considered more trustable. In the second level of security, the original node identity is concealed, and data is transmitted through selected trusted nodes with duplicate identities generated using a factorial recursive function. This ensures secure transmission, as malicious observers are unable to identify participating nodes in the routing operation.</div></div><div><h3>Results</h3><div>The proposed TAM model is evaluated and compared with state-of-the-art schemes such as A Multi-attribute-based Trusted Routing for Embedded devices (EMBTR) and a cognitive energy-efficient-based trusted model (CEMT). Experimental evaluation demonstrates that the TAM model achieves better performance in terms of energy consumption, delay, packet delivery rate, and false node detection rate, thereby improving network optimality.</div></div><div><h3>Conclusion</h3><div>The Trust and Anonymous Model (TAM) with its Two-Tier Security Mechanism (TTSM) presents a promising approach for secure data routing in MANETs. By selecting trustable nodes and utilizing duplicate identities, the TAM model enhances network security while achieving improved performance compared to existing schemes. The findings of this study contribute to the advancement of secure routing techniques in MANETs and provide insights for future research in this domain.</div></div>","PeriodicalId":48803,"journal":{"name":"Journal of Engineering Research","volume":"12 3","pages":"Pages 379-386"},"PeriodicalIF":0.9000,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A trusted security approach to detect and isolate routing attacks in mobile ad hoc networks\",\"authors\":\"\",\"doi\":\"10.1016/j.jer.2023.100149\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><h3>Background</h3><div>Secure routing is of utmost importance in protecting mobile devices from external threats. However, the dynamic characteristics of Mobile Ad hoc Networks (MANETs) pose significant challenges in achieving a secure routing path.</div></div><div><h3>Objectives</h3><div>This paper aims to propose a Trust and Anonymous Model (TAM) for efficient and secure data routing in MANETs. The objective is to address the limitations of existing routing approaches and enhance the security of the network.</div></div><div><h3>Methods</h3><div>The TAM protocol is designed with a Two-Tier Security Mechanism (TTSM). In the first level of security, trustable nodes are selected based on their ability to process control messages. The recommended trust value of a node is determined by estimating the speed at which it processes control messages, with higher energy nodes being considered more trustable. In the second level of security, the original node identity is concealed, and data is transmitted through selected trusted nodes with duplicate identities generated using a factorial recursive function. This ensures secure transmission, as malicious observers are unable to identify participating nodes in the routing operation.</div></div><div><h3>Results</h3><div>The proposed TAM model is evaluated and compared with state-of-the-art schemes such as A Multi-attribute-based Trusted Routing for Embedded devices (EMBTR) and a cognitive energy-efficient-based trusted model (CEMT). Experimental evaluation demonstrates that the TAM model achieves better performance in terms of energy consumption, delay, packet delivery rate, and false node detection rate, thereby improving network optimality.</div></div><div><h3>Conclusion</h3><div>The Trust and Anonymous Model (TAM) with its Two-Tier Security Mechanism (TTSM) presents a promising approach for secure data routing in MANETs. By selecting trustable nodes and utilizing duplicate identities, the TAM model enhances network security while achieving improved performance compared to existing schemes. The findings of this study contribute to the advancement of secure routing techniques in MANETs and provide insights for future research in this domain.</div></div>\",\"PeriodicalId\":48803,\"journal\":{\"name\":\"Journal of Engineering Research\",\"volume\":\"12 3\",\"pages\":\"Pages 379-386\"},\"PeriodicalIF\":0.9000,\"publicationDate\":\"2024-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Engineering Research\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2307187723001578\",\"RegionNum\":4,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering Research","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2307187723001578","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
摘要
背景安全路由对于保护移动设备免受外部威胁至关重要。然而,移动 Ad hoc 网络(MANET)的动态特性给实现安全路由路径带来了巨大挑战。方法 TAM 协议采用双层安全机制(TTSM)设计。在第一层安全机制中,根据节点处理控制信息的能力来选择可信任的节点。节点的推荐信任值通过估算其处理控制信息的速度来确定,能量越高的节点越值得信任。在第二级安全中,原始节点身份被隐藏起来,数据通过选定的受信任节点传输,并使用阶乘递归函数生成重复身份。结果对提出的 TAM 模型进行了评估,并与嵌入式设备基于多属性的可信路由(EMBTR)和基于认知能效的可信模型(CEMT)等最先进的方案进行了比较。实验评估表明,TAM 模型在能耗、延迟、数据包交付率和错误节点检测率等方面都取得了更好的性能,从而提高了网络的优化性。通过选择可信任的节点和利用重复身份,TAM 模型增强了网络安全性,同时与现有方案相比性能得到了提高。本研究的发现有助于促进城域网安全路由技术的发展,并为该领域的未来研究提供了启示。
A trusted security approach to detect and isolate routing attacks in mobile ad hoc networks
Background
Secure routing is of utmost importance in protecting mobile devices from external threats. However, the dynamic characteristics of Mobile Ad hoc Networks (MANETs) pose significant challenges in achieving a secure routing path.
Objectives
This paper aims to propose a Trust and Anonymous Model (TAM) for efficient and secure data routing in MANETs. The objective is to address the limitations of existing routing approaches and enhance the security of the network.
Methods
The TAM protocol is designed with a Two-Tier Security Mechanism (TTSM). In the first level of security, trustable nodes are selected based on their ability to process control messages. The recommended trust value of a node is determined by estimating the speed at which it processes control messages, with higher energy nodes being considered more trustable. In the second level of security, the original node identity is concealed, and data is transmitted through selected trusted nodes with duplicate identities generated using a factorial recursive function. This ensures secure transmission, as malicious observers are unable to identify participating nodes in the routing operation.
Results
The proposed TAM model is evaluated and compared with state-of-the-art schemes such as A Multi-attribute-based Trusted Routing for Embedded devices (EMBTR) and a cognitive energy-efficient-based trusted model (CEMT). Experimental evaluation demonstrates that the TAM model achieves better performance in terms of energy consumption, delay, packet delivery rate, and false node detection rate, thereby improving network optimality.
Conclusion
The Trust and Anonymous Model (TAM) with its Two-Tier Security Mechanism (TTSM) presents a promising approach for secure data routing in MANETs. By selecting trustable nodes and utilizing duplicate identities, the TAM model enhances network security while achieving improved performance compared to existing schemes. The findings of this study contribute to the advancement of secure routing techniques in MANETs and provide insights for future research in this domain.
期刊介绍:
Journal of Engineering Research (JER) is a international, peer reviewed journal which publishes full length original research papers, reviews, case studies related to all areas of Engineering such as: Civil, Mechanical, Industrial, Electrical, Computer, Chemical, Petroleum, Aerospace, Architectural, Biomedical, Coastal, Environmental, Marine & Ocean, Metallurgical & Materials, software, Surveying, Systems and Manufacturing Engineering. In particular, JER focuses on innovative approaches and methods that contribute to solving the environmental and manufacturing problems, which exist primarily in the Arabian Gulf region and the Middle East countries. Kuwait University used to publish the Journal "Kuwait Journal of Science and Engineering" (ISSN: 1024-8684), which included Science and Engineering articles since 1974. In 2011 the decision was taken to split KJSE into two independent Journals - "Journal of Engineering Research "(JER) and "Kuwait Journal of Science" (KJS).