Papers by Dr. Poonam Gera

Mobile Ad Hoc Networks (MANETs) are comprised of highly mobile nodes that communicate with each o... more Mobile Ad Hoc Networks (MANETs) are comprised of highly mobile nodes that communicate with each other without relying on a pre-existing network infrastructure. Therefore they are ideally suited for use in rescue and emergency operations. Due to their applications in situations such as emergencies, crisis management, military and healthcare, message security is of paramount importance in mobile ad-hoc networks. However, because of the absence of a flxed infrastructure with designated centralized access points, implementation of hard-cryptographic security is a challenging prospect. In an adverse environment, both route discovery and data transmission are vulnerable to a variety of attacks. A misbehaving node can abide well in the route discovery phase and hence be placed on utilized routes. Later, it could tamper with the in-transit data in an arbitrary manner and degrade the network performance. This behavior can be nullifled by securing the data transmission phase. In this paper, w...
Trust based security in MANET routing protocols
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India - A2CWiC '10, 2010
Ad-hoc networks establish communication in improvised environments without requiring any fixed in... more Ad-hoc networks establish communication in improvised environments without requiring any fixed infrastructure. These networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. Therefore, it is required that the nodes cooperate for the integrity of network operation. However, nodes may refuse to cooperate by not forwarding packets to others for selfish reasons
Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes
Proceedings of the International Conference and Workshop on Emerging Trends in Technology - ICWET '10, 2010
Security in infrastructure-less networks like MANETs (Mobile Ad Hoc Networks) has proven to be a ... more Security in infrastructure-less networks like MANETs (Mobile Ad Hoc Networks) has proven to be a challenging task. Inherently secure routing protocols is a must for operational continuity of such networks. A number of secure routing protocols based on trust have recently been proposed. These protocols use the traditional route discovery model where along with normal nodes misbehaving nodes also participate
Eliminating misbehaving nodes by opinion based trust evaluation model in MANETs
Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS '11, 2011
Ad-hoc networking refers to the spontaneous formation of a network of nodes without the help of a... more Ad-hoc networking refers to the spontaneous formation of a network of nodes without the help of any infrastructure, usually through wireless communication channels. In ad-hoc networks, a basic routing infrastructure emerges through the collaboration of every node with its neighbors to forward packets towards chosen destinations. It is critical to detect and isolate the misbehaving nodes in order to avoid

Communications in Computer and Information Science, 2011
A secure routing mechanism is the basis of security in mobile ad hoc networks. Seeing that nodes ... more A secure routing mechanism is the basis of security in mobile ad hoc networks. Seeing that nodes have to share routing information in order to find the route to the destination, further an ad hoc network is an open setting where everyone can participate, trust is a key concept in secure routing mechanisms. In this paper, we propose a novel opinion based trust evaluation model to detect misbehaving nodes and further securing data transmission by avoiding such node from path selected. Misbehaving nodes are detected based on the node own direct observation, but in the circumstances of network failure as node congestion or collusion a well-behaving node can be misidentified. Therefore we require opinion of other nodes before proceeding to isolation of such misbehaving node. Source nodes maintain a path reliability index associated with each path to the intended destination. The most trustworthy and reliable path is selected by source node for forwarding data packets to the intended destination. We have evaluated the misbehaving node detection rate and the performance of our method along a number of parameters through simulation. Results show that our method increases the throughput of the network while also discovering a secure route.

International Journal of Computer Applications, 2010
Ad-hoc networks establish communication in improvised environments without requiring any fixed in... more Ad-hoc networks establish communication in improvised environments without requiring any fixed infrastructure. These networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. Therefore, it is required that the nodes cooperate for the integrity of network operation. However, nodes may refuse to cooperate by not forwarding packets to others for selfish reasons and/or not wanting to exhaust their resources. Due to high mobility of nodes in the network, detecting misbehavior is a complex problem. Nodes have to share routing information in order for each to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of secure routing protocols based on trust have recently been proposed. However, all these protocols use the traditional route discovery model, where a node drops RREQ packet if its own ID is in the source route of the packet, or if it has previously processed the packet. A misbehaving node takes advantage of this vulnerability and forwards the RREQ fast, so that the RREQ received from other nodes are dropped and the path discovered includes itself (the misbehaving node). In this paper, we present a unique trust based method which is not vulnerable to this behavior. In our method, each node broadcasts a RREQ packet if it is received from different neighbors. A secure and efficient route to the destination is calculated as a weighted average of the trust value of the nodes in the route, with respect to its behavior observed by its neighboring nodes and the number of nodes in the route. We evaluate the misbehaving node detection rate and the efficiency of our method along a number of parameters. Results show that our method increases the throughput of the network while discovering a secure route.
Trust based multi-path routing for end to end secure data delivery in manets
Proceedings of the 3rd international conference on Security of information and networks - SIN '10, 2010
Mobile Ad Hoc Networks (MANETs) are comprised of highly mobile nodes that communicate with each o... more Mobile Ad Hoc Networks (MANETs) are comprised of highly mobile nodes that communicate with each other without relying on a pre-existing network infrastructure. Therefore they are ideally suited for use in rescue and emergency operations. These applications have increased security requirements with low acceptable delays, in order to provide high quality service. However, MANETs were not designed with security protection
Trust Based Multi Path DSR Protocol
2010 International Conference on Availability, Reliability and Security, 2010
Ad-hoc networks establish communication in improvised environments without requiring any fixed in... more Ad-hoc networks establish communication in improvised environments without requiring any fixed infrastructure. These networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. Therefore secure routing is a must for such networks. A number of secure routing protocols based on trust have recently been proposed. However, all these protocols use the traditional
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes
Computer Communications

Misbehaving nodes detection through opinion based trust evaluation model in MANETs
Proceedings of the International Conference & Workshop on Emerging Trends in Technology - ICWET '11, 2011
ABSTRACT Routing protocols are the binding force in mobile ad hoc network (MANETs) since they fac... more ABSTRACT Routing protocols are the binding force in mobile ad hoc network (MANETs) since they facilitate communication beyond the wireless transmission range of the nodes. However, the infrastructure-less, pervasive, and distributed nature of MANETs renders them vulnerable to security threats. In this paper, we propose a novel opinion based trust-aware routing protocol (OBTRP) for MANETs to protect forwarded packets from intermediary malicious nodes. In the proposed model, each node determines the trustworthiness of the other nodes with respect to behavior observed. It calculated the direct trust by the information obtained independently of other nodes and indirect trust information obtained via opinion of other nodes. Our trust model exploits information sharing among nodes to accelerate the convergence of trust establishment procedures, yet is robust against the propagation of false trust information by malicious nodes. We present simulation results which demonstrate the effectiveness of the proposed trust model scheme in a variety of scenarios involving nodes that are malicious with respect to both packet forwarding and trust propagation.
Uploads
Papers by Dr. Poonam Gera