Wireless Personal Communications

, Volume 97, Issue 3, pp 4385–4412 | Cite as

Generalized Trust Model for Cooperative Routing in MANETs

  • P. Raghu VamsiEmail author
  • Krishna Kant


Routing in a Mobile Ad-Hoc Network (MANET) is prone to various security attacks due to the limitations such as openness, decentralized and infrastructure less network operations. Many of such routing attacks are possible to detect by observing the functional behavior of nodes such as sincerity in packet forwarding, maintaining packet integrity, etc. To do this, the trustworthiness of each node has to be assessed via behavior observation. There exist several methods in the literature for trust assessment. However, each trust model has its advantages and limitations. Further, a common trust model that can be applicable to diverse routing protocols is limited. To this end, the objective of this paper is to propose a Generalized Trust Model (GTM) over MANET routing protocols. GTM is designed to offer self-adaptability, lightweight communication, and effective identification and isolation of malicious nodes during the routing process. The proposed trust model has applied with proactive, reactive, and geographic routing methods. Results that are obtained from the network simulator NS-2 have shown that the proposed method significantly improved the network performance metrics such as packet delivery fraction, throughput, routing load, and end-to-end delay as compared to existing trust models.


Generalized Trust Model Geographic routing (GPSR protocol) Proactive routing (AODV protocol) Reactive routing (OLSR protocol) Self adaptability Security trust model Wireless ad-hoc networks 


  1. 1.
    Abu-Ghazaleh, N., Kang, K.D., Liu, K. (2005). Towards resilient geographic routing in wsns. In Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks (pp. 71–78). ACM.Google Scholar
  2. 2.
    Adnane, A., Bidan, C., & de Sousa Júnior, R. T. (2013). Trust-based security for the olsr routing protocol. Computer Communications, 36(10), 1159–1171.CrossRefGoogle Scholar
  3. 3.
    Alzaid, H., Foo, E., Nieto, J.G. (2008). Rsda: reputation-based secure data aggregation in wireless sensor networks. In Ninth international conference on parallel and distributed computing, applications and technologies, 2008. PDCAT 2008. (pp. 419–424). IEEE.Google Scholar
  4. 4.
    Aruldoss, M., Lakshmi, T. M., & Venkatesan, V. P. (2013). A survey on multi criteria decision making methods and its applications. American Journal of Information Systems, 1(1), 31–43.Google Scholar
  5. 5.
    Babu, S. S., Raha, A., Naskar, M. K., et al. (2011). A direct trust dependent link state routing protocol using route trusts for wsns (dtlsrp). Wireless Sensor Network, 3(04), 125.CrossRefGoogle Scholar
  6. 6.
    Buchegger, S., Le Boudec, J.Y. (2002). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing (pp. 226–236). ACM.Google Scholar
  7. 7.
    Changiz, R., Halabian, H., Yu, F.R., Lambadaris, I., Tang, H., Peter, C.M. (2010). Trust establishment in cooperative wireless networks. In Military communications conference, 2010-MILCOM 2010 (pp. 1074–1079). IEEE.Google Scholar
  8. 8.
    Cho, J. H., Swami, A., & Chen, I. R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.CrossRefGoogle Scholar
  9. 9.
    Clausen, T., Jacquet, P. (2003). Optimized link state routing protocol (olsr). Technical report.Google Scholar
  10. 10.
    Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: Milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85–96.CrossRefGoogle Scholar
  11. 11.
    Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. (2013). A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless Personal Communications, 70(1), 189–205.CrossRefGoogle Scholar
  12. 12.
    Duan, J., Yang, D., Zhu, H., Zhang, S., Zhao, J. (2014). Tsrf: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 1–14.Google Scholar
  13. 13.
    Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.CrossRefGoogle Scholar
  14. 14.
    Ho, J. W., Wright, M., & Das, S. K. (2012). Zonetrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing. IEEE Transactions on Dependable and Secure Computing, 9(4), 494–511.CrossRefGoogle Scholar
  15. 15.
    Hung, K. S., Lui, K. S., Kwok, Y. K. (2007). A trust-based geographical routing scheme in sensor networks. In Wireless communications and networking conference, 2007. WCNC 2007. IEEE (pp. 3123–3127). IEEE.Google Scholar
  16. 16.
    Johnson, D. B., Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153–181). Springer.Google Scholar
  17. 17.
    Jsang, A., Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th bled electronic commerce conference (vol. 5, pp. 2502–2511).Google Scholar
  18. 18.
    Karp, B., Kung, H.T. (2000). Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 243–254). ACM.Google Scholar
  19. 19.
    Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.CrossRefGoogle Scholar
  20. 20.
    Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced communications and multimedia security (pp. 107–121). Springer.Google Scholar
  21. 21.
    Momani, M., Challa, S., Alhmouz, R. (2008). Bnwsn: Bayesian network trust model for wireless sensor networks. In Mosharaka international conference on communications, computers and applications, 2008. MIC-CCA 2008 (pp. 110–115). IEEE.Google Scholar
  22. 22.
    Park, V.D., Corson, M.S. (1997). A highly adaptive distributed routing algorithm for mobile wireless networks. In INFOCOM’97. Sixteenth annual joint conference of the IEEE computer and communications societies. Driving the information revolution. Proceedings IEEE (vol. 3, pp. 1405–1413). IEEE.Google Scholar
  23. 23.
    Perkins, C., Belding-Royer, E., Das, S. (2003). Ad hoc on-demand distance vector (aodv) routing. Technical report.Google Scholar
  24. 24.
    Perkins, C.E., Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In ACM SIGCOMM computer communication review (Vol. 24, pp. 234–244). ACM.Google Scholar
  25. 25.
    Pirzada, A.A., McDonald, C. (2007). Trusted greedy perimeter stateless routing. In 15th IEEE international conference on networks, 2007. ICON 2007 (pp. 206–211). IEEE.Google Scholar
  26. 26.
    Pirzada, A. A., McDonald, C., & Datta, A. (2006). Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing, 5(6), 695–710.CrossRefGoogle Scholar
  27. 27.
    Probst, M.J., Kasera, S.K. (2007). Statistical trust establishment in wireless sensor networks. In International conference on parallel and distributed systems (Vol. 2, pp. 1–8). IEEE.Google Scholar
  28. 28.
    Steele, K., Carmel, Y., Cross, J., & Wilcox, C. (2009). Uses and misuses of multicriteria decision analysis (MCDA) in environmental decision making. Risk Analysis, 29(1), 26–33.CrossRefGoogle Scholar
  29. 29.
    Vamsi, P.R., Kant, K. (2014). Systematic design of trust management systems for wireless sensor networks: A review. In 2014 Fourth international conference on advanced computing & communication technologies (ACCT) (pp. 208–215). IEEE.Google Scholar
  30. 30.
    Venkanna, U., Agarwal, J. K., & Velusamy, R. L. (2015). A cooperative routing for manet based on distributed trust and energy management. Wireless Personal Communications, 81(3), 961–979.CrossRefGoogle Scholar
  31. 31.
    Venkanna, U., & Velusamy, R. L. (2017). Cooperative routing in mobile ad hoc networks using fuzzy logic. International Journal of Ad Hoc and Ubiquitous Computing, 25(3), 147–162.CrossRefGoogle Scholar
  32. 32.
    Venkataraman, R., Pushpalatha, M., & Rama Rao, T. (2012). Regression-based trust model for mobile ad hoc networks. Information Security, IET, 6(3), 131–140.CrossRefGoogle Scholar
  33. 33.
    Wang, J. W., Chen, H. C., & Lin, Y. P. (2010). A secure destination-sequenced distance-vector routing protocol for ad hoc networks. Journal of Networks, 5(8), 942–948.CrossRefGoogle Scholar
  34. 34.
    Wang, Y., Lu, Y. C., Chen, I. R., Cho, J. H., Swami, A., & Lu, C. T. (2014, December). LogitTrust: A logit regression-based trust model for mobile ad hoc networks. In 6th ASE International Conference on Privacy, Security, Risk and Trust (pp. 1–10), Boston, MA.Google Scholar
  35. 35.
    Xia, H., Jia, Z., & Sha, E. H. M. (2013). Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Information Security, 8(2), 88–103.CrossRefGoogle Scholar
  36. 36.
    Yu, Y., Govindan, R., Estrin, D. (2001). Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Technical report ucla/csd-tr-01-0023, UCLA Computer Science Department.Google Scholar
  37. 37.
    Zahariadis, T., Trakadas, P., Leligou, H. C., Maniatis, S., & Karkazis, P. (2013). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–826.CrossRefGoogle Scholar
  38. 38.
    Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106–107.CrossRefGoogle Scholar
  39. 39.
    Zhang, G., Zhang, Y., & Chen, Z. (2013). Using trust to secure geographic and energy aware routing against multiple attacks. PLoS ONE, 8(10), e77,488.CrossRefGoogle Scholar
  40. 40.
    Zougagh, H., Toumanari, A., Latif, R., Elmourabit, Y., Idboufker, N. (2014). Modified olsr protocol for detection and prevention of packet dropping attack in manet. International Journal of Computer Applications,  100(17), 32–38.CrossRefGoogle Scholar
  41. 41.
    Zougagh, H., Toumanari, A., Latif, R., & Idboufker, N. (2015). A novel security approach for struggling black hole attack in optimised link state routing protocol. International Journal of Sensor Networks, 18(1–2), 101–110.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringJaypee Institute of Information TechnologyNoidaIndia

Personalised recommendations