Skip to main content
Log in

Generalized Trust Model for Cooperative Routing in MANETs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Routing in a Mobile Ad-Hoc Network (MANET) is prone to various security attacks due to the limitations such as openness, decentralized and infrastructure less network operations. Many of such routing attacks are possible to detect by observing the functional behavior of nodes such as sincerity in packet forwarding, maintaining packet integrity, etc. To do this, the trustworthiness of each node has to be assessed via behavior observation. There exist several methods in the literature for trust assessment. However, each trust model has its advantages and limitations. Further, a common trust model that can be applicable to diverse routing protocols is limited. To this end, the objective of this paper is to propose a Generalized Trust Model (GTM) over MANET routing protocols. GTM is designed to offer self-adaptability, lightweight communication, and effective identification and isolation of malicious nodes during the routing process. The proposed trust model has applied with proactive, reactive, and geographic routing methods. Results that are obtained from the network simulator NS-2 have shown that the proposed method significantly improved the network performance metrics such as packet delivery fraction, throughput, routing load, and end-to-end delay as compared to existing trust models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abu-Ghazaleh, N., Kang, K.D., Liu, K. (2005). Towards resilient geographic routing in wsns. In Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks (pp. 71–78). ACM.

  2. Adnane, A., Bidan, C., & de Sousa Júnior, R. T. (2013). Trust-based security for the olsr routing protocol. Computer Communications, 36(10), 1159–1171.

    Article  Google Scholar 

  3. Alzaid, H., Foo, E., Nieto, J.G. (2008). Rsda: reputation-based secure data aggregation in wireless sensor networks. In Ninth international conference on parallel and distributed computing, applications and technologies, 2008. PDCAT 2008. (pp. 419–424). IEEE.

  4. Aruldoss, M., Lakshmi, T. M., & Venkatesan, V. P. (2013). A survey on multi criteria decision making methods and its applications. American Journal of Information Systems, 1(1), 31–43.

    Google Scholar 

  5. Babu, S. S., Raha, A., Naskar, M. K., et al. (2011). A direct trust dependent link state routing protocol using route trusts for wsns (dtlsrp). Wireless Sensor Network, 3(04), 125.

    Article  Google Scholar 

  6. Buchegger, S., Le Boudec, J.Y. (2002). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing (pp. 226–236). ACM.

  7. Changiz, R., Halabian, H., Yu, F.R., Lambadaris, I., Tang, H., Peter, C.M. (2010). Trust establishment in cooperative wireless networks. In Military communications conference, 2010-MILCOM 2010 (pp. 1074–1079). IEEE.

  8. Cho, J. H., Swami, A., & Chen, I. R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.

    Article  Google Scholar 

  9. Clausen, T., Jacquet, P. (2003). Optimized link state routing protocol (olsr). Technical report.

  10. Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: Milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85–96.

    Article  Google Scholar 

  11. Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. (2013). A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless Personal Communications, 70(1), 189–205.

    Article  Google Scholar 

  12. Duan, J., Yang, D., Zhu, H., Zhang, S., Zhao, J. (2014). Tsrf: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 1–14.

  13. Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.

    Article  Google Scholar 

  14. Ho, J. W., Wright, M., & Das, S. K. (2012). Zonetrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing. IEEE Transactions on Dependable and Secure Computing, 9(4), 494–511.

    Article  Google Scholar 

  15. Hung, K. S., Lui, K. S., Kwok, Y. K. (2007). A trust-based geographical routing scheme in sensor networks. In Wireless communications and networking conference, 2007. WCNC 2007. IEEE (pp. 3123–3127). IEEE.

  16. Johnson, D. B., Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153–181). Springer.

  17. Jsang, A., Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th bled electronic commerce conference (vol. 5, pp. 2502–2511).

  18. Karp, B., Kung, H.T. (2000). Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 243–254). ACM.

  19. Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.

    Article  Google Scholar 

  20. Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced communications and multimedia security (pp. 107–121). Springer.

  21. Momani, M., Challa, S., Alhmouz, R. (2008). Bnwsn: Bayesian network trust model for wireless sensor networks. In Mosharaka international conference on communications, computers and applications, 2008. MIC-CCA 2008 (pp. 110–115). IEEE.

  22. Park, V.D., Corson, M.S. (1997). A highly adaptive distributed routing algorithm for mobile wireless networks. In INFOCOM’97. Sixteenth annual joint conference of the IEEE computer and communications societies. Driving the information revolution. Proceedings IEEE (vol. 3, pp. 1405–1413). IEEE.

  23. Perkins, C., Belding-Royer, E., Das, S. (2003). Ad hoc on-demand distance vector (aodv) routing. Technical report.

  24. Perkins, C.E., Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In ACM SIGCOMM computer communication review (Vol. 24, pp. 234–244). ACM.

  25. Pirzada, A.A., McDonald, C. (2007). Trusted greedy perimeter stateless routing. In 15th IEEE international conference on networks, 2007. ICON 2007 (pp. 206–211). IEEE.

  26. Pirzada, A. A., McDonald, C., & Datta, A. (2006). Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing, 5(6), 695–710.

    Article  Google Scholar 

  27. Probst, M.J., Kasera, S.K. (2007). Statistical trust establishment in wireless sensor networks. In International conference on parallel and distributed systems (Vol. 2, pp. 1–8). IEEE.

  28. Steele, K., Carmel, Y., Cross, J., & Wilcox, C. (2009). Uses and misuses of multicriteria decision analysis (MCDA) in environmental decision making. Risk Analysis, 29(1), 26–33.

    Article  Google Scholar 

  29. Vamsi, P.R., Kant, K. (2014). Systematic design of trust management systems for wireless sensor networks: A review. In 2014 Fourth international conference on advanced computing & communication technologies (ACCT) (pp. 208–215). IEEE.

  30. Venkanna, U., Agarwal, J. K., & Velusamy, R. L. (2015). A cooperative routing for manet based on distributed trust and energy management. Wireless Personal Communications, 81(3), 961–979.

    Article  Google Scholar 

  31. Venkanna, U., & Velusamy, R. L. (2017). Cooperative routing in mobile ad hoc networks using fuzzy logic. International Journal of Ad Hoc and Ubiquitous Computing, 25(3), 147–162.

    Article  Google Scholar 

  32. Venkataraman, R., Pushpalatha, M., & Rama Rao, T. (2012). Regression-based trust model for mobile ad hoc networks. Information Security, IET, 6(3), 131–140.

    Article  Google Scholar 

  33. Wang, J. W., Chen, H. C., & Lin, Y. P. (2010). A secure destination-sequenced distance-vector routing protocol for ad hoc networks. Journal of Networks, 5(8), 942–948.

    Article  Google Scholar 

  34. Wang, Y., Lu, Y. C., Chen, I. R., Cho, J. H., Swami, A., & Lu, C. T. (2014, December). LogitTrust: A logit regression-based trust model for mobile ad hoc networks. In 6th ASE International Conference on Privacy, Security, Risk and Trust (pp. 1–10), Boston, MA.

  35. Xia, H., Jia, Z., & Sha, E. H. M. (2013). Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Information Security, 8(2), 88–103.

    Article  Google Scholar 

  36. Yu, Y., Govindan, R., Estrin, D. (2001). Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Technical report ucla/csd-tr-01-0023, UCLA Computer Science Department.

  37. Zahariadis, T., Trakadas, P., Leligou, H. C., Maniatis, S., & Karkazis, P. (2013). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–826.

    Article  Google Scholar 

  38. Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106–107.

    Article  Google Scholar 

  39. Zhang, G., Zhang, Y., & Chen, Z. (2013). Using trust to secure geographic and energy aware routing against multiple attacks. PLoS ONE, 8(10), e77,488.

    Article  Google Scholar 

  40. Zougagh, H., Toumanari, A., Latif, R., Elmourabit, Y., Idboufker, N. (2014). Modified olsr protocol for detection and prevention of packet dropping attack in manet. International Journal of Computer Applications,  100(17), 32–38.

    Article  Google Scholar 

  41. Zougagh, H., Toumanari, A., Latif, R., & Idboufker, N. (2015). A novel security approach for struggling black hole attack in optimised link state routing protocol. International Journal of Sensor Networks, 18(1–2), 101–110.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Raghu Vamsi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vamsi, P.R., Kant, K. Generalized Trust Model for Cooperative Routing in MANETs. Wireless Pers Commun 97, 4385–4412 (2017). https://doi.org/10.1007/s11277-017-4730-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4730-1

Keywords

Navigation