Volume 4 - Issue 4
A Cooperative Trust Bit-Map Routing Protocol Using the GA Algorithm for Reducing the Damages from the InTs in WANETs
- Hsing-Chung Chen
Dept. of Computer Science and Information Engineering Asia University, Taichung 41354, Taiwan, R.O.C., Dept. of Medical Research, China Medical University Hospital China Medical University Taichung, 40402, Taiwan, R.O.C. (Research Consultant)
cdma2000@asia.edu.tw
- Hui-Kai Su
Dept. of Electrical Engineering National Formosa University, Yunlin 632, Taiwan, R.O.C.
hksu@nfu.edu.tw
Keywords: cooperative routing protocol, trust routing protocol, wireless ad hoc network
Abstract
The wireless ad hoc network (WANET) is a type of wireless network in which some nodes are decentralized
as well as self-organized in a wireless local area network. In recent years, insider threats
increasingly damage the works not only in computer information systems, but also many wireless
communications systems e.g. WANETs. We must take into consideration that the majority of insider
threats come from users who are fully authorized to use theWANET systems they are accessing. Due
to these kinds of situations, a Cooperative Trust Bit-Map Routing Protocol (CTBRP) using an n-Bits
Cooperative Trust Bit-Map Routing Table (n-CTBRT) is proposed to be used against insider threats
in WANETs. This CTBRP proposes using a Generic Algorithm in this paper for establishing cooperative
evaluating trust values. Each node evaluates her/his neighboring nodes in order to reduce the
untrusted routes. Thus, it could reduce the damage away from the insider threats in a WANET. This
approach is one of behavioral-based techniques. In fact, the compromised nodes or selfish nodes or
non-honest nodes will be evaluated as having low trust values or scores. Once a relay node had been
compromised or damaged by insider threats in this WANET, the communication system will use this
approach to find out about it according to its abnormal behaviors. Therefore, the proposed routing
protocol in the WANET could evaluate the wrongful behaviors of the compromised node or a selfish
node efficiently in order to prevent InTs.