Skip to main content
Log in

An Efficient Trust-Based Routing Scheme Against Malicious Communication in MANET

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

The ideal routing operation in a Mobile Ad Hoc NETwork (MANET) is fundamentally dependent on the supportive node cooperation because the existence of even a single misbehaving node can cause the problem of routing disruption. This paper proposes an Efficient Trust-based Routing Scheme (ETRS) to mitigate the misbehaving nodes thereby achieving secure communication in MANET. The proposed scheme addresses the wide security concerns including the detection and prevention of malicious nodes, the reliable sharing of trust information, and the trusted route maintenance at one place. The scheme is developed and implemented in the framework of an underlying dynamic routing protocol Ad hoc On-demand Distance Vector (AODV). Its potential is validated through a comparative performance analysis with the state-of-the-art Evolutionary Self-Cooperative Trust (ESCT) scheme and the standard AODV. The superiority is proved by carrying out extensive simulations based on the measurements of Packet Delivery Ratio (PDR), end to end delay, throughput, jitter, number of data packets dropped, and the Probability of Detection (PoD) of node behavior against the variations in node density, node mobility, and attacker scenarios. The proposed scheme thus provides a gross contribution to the research society which is unlike many works from literature those focused only on selected security concerns causing the routing schemes to achieve a trade-off in the desired values of performance metrics and claim the efficiency at the expense of other aspects.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Li, T., Ma, J., Pei, Q., Song, H., Shen, Y., Sun, C.: DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification. IEEE Access 7, 35302–35316 (2019).

    Article  Google Scholar 

  2. Wilson, J., Subramaniam, K.: Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network. Peer-to-Peer Networking and Applications, Springer 13, 1091–1101 (2020).

    Article  Google Scholar 

  3. Du, S., Hou, J., Song, S., Song, Y., Zhu, Y.: A geographical hierarchy greedy routing strategy for vehicular big data communications over millimeter wave. Physical Communication, Elsevier 40, 1–9 (2020).

    Google Scholar 

  4. Manivannan, D., Moni, S.S., Zeadally, S.: Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Vehicular Communications, Elsevier 25, 1–18 (2020)

    Google Scholar 

  5. Fang, W., Zhang, W., Chen, W., Liu, Y., Tang, C.: TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wireless Networks, Springer 26, 3169–3182 (2020).

    Article  Google Scholar 

  6. Saini, T.K., Sharma, S.C.: Recent advancements, review analysis, and extensions of the aodv with the illustration of the applied concept. Ad Hoc Networks, Elsevier 103, 1–20 (2020).

    Article  Google Scholar 

  7. Kojima, H., Yanai, N., Cruz, J.P.: ISDSRC: Improving the security and availability of secure routing protocol. IEEE Access 7, 74849–74868 (2019).

    Article  Google Scholar 

  8. Pereira, E.E.A., Leonardo, E.J.: Performance Evaluation of DSR for MANETs with Channel Fading. International Journal of Wireless Information Networks, Springer 27, 494–502 (2020).

    Article  Google Scholar 

  9. Sharma, A., Pilli, E.S., Mazumdar, A.P., Gera, P.: Towards trustworthy internet of things: A survey on trust management applications and schemes. Computer Communications, Elsevier 160, 475–493 (2020)

    Article  Google Scholar 

  10. Chahal, R.K., Kumar, N., Batra, S.: Trust management in social internet of things: A taxonomy, open issues, and challenges. Computer Communications, Elsevier 150, 13–46 (2020).

    Article  Google Scholar 

  11. Cai, R.J., Li, X.J., Chong, P.H.J.: An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs. IEEE Transactions on Mobile Computing 18(1), 42–55 (2019).

    Article  Google Scholar 

  12. Mahapatra, S.N., Singh, B.K., Kumar, V.: A survey on secure transmission in internet of things: Taxonomy, recent techniques, research requirements, and challenges. Arabian Journal for Science and Engineering, Springer 45, 6211–6240 (2020).

    Article  Google Scholar 

  13. Qurashi, M.A., Angelopoulos, C.M., Katos, V.: An architecture for resilient intrusion detection in ad-hoc networks. Journal of Information Security and Applications, Elsevier 53, 1–12 (2020).

    Google Scholar 

  14. Riasudheen, H., Selvamani, K., Mukherjee, S., Divyasree, I.: An efficient energy-aware routing scheme for cloud-assisted manets in 5G. Ad Hoc Networks, Elsevier 97, 1–22 (2020).

    Article  Google Scholar 

  15. Xu, H., et al.: Trust-based probabilistic broadcast scheme for mobile ad hoc networks. IEEE Access 8, 21380–21392 (2020).

    Article  Google Scholar 

  16. Theerthagiri, P.: FUCEM: futuristic cooperation evaluation model using markov process for evaluating node reliability and link stability in mobile ad hoc network. Wireless Networks, Springer 26, 4173–4188 (2020).

    Article  Google Scholar 

  17. Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: Trust-aware and cooperative routing protocol for iot security. Journal of Information Security and Applications, Elsevier 52, 1–17 (2020).

    Google Scholar 

  18. Jhaveri, R.H., Patel, N.M.: Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. International Journal of Communication Systems, Wiley 30, 1–24 (2016).

    Google Scholar 

  19. Desai, A.M., Jhaveri, R.H.: Secure routing in mobile Ad hoc networks: a predictive approach. International Journal of Information Technology volume, Springer 11, 345–356 (2018).

    Article  Google Scholar 

  20. Jhaveri, R.H., Desai, A., Patel, A., Zhong, Y.: A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs. Security and Communication Networks, Wiley-Hindawi, 1–13 (2018).

  21. Ochola, E., Mejaele, L., Eloff, M., van der Poll, J.: Manet Reactive Routing Protocols Node Mobility Variation Effect in Analysing the Impact of Black Hole Attack. SAIEE Africa Research Journal 108, 80–92 (2017).

    Article  Google Scholar 

  22. Chen, I.R., Bao, F., Chang, M., Cho, J.H.: Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing. IEEE Transactions On Parallel and Distributed Systems 25, 1200–1210 (2014).

    Article  Google Scholar 

  23. EXata: Exata network emulator software (2021). https://www.scalable-networks.com/exata-network-emulator-software

  24. Moradipour, O., Fathi, M.: An Anti-Gray Hole Attack Scheme in Mobile Ad Hoc Network. International Journal of Wireless Information Networks, Springer 27, 558–567 (2020)

    Article  Google Scholar 

  25. Poongodi, T., Khan, M.S., Patan, R., Gandomi, A.H., Balusamy, B.: Robust defense scheme against selective drop attack in wireless ad hoc networks. IEEE Access 7, 18409–18419 (2019).

    Article  Google Scholar 

  26. Bhati, B.S., Venkataram, P.: Performance Analysis of Privacy Protection System During Data Transfer in MANETs. International Journal of Wireless Information Networks, Springer 25, 30–43 (2018).

    Article  Google Scholar 

  27. Elmahdi, E., Yoo, S.M., Sharshembiev, K.: Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. Journal of Information Security and Applications, Elsevier 51, 1–10 (2020).

    Google Scholar 

  28. Bai, R., Singhal, M.: A Study on Different Security Attacks Associated With Routing In Mobile Ad Hoc Networks. International Journal of Pure and Applied Mathematics 119(14), 1833–1841 (2018).

    Google Scholar 

  29. Ndajah, P., Matine, A.O., Hounkonnou, M.N.: Black Hole Attack Prevention in Wireless Peer-to-Peer Networks: A New Strategy. International Journal of Wireless Information Networks, Springer 26, 48–60 (2019).

    Article  Google Scholar 

  30. El-Semary, A.M., Diab, H.: BP-AODV: Blackhole protected aodv routing protocol for MANETs based on chaotic map. IEEE Access 7, 95197–95211 (2019).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ankita A. Mahamune.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mahamune, A.A., Chandane, M.M. An Efficient Trust-Based Routing Scheme Against Malicious Communication in MANET. Int J Wireless Inf Networks 28, 344–361 (2021). https://doi.org/10.1007/s10776-021-00523-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-021-00523-w

Keywords

Navigation