Hybrid Approach For Secure Routing Using Trust Mechanism: Prof. Tejas Patel
Hybrid Approach For Secure Routing Using Trust Mechanism: Prof. Tejas Patel
By
A Thesis submitted to
Gujarat Technological University in Partial Fulfillment of the Requirements for
the Master of Engineering Degree in Electronics and Communication of Engineering
May-2025
I
ACKNOWLEDGEMENT
V
TABLE OF CONTENT
TITLE PAGE
CERTIFICATE
COMPLIANCE CERTIFICATE
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER-1 INTRODUCTION
1.5 Summary
2.1 Introduction
VI
3.3 Trust Mechanisms in MANET
SOFTWARE TOOLS
MATLAB 2022
CHAPTER-6 CONCLUSION
CHAPTER-7 REFERENCES
LIST OF FIGURE
LIST OF TABLE
VII
LIST OF FIGURE
LIST OF TABLE
VIII
ABSTRACT
In modern wireless communication networks, the challenge of securing and ensuring reliable
routing is critical, particularly due to the decentralized nature of the infrastructure and the
increasing prevalence of diverse security threats. Traditional routing protocols, while
effective in controlled environments, often fail when exposed to malicious behaviors like data
manipulation, unauthorized access, node compromise, and the introduction of faulty routing
information. These vulnerabilities lead to degraded network performance and compromised
security, particularly in wireless ad hoc networks where nodes communicate without a fixed
infrastructure or central authority. To address these challenges, trust-based routing
mechanisms have gained attention as a promising solution for enhancing network security
and reliability. These mechanisms assign trust scores to network nodes based on their past
behavior, ensuring that data is routed through trusted nodes and minimizing the impact of
malicious nodes. Trust-based routing can effectively detect and isolate compromised nodes
by adjusting trust scores dynamically, thus mitigating attacks such as Sybil, wormhole, and
blackhole attacks. This paper proposes a hybrid trust-based routing approach that combines
conventional routing protocols with trust management mechanisms, merging the benefits of
well-established protocols with enhanced security and adaptability. The hybrid approach
ensures real-time routing decisions that adapt to dynamic network conditions, such as node
mobility and topology changes, making the network more resilient to various attack vectors.
Additionally, by focusing on trusted nodes, this method optimizes network resources by
reducing the need for exhaustive route discovery and maintenance procedures, leading to
improved energy efficiency, lower operational costs, and enhanced overall performance. This
solution offers a robust and scalable approach to securing modern wireless communication
infrastructures, especially in resource-constrained, decentralized networks.
IX
X
CHAPTER-1
INTRODUCTION
1.1 Wireless Sensor Network
This image illustrates the architecture of a Wireless Sensor Network (WSN) integrated with
the Internet via a Gateway Node for communication with an end-user. The diagram highlights
how sensor nodes within a WSN collect data, which is then transmitted through a gateway
node and accessed by a user over the internet.
WSNs and growing IoT technology, in particular, may provide an open path for attackers in
application domains where CIA (confidentiality, integrity, and availability) is critical.
1
Furthermore, the recent integration and collaboration of WSNs with IoT will present security
challenges and issues. Most of the WSNs deployments in IoT are sometimes deployed in the
unattended hostile environment for gathering sensitive data or information. Therefore, data
leakage and alteration lead to cracking of privacy and security concerns in this environment.
This may also lead to users with unauthorized access to access the network and manipulate
the security and secrecy of data. In additional, most of IoT devices such as sensor nodes are
traditionally resource-constrained devices due to limitations factors such as power
consumption, memory footprint, computing abilities, and speed. This makes the complete
implementation of a cryptographic algorithms difficult due to its limitation factors. Moreover,
it makes WSNs vulnerable to variety of attacks and put the security C2 General of data at
risk. In additional, sacrificing the security and privacy of user data to an unauthorized user
with unauthorized access to critical data and information is not an option. Therefore, a certain
level of security is essential to protect user data. WSNs have a variety of security problems
and attacks due to their design, so it is often recommended to use a lightweight security
scheme to avoid the technical overheads imposed, which do not impact any of the overall
preferred network performance. The implementation of cryptographic security is needed as
the number of sensitive data and information increase drastically and easily gets manipulated
and transmitted. The need for lightweight cryptography is widely mentioned and discussed in
much literature, but there is limited information nor definition and solution for it. Lightweight
cryptography can be implemented in both software and hardware and also for resource-
constrained devices to improve the utilization of resources, computational time, power
consumption and security.
2
1. Key Components of WSNs
Sensor Nodes: These are small devices equipped with sensors, processing units
(microcontrollers), memory, communication modules (for wireless communication),
and power supply. The nodes are often deployed in large numbers to cover vast areas.
They collect and transmit data to a sink node or a base station for further processing.
Sink Nodes (Base Stations): These are specialized nodes responsible for receiving
data from the sensor nodes, processing it, and forwarding it to a central server or
cloud for further analysis. They act as gateways between the sensor nodes and the
external network.
Communication Infrastructure: The sensor nodes communicate with each other and
with the base station using wireless communication protocols. This can include short-
range communication protocols such as Zigbee, Bluetooth, Wi-Fi, or LoRa.
Power Supply: Since sensor nodes are often deployed in remote or inaccessible areas,
they rely on battery power or energy harvesting techniques (such as solar energy) to
operate. Energy efficiency is a critical factor in WSN design because nodes are
expected to operate for long periods without human intervention.
2. Types of WSNs
Terrestrial WSNs: These networks are deployed on land for applications like
environmental monitoring, agriculture, and smart cities. The sensor nodes are spread
across the area of interest and are typically placed on the ground.
Underwater WSNs: Underwater sensor networks are used in marine research and
surveillance. These WSNs involve sensor nodes that operate in underwater
environments and are capable of monitoring parameters like water temperature,
salinity, pressure, and currents.
Mobile WSNs: In this type of network, the sensor nodes are mobile, allowing for
dynamic sensing and monitoring. The nodes can move within the network to cover
3
different areas, making them ideal for applications like battlefield surveillance and
rescue missions.
Body Area Networks (BANs): These networks involve sensor nodes that are placed
on or inside the human body for monitoring health parameters such as heart rate,
blood pressure, and glucose levels. This type of WSN is commonly used in healthcare
applications.
3. Architecture of WSNs
The architecture of a typical Wireless Sensor Network (WSN) includes several layers, each
responsible for different functions:
Physical Layer: This layer deals with the hardware aspects of the network, such as
the sensors, communication devices, and energy sources. It handles tasks like data
collection, signal transmission, and reception.
Data Link Layer: Responsible for reliable communication between sensor nodes, the
data link layer ensures that data is correctly transmitted over the network. It manages
packetization, error correction, and retransmission.
Network Layer: This layer handles routing, forwarding of packets, and node mobility
management. It is responsible for determining the best path for data transmission from
source to destination. Key routing protocols, such as AODV (Ad-hoc On-Demand
Distance Vector), DSR (Dynamic Source Routing), and LEACH (Low-Energy
Adaptive Clustering Hierarchy), are implemented at this layer.
Transport Layer: This layer ensures that the data is reliably delivered to the
application layer. It can manage end-to-end communication, congestion control, and
flow control.
Application Layer: This layer is responsible for the end-user interaction, where the
sensor data is presented to the user in a useful format. It handles the decision-making
process and can trigger actions based on the collected data.
4. Applications of WSNs
The diverse capabilities of WSNs have led to their adoption in a wide variety of applications:
4
Environmental Monitoring: WSNs can be used for real-time environmental
monitoring, such as tracking air quality, pollution levels, temperature, and humidity in
large areas. These networks are valuable in disaster management, wildlife monitoring,
and climate change research.
Healthcare: WSNs are used in remote health monitoring, where sensor nodes collect
data on vital signs like heart rate, body temperature, and oxygen levels. This data is
transmitted to healthcare providers for analysis and action.
Smart Cities: WSNs are integral to the development of smart cities. They monitor
infrastructure health, traffic, pollution, waste management, and water quality, leading
to efficient city management and improved quality of life.
Due to the nature of their deployment in unattended, often hostile environments, WSNs face a
variety of security challenges:
Data Integrity and Authentication: Ensuring that data transmitted by sensor nodes
is authentic and has not been tampered with is a major concern. Malicious nodes can
alter the data being transmitted, which can lead to incorrect actions being taken based
on faulty information.
Access Control: Unauthorized access to sensor nodes or the network can compromise
the entire system. Ensuring that only authorized users and nodes can interact with the
network is crucial.
Energy Constraints: Since sensor nodes often rely on batteries for power, it is
critical to minimize energy consumption. Security mechanisms, such as encryption
and authentication, must be lightweight to prevent excessive energy usage.
5
Denial-of-Service (DoS) Attacks: Malicious nodes can disrupt network operations by
overloading nodes with traffic, draining their energy, or blocking communication
channels. This can lead to network outages and data loss.
Routing Attacks: Attackers can compromise routing protocols by introducing false routing
information, leading to misdirected traffic, energy wastage, and degraded network
performance. Common routing attacks include blackhole, wormhole, and Sybil attacks.
6. Lightweight Security Solutions for WSNs
Given the resource constraints of sensor nodes, traditional cryptographic algorithms such as
RSA or AES may be too computationally expensive for use in WSNs. Therefore, lightweight
security mechanisms are often employed. These mechanisms focus on achieving security
without placing heavy computational or energy demands on the network.
Data Aggregation: Instead of sending individual sensor data to a base station, nodes
aggregate data locally to reduce the communication overhead and energy
consumption. This also improves data privacy by ensuring that raw data is not
transmitted over the network.
6
2. Cost-Effective:
WSNs are relatively inexpensive to deploy, especially with advances in sensor technology.
The components used in WSNs are small, low-cost, and easily available, making the
deployment of large-scale networks affordable for various applications.
3. Scalability:
WSNs can be easily scaled to accommodate a large number of sensor nodes. The network can
be expanded by adding more nodes, making it flexible to adjust to varying monitoring needs,
from small areas to vast regions.
8. High Reliability:
Due to their distributed nature, WSNs can offer high reliability in data collection and
transmission. The network is resilient to node failures and communication disruptions, as data
can be routed through multiple paths.
9. Enhanced Security:
While WSNs face security challenges, implementing lightweight cryptographic protocols and
trust-based systems can secure data transmission, authentication, and access control in these
7
networks.
10. Environmental Monitoring:
WSNs are ideal for remote and harsh environments, such as forest monitoring, natural
disaster detection, and climate change research, where human intervention is minimal or
impossible.
The design and operation of routing protocols in Wireless Sensor Networks (WSNs) are
crucial for ensuring efficient data transmission, minimizing energy consumption, and
ensuring reliability and scalability. Various routing protocols are used in WSNs, each suited
for specific applications and requirements. Below is a list of commonly used routing
protocols in WSNs:
8
Dynamic Source Routing (DSR):
DSR is a reactive protocol where each node maintains a route cache, and a route is
only discovered when it is needed. The protocol allows for source routing, where the
sender specifies the entire route.
9
Directed Diffusion:
Directed Diffusion is a data-centric routing protocol where the network is driven by
the data, and nodes only forward data that is of interest to the querying nodes.
Rumor Routing:
Rumor Routing is another data-centric protocol where the network only forwards data
that matches the interests of the receiving nodes, thus reducing the communication
overhead.
10
QoS-Aware Routing (QOSR):
This protocol aims to satisfy the QoS requirements of data transmission in WSNs by
selecting routes that meet the necessary criteria for bandwidth, delay, and packet loss.
1.5 Summary
Wireless Sensor Networks (WSNs) have emerged as a transformative technology with wide-
ranging applications across fields like environmental monitoring, healthcare, and military
surveillance. WSNs consist of small, low-cost, and low-power sensor nodes that collect and
transmit data wirelessly. Despite their advantages, such as scalability, low power
consumption, and real-time monitoring, WSNs face significant security challenges, including
data integrity, unauthorized access, and Denial-of-Service (DoS) attacks. Lightweight
cryptographic solutions like ECC and energy-efficient routing protocols are essential to
address these challenges. Various routing protocols, including proactive, reactive, hybrid, and
hierarchical, cater to different network requirements. By focusing on energy efficiency and
security, WSNs can be deployed in resource-constrained environments, improving
performance while ensuring data confidentiality, integrity, and availability. Advances in
trust-based models, data aggregation, and lightweight cryptography offer promising solutions
for enhancing the security and reliability of WSNs.
11
CHAPTER- 2
LITERATURE REVIEW
2.1 Introduction
Wireless Sensor Networks (WSNs) and Internet of Things (IoT) technologies are at the
forefront of modern communication systems, providing solutions for a wide range of
applications including environmental monitoring, healthcare, smart cities, and industrial
automation. As these networks continue to evolve, ensuring their security becomes
increasingly important. This is due to their open, distributed nature, which makes them
vulnerable to various cyber threats such as unauthorized access, data manipulation, and
denial-of-service attacks. Securing these networks while maintaining energy efficiency,
scalability, and performance is a significant challenge, especially with the resource-
constrained nature of many devices within these systems.
To address these challenges, various security protocols and cryptographic techniques have
been proposed. These include hybrid algorithms, encryption schemes such as ECC (Elliptic
Curve Cryptography), AES (Advanced Encryption Standard), and blockchain-based key
management systems. While these methods offer improvements in security, they also come
with their own set of limitations, such as increased computational overhead, energy
consumption, and scalability challenges.
This overview highlights several key papers that explore different security models for WSNs
and IoT, focusing on their strengths and limitations. These studies provide insights into the
performance of various cryptographic algorithms, security protocols, and the potential
solutions for enhancing the overall security and efficiency of these networks. Despite the
advancements, challenges remain in optimizing security while ensuring minimal impact on
the performance and resource usage of the network. Future research must continue to address
these issues to enable secure, scalable, and efficient wireless communication systems for
diverse applications.
12
2.2 Literature Review
[1] Hybrid Algorithm to Enhance Wireless Sensor Networks Security on the IOT.
Summary: This paper has presented that a hybrid algorithm that combines multiple security
protocols and dynamic trust evalution, but faces challenges like computational overhead and
scalability. And also optimization of performance and security.
[2] A Secure and Efficient ECC based scheme for Edge computing and Internet of Things.
Summary: This paper introduces an ECC based secure communication scheme for edge
computing and IOT, emphasizing reduced overhead but suffers from implementation
complexity, key generation and hardware requirement.
[3] Dynamic AES Encryption and Blockchain key management: A Novel solution for cloud
Data security.
Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango and Antonio Francesco gentile
Summary: This paper proposed a dynamic AES encryption and blockchai key management
solution for cloud data security, through it face high computational complexity. And also
proposed solution offers a resilient and scalable security framework, aligning a robust
response to security chalenges, ensuring data confidentiality and integrity in cloud
environment to need the diverse of both users and service providers.
Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango and Antonio, Froncesco Gentile
Summary: This fourth paper analyzes the cryptography performance in WSNs at the MAC
layer, Focusing on optimization but highlighting computational overhead. In this work
security issues of two MAC protocol so impact of network performance. And Increased
energy consumption.
13
Summary: This fifth paper explore ECC for application specific WSN security, offering
efficient communication but with latency and hardware dependency. And robust encryption
with low computational overhead.
Evandro L.C. Macedo, Egberto A.R. de Oliveira, Fabio H. Silva, Rui R, Mello Jr Felipo M.G.
Summary: The sixth paper provides a literature review on IOT security, identifying key
Vulnerabilities and challenges. It is Rapidly evolving technologies focus on existing
Literature, limited practical solution.
Summary: This paper analyzes cryptographic algorithms for IOT, emphasizing the need to
lightweight solutions, but facing scalability issues. Together these papers highlight the
tradeoffs between security, performance and resource constraints in security WSNs and IOT
networks.
From the above study literature review we can say that in the modern wireless
communication networks, particularly those involving wireless sensor networks, mobile ad
hoc networks, and the internet of things, secure and reliable routing is critical challenge.
These networks characterized by their decentralized nature, high mobility of nodes, and
resource constraints, such as limited power, computational capacity and bandwidth. As these
networks play an important role in application ranging from smart cities to military and
healthcare system, ensuring data integrity, confidently, and availability during the
communication is paramount. Traditional routing protocol, such as proactive, reactive, and
hybrid method, typically focus on optimize route discovery and maintenance based on
metrics like hope count, delay, and energy consumption. While these protocol design to
improve network performance.
14
CHAPTER-3
METHODS AND TECHNIQUE
3.1 MANET (Mobile Ad Hoc Network):
Error Control Coding is a technique used in communication systems to detect and correct
errors that may occur during data transmission. The primary goal is to ensure that the data
received by the receiver is the same as the data sent by the transmitter, even in the presence
of noise or interference.
ECC involves adding redundancy to the transmitted data through various coding schemes,
which may include:
Hamming Codes
Turbo Codes
Reed-Solomon Codes
Low-Density Parity-Check (LDPC) Codes
15
1. Wireless channels are prone to errors due to interference, fading, and noise, which
can significantly affect communication reliability.
2. Mobile nodes in MANETs frequently move, changing the network topology, which
can impact the stability of communication channels.
3. Error correction techniques can help mitigate packet loss or data corruption caused
by these dynamic conditions, improving the reliability and performance of the
network.
In the context of MANET, Error Control Coding plays an essential role in improving the
network’s reliability, particularly when dealing with unreliable wireless channels. Due to the
lack of fixed infrastructure and the mobile nature of the devices, the error rate in the
network can be high. By employing ECC, the network can recover from errors more
efficiently, ensuring reliable communication between nodes.
Wireless communication channels are inherently noisy, and data transmission over them is
highly susceptible to errors caused by factors like:
In such environments, it’s common for transmitted data to be corrupted or lost. ECC helps
detect and correct these errors, ensuring that the information received matches what was
originally sent.
16
In MANETs, the network topology is highly dynamic since nodes (devices) are mobile.
Nodes frequently join, leave, or move within the network. As a result, the routing paths
between nodes can change rapidly, which increases the likelihood of data packet loss, delays,
or errors.
3. Reliable Communication:
In MANETs, the lack of a central infrastructure means that each node is responsible for
forwarding its own data and the data of other nodes. If errors occur during this process (due
to noise or interference), data integrity may be compromised. ECC ensures reliable
communication, even in such error-prone conditions, by adding redundancy to the transmitted
data. This redundancy allows the receiver to detect and, in many cases, correct errors without
requiring retransmissions.
4. Resource Efficiency:
Retransmissions due to data loss or errors can significantly consume valuable resources in
terms of bandwidth and energy, which are critical in MANETs. Since many nodes in a
MANET are battery-powered, frequent retransmissions can drain power quickly. ECC
reduces the need for retransmissions by allowing the receiver to recover lost or corrupted data
using the redundant bits in the transmitted message. This is particularly important in battery-
constrained environments.
5. Reducing Latency:
In MANETs, high latencies can occur if data must be retransmitted due to errors or
corruption. ECC helps reduce this latency by enabling error correction at the receiver side,
thereby minimizing the need for retransmissions and improving the overall throughput of the
network.
17
Ensuring that data is transmitted reliably and without corruption is essential for maintaining
Quality of Service (QoS) in wireless networks. ECC enables better performance metrics
such as:
7. Security in MANETs:
Block codes like Hamming code and Reed-Solomon code: Used for correcting
errors in data blocks.
Convolutional codes: Typically used in continuous data streams, providing good
error correction in noisy environments.
Turbo codes and LDPC codes: Modern ECC techniques that offer near-optimal
performance in terms of error correction.
1. Error Detection and Correction: The primary advantage of ECC is its ability to
detect and correct errors that occur during data transmission. In wireless
communication systems like MANETs, where signals are prone to interference,
fading, and noise, ECC ensures that the data received is accurate and matches the
transmitted data, even if there were errors during transmission.
2. Improved Reliability: ECC enhances the reliability of communication by ensuring
that even when some bits of data are corrupted, the receiver can still reconstruct the
original message. This is critical in environments like MANETs, where nodes may
18
move and connectivity can be unstable. Reliable communication improves the
network's overall functionality, as nodes can continue to communicate effectively
despite potential disturbances.
3. Reduced Need for Retransmissions: One significant advantage of ECC is that it
reduces the need for retransmissions due to errors or data loss. In a MANET, frequent
retransmissions can lead to increased energy consumption and network congestion.
By allowing receivers to correct errors on their own, ECC minimizes retransmission
requirements, improving both energy efficiency and network throughput.
4. Enhanced Energy Efficiency: MANETs typically rely on battery-powered nodes,
and energy conservation is crucial. Retransmitting data consumes more energy, which
can deplete a node’s battery quickly. With ECC, error correction is performed on the
receiver side, reducing the need for retransmissions, thus saving valuable energy
resources and extending the network's lifetime.
5. Robustness to Interference: Wireless communication systems are highly susceptible
to interference, including multi-path fading and signal attenuation. ECC helps
mitigate these issues by adding redundancy to the transmitted data, allowing the
receiver to reconstruct the original message even in the presence of noise or weak
signals, improving the overall resilience of the network.
6. Lower Latency: Since ECC reduces the need for retransmissions, the overall latency
of the system is decreased. This is especially important in real-time communication or
applications that require low-latency, such as voice or video calls, where delays can
significantly affect the quality of service.
7. Better Quality of Service (QoS): By minimizing transmission errors and improving
reliability, ECC contributes to better Quality of Service (QoS). Key performance
indicators like packet delivery ratio, throughput, and end-to-end delay are
improved, ensuring a more stable and efficient network. This is especially important
in MANETs, where network conditions are constantly changing due to node mobility.
8. Adaptability to Network Conditions: ECC is highly adaptable and can be tailored to
various network conditions. For instance, dynamic error-correcting codes can be
employed in response to changes in network topology, such as node movement in
MANETs. This adaptability ensures that the network can continue to function
effectively, even when the network environment changes.
9. Security Enhancements:ECC can also contribute to network security by detecting
data tampering. If errors are detected in a packet, it can indicate that the data has been
19
altered maliciously. This helps identify potential security threats such as man-in-the-
middle attacks or data manipulation, enabling the network to take corrective
actions.
10. Scalability in Large Networks: In large-scale networks, such as those in MANETs,
where multiple nodes are involved in routing data, ECC ensures that the network can
handle larger amounts of data efficiently. By reducing retransmissions and optimizing
data transfer, ECC allows the network to scale effectively while maintaining high
performance.
11. Improved Throughput: With error correction at the receiver end, the network
doesn’t need to wait for retransmissions or deal with repeated attempts to transmit lost
data. This increases throughput, allowing the network to carry more data in the same
amount of time, enhancing overall system performance.
12. Cost Efficiency: By reducing retransmissions and improving overall efficiency, ECC
helps reduce network congestion, which in turn can lower the operational costs of
maintaining the network. For networks like MANETs, where infrastructure may be
minimal, these cost savings are especially beneficial.
Trust Mechanisms in MANETs (Mobile Ad Hoc Networks)are used to enhance the reliability
and security of communication by ensuring that data is transmitted through trustworthy
nodes. Since MANETs are highly dynamic and lack central authority or infrastructure,
traditional security methods, like encryption and authentication, may not be sufficient to deal
with malicious behaviors such as node compromise, packet dropping, and other attacks.
Trust-based mechanisms address these challenges by evaluating and assigning trust scores
to nodes based on their behavior and interactions in the network. Here's an overview of trust
mechanisms in MANETs:
1. Trust Evaluation:
Trust mechanisms in MANETs typically involve evaluating the behavior of nodes based on:
20
Indirect Observations: Nodes may also collect feedback from other nodes about the
performance of certain nodes, using reputation-based systems. This helps to evaluate
nodes that may not be directly observed but are still part of the network.
2. Trust Models:
Reputation-based Models: These models track the history of node interactions and
reputation. Nodes with good past behavior are trusted more, while nodes with
suspicious behavior have lower trust scores.
Behavioral Models: These assess the actions of nodes, such as packet forwarding,
response times, and packet dropping, to determine trustworthiness.
Probabilistic Models: These use mathematical approaches (like Bayesian networks)
to compute trust based on probabilistic reasoning and node interaction history.
Combination Models: Some trust models combine both direct and indirect
evaluations to enhance reliability. For example, trust can be based on a node’s own
performance and feedback from others.
Secure Routing: Trust mechanisms help ensure that data is routed through reliable
and trustworthy nodes, avoiding malicious or compromised nodes that might alter,
drop, or misroute data.
Detection of Malicious Nodes: By continuously monitoring and evaluating node
behavior, trust mechanisms can detect compromised or malicious nodes (e.g., nodes
participating in Sybil attacks, blackhole attacks, or wormhole attacks) and isolate
them from the network.
Mitigation of Attacks: Trust-based systems can identify and react to network attacks
by adjusting the trust levels of suspicious nodes, rerouting traffic, or initiating
defensive actions.
21
4. Advantages of Trust Mechanisms in MANETs:
Trust Estimation Accuracy: Trust is often subjective, and incorrect trust evaluations
can lead to unfair exclusion or misrouting of data. Ensuring accurate and fair trust
estimation is a significant challenge.
Cooperative Behaviors: Some nodes might fake cooperative behavior to deceive the
trust mechanism, so designing trust systems that detect such manipulation is complex.
Resource Overhead: Continuously monitoring node behaviors and calculating trust
scores requires computational resources and bandwidth, which may be limited in
resource-constrained MANETs.
Dynamic Topology: The constantly changing topology in MANETs makes it harder
to maintain accurate trust scores, especially in networks with high mobility.
Trusted Routing Protocol (TRP): A routing protocol that uses trust-based evaluation
to select reliable paths for data transmission.
Trust-based AODV (T-AODV): A modified version of the AODV (Ad hoc On-
Demand Distance Vector) routing protocol that incorporates trust information to
select routes based on the trustworthiness of nodes.
Secure AODV (SAODV): This version of AODV uses both encryption and trust-
based mechanisms to provide security and reliability in the routing process.
22
TARP (Trust Aware Routing Protocol): It incorporates trust information into the
routing decisions, adjusting the paths based on the trustworthiness of the nodes
involved.
In the context of Error Control Coding (ECC), the key mathematical concepts and terms
include:
1. Codeword:
A codewordc\mathbf{c}c is a vector that represents the encoded version of the
message, which includes both the original message bits and error-correcting
redundancy. Mathematically, a codeword is an element of the code space, which is a
subspace of a vector space.
2. Generator Matrix (G):
Where m\mathbf{m}m is a row vector of size 1×k1 \times k1×k (the number of
message bits) and G\mathbf{G}G is a matrix of size k×nk \times nk×n (the number of
codeword bits).
23
The Hamming distanced(x,y) between two codewords x\mathbf{x}x and
y\mathbf{y}y is the number of bit positions in which they differ:
5. Syndrome:
The syndromes\mathbf{s}s is a vector used for error detection in a received
codeword r\mathbf{r}r. It is calculated by multiplying the received vector by the
parity check matrix:
The code rateR is the ratio of the number of information bits k to the total number of
bits n in the codeword:
R=knR = \frac{k}{n}R=nk
This indicates the efficiency of the code in terms of the proportion of transmitted bits
that carry actual information.
7. Cyclic Codes:
A cyclic code is a type of linear code in which any cyclic shift of a codeword results
in another valid codeword. Mathematically, if c=[c1,c2,..., cn]\mathbf{c} = [c_1, c_2,
..., c_n]c=[c1,c2,...,cn] is a codeword, then any cyclic shift c′=[c2,...,cn,c1]\mathbf{c'}
= [c_2, ..., c_n, c_1]c′=[c2,...,cn,c1] is also a codeword.
24
8. Reed-Solomon Code:
Reed-Solomon (RS) codes are a class of non-binary cyclic codes that can correct
multiple errors. They are defined over finite fields GF(q), where q is typically a power
of a prime. A Reed-Solomon code is usually denoted as (n,k)(n, k)(n,k), where:
The code can correct up to n−k2\frac{n-k}{2}2n−k errors. The encoding process uses
polynomial evaluation over finite fields.
25
Reed-Solomon Code: Non-binary code used for error correction over finite fields.
Finite FieldGF(q)GF(q)GF(q): Mathematical field with a finite number of elements
used in coding theory.
AES is a widely used symmetric encryption algorithm for securing data. It operates on fixed-
size blocks (128 bits) and supports key sizes of 128, 192, or 256 bits. AES involves several
rounds of transformations (SubBytes, ShiftRows, MixColumns, and AddRoundKey),
depending on the key length (e.g., 10 rounds for 128-bit keys, 12 for 192-bit, and 14 for 256-
bit).
1. Data Security:
2. Efficiency:
AES is computationally efficient when implemented on modern hardware, and its
symmetric key approach (same key for both encryption and decryption) makes it
faster compared to asymmetric algorithms like RSA, which are also used in securing
communication but require more computational resources.
3. Integrity and Authentication:
26
AES, when combined with techniques like Message Authentication Codes (MACs)
or hash functions, can ensure data integrity, allowing the recipient to verify that the
message has not been altered during transmission. This is crucial in MANETs, where
data integrity is often compromised due to malicious attacks.
While AES provides a high level of security, applying it in MANETs poses several
challenges:
1. Resource Constraints:
MANET nodes are often battery-powered and have limited processing and storage
capabilities. AES, while efficient, can still be resource-intensive, especially on lower-
end devices with less computational power.
2. Key Management:
3. Dynamic Topology:
The mobile nature of nodes in a MANET means that the network topology is
constantly changing, which can complicate secure communication. For example, a
node may need to frequently re-establish secure communication channels with other
nodes as it moves and the network topology evolves.
4. Attacks on AES:
Even though AES is secure, MANETs are vulnerable to various attacks such as:
27
o Denial of Service (DoS): Attackers could overwhelm nodes or networks with
excessive traffic, preventing the use of encryption services.
o Replay Attacks: Malicious nodes might record and resend encrypted
messages to confuse legitimate nodes or disrupt the network.
To optimize resource usage, a hybrid encryption scheme can be used. For example,
asymmetric encryption (such as RSA) is used to exchange a shared symmetric key,
and then AES is used for the actual data encryption/decryption.
Instead of each pair of nodes using a separate AES key, group key management
protocols can be used. In this case, all nodes in a group share a common key for
communication, simplifying key management.
Secure routing protocols like AODV (Ad hoc On-demand Distance Vector) and
DSR (Dynamic Source Routing) can be modified to include AES encryption for
securing route requests, responses, and data forwarding.
To ensure the integrity and authenticity of the encrypted data, AES can be combined
with cryptographic hash functions or HMAC (Hash-based Message Authentication
Code) to protect against data manipulation and replay attacks.
1. Strong Security:
28
AES is considered highly secure and efficient for protecting sensitive data in
MANETs. With key sizes of 128, 192, and 256 bits, it offers a high level of
encryption strength.
2. Performance Efficiency:
AES is faster than many other encryption algorithms, making it suitable for resource-
constrained environments like MANETs, provided it's implemented correctly.
3. Scalability:
AES can be efficiently scaled in a network of any size, which is essential as MANETs
can consist of many mobile nodes with varying roles and capabilities.
4. Mature Algorithm:
AES is widely used and thoroughly analyzed, meaning it has a proven security track
record and is supported by many cryptographic libraries, making it easier to
implement in MANETs.
3.5 RSA(Rivest-Shamir-Adleman)
RSA is based on the mathematical properties of large prime numbers. It uses two keys:
1. Public Key: Used for encrypting data and verifying digital signatures.
2. Private Key: Used for decrypting data and creating digital signatures.
In RSA, the security relies on the difficulty of factoring large numbers, particularly the
product of two large primes, which is computationally hard to break.
29
3.5.1 Why RSA in MANETs?
1. Key Distribution:
RSA’s asymmetric nature solves the problem of key distribution, which is a major
challenge in MANETs where nodes frequently join or leave the network. In
traditional symmetric encryption (e.g., AES), both parties need to share a secret key,
which is difficult to manage in dynamic environments. RSA allows each node to
securely distribute its public key while keeping the private key confidential.
2. Authentication:
RSA enables digital signatures, allowing nodes to authenticate each other, ensuring
that data originates from a legitimate source and has not been tampered with. This is
critical in MANETs where malicious nodes might try to impersonate others or inject
false data.
3. Confidentiality:
RSA ensures that data remains confidential during transmission, as only the intended
recipient with the corresponding private key can decrypt the message.
1. Computational Overhead:
RSA encryption and decryption are computationally intensive, especially for mobile
devices with limited processing power. As RSA involves large number operations
(key generation, encryption, and decryption), it might not be suitable for highly
resource-constrained nodes in MANETs.
2. Key Management:
30
3. Scalability:
As the number of nodes increases in a MANET, managing the cryptographic keys and
ensuring efficient communication between all nodes becomes a challenge.
1. Secure Routing:
In routing protocols like AODV (Ad hoc On-demand Distance Vector) and DSR
(Dynamic Source Routing), RSA can be used for securely exchanging routing
information and authenticating the source of routing requests. This prevents malicious
nodes from injecting false routing information or participating in black hole and
wormhole attacks.
2. Hybrid Encryption:
3. Secure Communication:
Combining ECC, AES, and RSA in a hybrid approach provides a balanced solution that
addresses both security and resource efficiency. Here's how these algorithms can work
together in a secure routing system:
1. Key Exchange: ECC can be used to perform the key exchange between the sender
and receiver. The smaller key size and high security make ECC ideal for securely
establishing a shared secret between nodes.
31
2. Session Key Generation: Once the keys are exchanged using ECC, the session key
(shared secret) is used to encrypt and decrypt the data using AES. AES will handle
the encryption of the data due to its efficiency and low computational overhead.
3. Authentication and Integrity: RSA can be used for digital signatures to verify the
authenticity of the sender and to ensure that the data has not been altered during
transmission. This guarantees data integrity and authentication.
4. Security and Performance Balance:
o ECC provides efficient and secure key exchange and authentication with
smaller key sizes.
o AES handles the data encryption in a lightweight manner without
compromising performance.
o RSA adds an extra layer of security by allowing for the verification of
authenticity and integrity of data via digital signatures.
1. Efficient Resource Utilization: The hybrid approach ensures efficient resource usage
by combining lightweight cryptographic operations (ECC and AES) for encryption
and key exchange, while still providing robust authentication through RSA.
2. Scalability: The system can scale easily, as ECC’s small key size makes it ideal for
IoT and WSNs with limited resources, while RSA adds a necessary layer of security
for authentication and integrity checking.
3. Adaptability: The approach is adaptable to different types of IoT applications where
both data security and efficiency are paramount. The use of AES ensures that bulk
data transmission remains fast and efficient, while RSA ensures that the network’s
routing decisions and node behavior remain secure.
4. Security Against Multiple Attacks: The combination of these algorithms provides
security against common attacks such as:
o Man-in-the-Middle (MITM): Secure key exchange via ECC prevents
interception and unauthorized access.
o Data Integrity and Replay Attacks: RSA ensures the authenticity and
integrity of the data.
o Resource Constraints: AES is efficient enough to be used in resource-
constrained devices while maintaining data confidentiality.
32
CHAPTER- 4
PROPOSED MODEL
The primary objective of the hybrid approach for secure routing using a trust mechanism is to
enhance the security, reliability, and efficiency of data transmission in decentralized networks
such as Wireless Sensor Networks (WSNs), Mobile Ad Hoc Networks (MANETs), and the
Internet of Things (IoT). This approach aims to address the vulnerabilities of traditional
routing protocols by integrating a trust-based evaluation system, ensuring that only reliable
and trustworthy nodes are involved in the routing process. To address these security
challenges, integrating a trust-based mechanism into the routing protocol offers a viable
solution. A trust mechanism allows nodes to evaluate the trustworthiness of their neighbors
based on their behavior in previous interactions. This evaluation can include metrics such as
packet delivery rates, cooperation in routing, and adherence to network protocols.
33
Figure 2. ECC Flowchart
Steps
1. Node Initialization: Each node generates its private-public ECC key pair.
2. Key Generation (ECC): ECC is used to generate the cryptographic key pair
(private/public).
3. Public Key Exchange (ECDH): Nodes exchange public keys using Elliptic Curve
Diffie-Hellman (ECDH) to establish a shared secret.
4. Shared Secret Generation: Using ECDH, a shared secret is computed between the
communicating nodes.
34
5. Secure Data Transmission (Encrypted): The shared secret is used to encrypt the data
before transmission.
6. Decryption at Receiver: The receiver uses the shared secret to decrypt the received
data.
35
Steps
1. Node Initialization: The node starts and initializes its trust parameters.
3. Trust Scoring Based on Behavior: Trust scores are assigned based on factors such as
successful packet forwarding and cooperation in the network.
4. Trust-Based Routing Decision: The node makes a routing decision based on the trust
scores of potential neighbors. Higher trust nodes are preferred.
5. Route Authentication: Routes are authenticated to ensure that the data is being
transmitted through a legitimate path.
7. Route Failure Handling: If the route authentication fails, the system will reattempt the
route selection process.
36
Figure 4. Proposed Model
Steps
1. Node Initialization:
• The node initializes its ECC parameters (key generation) and trust parameters
(neighbor evaluation).
• Each node generates its private/public key pair using ECC for secure
communication.
37
3. Trust Evaluation of Neighbors:
• The node evaluates the trustworthiness of its neighboring nodes based on prior
interactions.
• Nodes assign trust scores to neighboring nodes based on their past behavior
(e.g., packet forwarding reliability)
• The shared secret is generated using the ECDH key exchange, enabling
encryption for secure communication.
• The node selects a routing path based on the trust scores of its neighbors,
favoring trusted nodes.
• Authentication:
• The shared secret is generated using the ECDH key exchange, enabling
encryption for secure communication.
• The node selects a routing path based on the trust scores of its neighbors,
favoring trusted nodes.
38
11. Route Authentication (ECDSA):
• Authentication:
Chapter Implementation
39
40
Figure 20 nodes without attack
41
Figure 20 nodes with attack
50 nodes
42
50 nodes attack
100 nodes
43
100 nodes attack
150 nodes
44
150 attacks
Pdr ratio
45
latency
Throughput
46
With or without encryption
The number of nodes per unit Can vary depending on the area
Node Density
area (in nodes per square meter) size and the number of nodes
Routing Protocol Type of routing protocol used in AODV, DSR, OLSR, or any
Type the network custom routing protocol
Transmission Power Power used by nodes to send 20 dBm (can vary based on
(Tx Power) messages to other nodes simulation)
The size of data packets being Varies (e.g., 512 bytes, 1 KB, or
Data Packet Size
transmitted higher based on the application)
Table : Parameter
47
CHAPTER- 5
The hybrid approach for secure routing using a trust mechanism provides an effective
solution to the challenges of security and reliability in Wireless Sensor Networks (WSNs)
and Internet of Things (IoT) environments. By integrating trust evaluation with traditional
routing protocols, it enhances security by prioritizing trusted nodes, mitigating attacks, and
ensuring secure data transmission.
48
CHAPTER- 6
CONCLUSION
The integration of trust-based mechanisms in Mobile Ad hoc Networks (MANETs)
significantly enhances the network's ability to address security challenges that are inherent to
its decentralized, dynamic, and resource-constrained environment. Traditional routing
protocols in MANETs often fail to mitigate threats such as malicious nodes, data tampering,
unauthorized access, and routing attacks like Sybil, wormhole, and blackhole. In contrast, our
proposed hybrid trust-based routing algorithm combines trust evaluation with conventional
protocols, providing an adaptive layer of security that continuously adjusts to the behavior of
nodes and changes in network topologies.
The hybrid approach improves network resilience by identifying trustworthy nodes, thus
ensuring that data follows reliable paths and minimizing the risk of routing attacks. The
dynamic nature of trust mechanisms, which evolves based on node behavior and interactions,
makes the approach particularly robust in constantly changing environments. Unlike
traditional systems, this method reduces the computational overhead of route discovery and
maintenance, as only trusted nodes are selected, which enhances energy efficiency and
network performance—critical factors in MANETs, where nodes have limited battery power
and computational resources.
Furthermore, the hybrid trust model optimizes resource usage by lowering the cost of key
distribution and trust management. The approach's scalability makes it suitable for larger
networks, and it avoids overwhelming individual nodes with excessive processing demands.
These improvements in security, efficiency, and adaptability demonstrate the significant
advantages of our proposed algorithm compared to traditional routing protocols in MANETs.
Despite challenges such as trust management overhead and potential vulnerabilities in trust
models, our algorithm offers a robust, scalable, and efficient solution for secure
communication in MANETs. By combining trust mechanisms with proven routing protocols,
this algorithm addresses the evolving threats in these networks while optimizing resource
usage. Furthermore, its integration with advanced cryptographic techniques like Elliptic
Curve Cryptography (ECC) ensures long-term security in the face of emerging threats like
quantum computing.
49
The future of MANETs will depend heavily on adaptive, trust-aware routing protocols that
can manage dynamic topologies, mitigate new types of attacks, and conserve network
resources. Our algorithm represents a crucial step forward in this direction, offering better
performance and higher security than traditional systems, particularly in environments that
demand low overhead and high adaptability. With ongoing research into the areas of energy-
efficient routing, resilient trust models, and real-world implementation, our approach is
poised to be a cornerstone of future MANETs, providing both secure and efficient
communication.
50
REFERENCES
1. Mahlake, N., Mathonsi, T. E., Muchenje, T., & du Plessis, D. (2022). A hybrid
algorithm to enhance wireless sensor networks security on the IoT. IEEE.
2. AlMajed, H., &AlMogren, A. (2020). A secure and efficient ECC-based scheme for
edge computing and Internet of Things. MDPI.
3. Shakor, M. Y., Khaleel, M. I., Safran, M., Alfarhood, S., & Zhu, M. (2023). Dynamic
AES encryption and blockchain key management: A novel solution for cloud data
security. IEEE.
4. Rehman, S., Bajwa, N. T., Shah, M. A., Aseeri, A. O., & Anjum, A. (2021). Hybrid
AES-ECC model for the security of data over cloud storage. MDPI.
5. Nair, B., & Mal, C. (2015). Analysis of ECC for application-specific WSN security.
IEEE.
6. Macedo, E. L. C., de Oliveira, E. A. R., Silva, F. H., Mello Jr, R. R., França, F. M. G.,
Delicato, F. C., de Rezende, J. F., & de Moraes, L. F. M. (2019). On the security
aspects of Internet of Things: A systematic literature review. IEEE.
7. Silva, C., Cunha, V. A., Barraca, J. P., & Aguiar, R. L. (2023). Analysis of the
cryptographic algorithms in IoT communications. Springer.
8. Ahmed, A. A. (2021). Lightweight digital certificate management and efficacious
symmetric cryptographic mechanism over industrial internet of things. Sensors, 21(8),
2810. https://doi.org/10.3390/s21082810
9. Singh, M., & Mishra, D. (2023). Post-quantum secure authenticated key agreement
protocol for wireless sensor networks. Telecommunication Systems, 84(1), 101–113.
https://doi.org/10.1007/s11235-022-00945-1
10. Azrour, M., Mabrouki, J., Guezzaz, A., & Farhaoui, Y. (2021). New enhanced
authentication protocol for Internet of Things. Big Data Mining and Analytics, 4(1),
1–9. https://doi.org/10.26599/BDMA.2020.9020016
11. Xue, L., Huang, Q., Zhang, S., Huang, H., & Wang, W. (2021). A lightweight three-
factor authentication and key agreement scheme for multi-gateway WSNs in IoT.
Security and Communication Networks, 2021, 1–15.
https://doi.org/10.1155/2021/5578180
12. Tiwari, A., Varma, R., Rauthan, M. S., & Barthwal, V. (2020). Analysis of security
attacks and security protocols of wireless sensor network: Review. International
Journal of Scientific & Technology Research, 9(1). Retrieved from
http://www.ijstr.org/final-print/jan2020/Analysis-Of-Security-Attacks-And-Security-
Protocols-Of-Wireless-Sensor-Network-Review.pdf
51
13. Liu, Y., Li, C., Zhang, J., & Liu, Q. (2018). A homomorphic MAC-based secure data
aggregation scheme for wireless sensor networks. Journal of Internet Technology,
19(7), 2069–2077. https://doi.org/10.3966/160792642018111907023
14. Elshrkawey, M., & Al-Mahdi, H. (2021). SDA-SM: An efficient secure data
aggregation scheme using separate MAC across wireless sensor networks.
International Journal of Computers, Communications & Control, 16(4), 4178.
https://doi.org/10.15837/ijccc.2021.4xyz
15. Almansoori, M. N., Elshamy, A. A., & Mustafa, A. A. M. (2022). Secure Z-MAC
protocol as a proposed solution for improving security in WSNs. Information, 13(3),
105. https://doi.org/10.3390/info13030105
16. Hodowu, D. K. M., Korda, D. R., & Ansong, E. D. (2020). An enhancement of data
security in cloud computing with an implementation of a two-level cryptographic
technique, using AES and ECC algorithm. International Journal of Engineering
Research & Technology, 9(3), 639–650.
17. Jena, O. P., Tripathy, A., Swagatam, S., & Rath, S. (2020). Dual encryption model for
preserving privacy in cloud computing. Advances in Mathematics: Scientific Journal,
9(12), 6667–6678. https://doi.org/10.37418/amsj.9.12.71
18. Madhavi, G., & Samatha, J. (2020). Secure data storage and access of data in cloud
using Elliptic Curve Cryptography. IEEE Journal, 11. Available online:
www.jespublication.com (accessed on 22 October 2021).
52