Abstract
Routing in a Mobile Ad-Hoc Network (MANET) is prone to various security attacks due to the limitations such as openness, decentralized and infrastructure less network operations. Many of such routing attacks are possible to detect by observing the functional behavior of nodes such as sincerity in packet forwarding, maintaining packet integrity, etc. To do this, the trustworthiness of each node has to be assessed via behavior observation. There exist several methods in the literature for trust assessment. However, each trust model has its advantages and limitations. Further, a common trust model that can be applicable to diverse routing protocols is limited. To this end, the objective of this paper is to propose a Generalized Trust Model (GTM) over MANET routing protocols. GTM is designed to offer self-adaptability, lightweight communication, and effective identification and isolation of malicious nodes during the routing process. The proposed trust model has applied with proactive, reactive, and geographic routing methods. Results that are obtained from the network simulator NS-2 have shown that the proposed method significantly improved the network performance metrics such as packet delivery fraction, throughput, routing load, and end-to-end delay as compared to existing trust models.
Similar content being viewed by others
References
Abu-Ghazaleh, N., Kang, K.D., Liu, K. (2005). Towards resilient geographic routing in wsns. In Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks (pp. 71–78). ACM.
Adnane, A., Bidan, C., & de Sousa Júnior, R. T. (2013). Trust-based security for the olsr routing protocol. Computer Communications, 36(10), 1159–1171.
Alzaid, H., Foo, E., Nieto, J.G. (2008). Rsda: reputation-based secure data aggregation in wireless sensor networks. In Ninth international conference on parallel and distributed computing, applications and technologies, 2008. PDCAT 2008. (pp. 419–424). IEEE.
Aruldoss, M., Lakshmi, T. M., & Venkatesan, V. P. (2013). A survey on multi criteria decision making methods and its applications. American Journal of Information Systems, 1(1), 31–43.
Babu, S. S., Raha, A., Naskar, M. K., et al. (2011). A direct trust dependent link state routing protocol using route trusts for wsns (dtlsrp). Wireless Sensor Network, 3(04), 125.
Buchegger, S., Le Boudec, J.Y. (2002). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing (pp. 226–236). ACM.
Changiz, R., Halabian, H., Yu, F.R., Lambadaris, I., Tang, H., Peter, C.M. (2010). Trust establishment in cooperative wireless networks. In Military communications conference, 2010-MILCOM 2010 (pp. 1074–1079). IEEE.
Cho, J. H., Swami, A., & Chen, I. R. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.
Clausen, T., Jacquet, P. (2003). Optimized link state routing protocol (olsr). Technical report.
Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: Milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85–96.
Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. (2013). A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless Personal Communications, 70(1), 189–205.
Duan, J., Yang, D., Zhu, H., Zhang, S., Zhao, J. (2014). Tsrf: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 1–14.
Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298.
Ho, J. W., Wright, M., & Das, S. K. (2012). Zonetrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing. IEEE Transactions on Dependable and Secure Computing, 9(4), 494–511.
Hung, K. S., Lui, K. S., Kwok, Y. K. (2007). A trust-based geographical routing scheme in sensor networks. In Wireless communications and networking conference, 2007. WCNC 2007. IEEE (pp. 3123–3127). IEEE.
Johnson, D. B., Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153–181). Springer.
Jsang, A., Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th bled electronic commerce conference (vol. 5, pp. 2502–2511).
Karp, B., Kung, H.T. (2000). Gpsr: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 243–254). ACM.
Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.
Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced communications and multimedia security (pp. 107–121). Springer.
Momani, M., Challa, S., Alhmouz, R. (2008). Bnwsn: Bayesian network trust model for wireless sensor networks. In Mosharaka international conference on communications, computers and applications, 2008. MIC-CCA 2008 (pp. 110–115). IEEE.
Park, V.D., Corson, M.S. (1997). A highly adaptive distributed routing algorithm for mobile wireless networks. In INFOCOM’97. Sixteenth annual joint conference of the IEEE computer and communications societies. Driving the information revolution. Proceedings IEEE (vol. 3, pp. 1405–1413). IEEE.
Perkins, C., Belding-Royer, E., Das, S. (2003). Ad hoc on-demand distance vector (aodv) routing. Technical report.
Perkins, C.E., Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In ACM SIGCOMM computer communication review (Vol. 24, pp. 234–244). ACM.
Pirzada, A.A., McDonald, C. (2007). Trusted greedy perimeter stateless routing. In 15th IEEE international conference on networks, 2007. ICON 2007 (pp. 206–211). IEEE.
Pirzada, A. A., McDonald, C., & Datta, A. (2006). Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing, 5(6), 695–710.
Probst, M.J., Kasera, S.K. (2007). Statistical trust establishment in wireless sensor networks. In International conference on parallel and distributed systems (Vol. 2, pp. 1–8). IEEE.
Steele, K., Carmel, Y., Cross, J., & Wilcox, C. (2009). Uses and misuses of multicriteria decision analysis (MCDA) in environmental decision making. Risk Analysis, 29(1), 26–33.
Vamsi, P.R., Kant, K. (2014). Systematic design of trust management systems for wireless sensor networks: A review. In 2014 Fourth international conference on advanced computing & communication technologies (ACCT) (pp. 208–215). IEEE.
Venkanna, U., Agarwal, J. K., & Velusamy, R. L. (2015). A cooperative routing for manet based on distributed trust and energy management. Wireless Personal Communications, 81(3), 961–979.
Venkanna, U., & Velusamy, R. L. (2017). Cooperative routing in mobile ad hoc networks using fuzzy logic. International Journal of Ad Hoc and Ubiquitous Computing, 25(3), 147–162.
Venkataraman, R., Pushpalatha, M., & Rama Rao, T. (2012). Regression-based trust model for mobile ad hoc networks. Information Security, IET, 6(3), 131–140.
Wang, J. W., Chen, H. C., & Lin, Y. P. (2010). A secure destination-sequenced distance-vector routing protocol for ad hoc networks. Journal of Networks, 5(8), 942–948.
Wang, Y., Lu, Y. C., Chen, I. R., Cho, J. H., Swami, A., & Lu, C. T. (2014, December). LogitTrust: A logit regression-based trust model for mobile ad hoc networks. In 6th ASE International Conference on Privacy, Security, Risk and Trust (pp. 1–10), Boston, MA.
Xia, H., Jia, Z., & Sha, E. H. M. (2013). Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Information Security, 8(2), 88–103.
Yu, Y., Govindan, R., Estrin, D. (2001). Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Technical report ucla/csd-tr-01-0023, UCLA Computer Science Department.
Zahariadis, T., Trakadas, P., Leligou, H. C., Maniatis, S., & Karkazis, P. (2013). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–826.
Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106–107.
Zhang, G., Zhang, Y., & Chen, Z. (2013). Using trust to secure geographic and energy aware routing against multiple attacks. PLoS ONE, 8(10), e77,488.
Zougagh, H., Toumanari, A., Latif, R., Elmourabit, Y., Idboufker, N. (2014). Modified olsr protocol for detection and prevention of packet dropping attack in manet. International Journal of Computer Applications, 100(17), 32–38.
Zougagh, H., Toumanari, A., Latif, R., & Idboufker, N. (2015). A novel security approach for struggling black hole attack in optimised link state routing protocol. International Journal of Sensor Networks, 18(1–2), 101–110.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vamsi, P.R., Kant, K. Generalized Trust Model for Cooperative Routing in MANETs. Wireless Pers Commun 97, 4385–4412 (2017). https://doi.org/10.1007/s11277-017-4730-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4730-1