Skip to main content
Log in

Context sensitive trust based geographic opportunistic routing in mobile ad hoc networks

  • Published:
Sādhanā Aims and scope Submit manuscript

Abstract

Position based opportunistic routing (POR) is a stateless, robust, and reliable geographic routing protocol in Mobile AdHoc NETwork (MANET). The opportunistic routing embraces broadcast property of wireless channels and utilizes it for opportunistic forwarding. Both the malicious node behavior and the backup nodes’ behavior are equally treated as malicious in the existing misbehavior detection mechanisms. Hence, incorporating a general trust model in POR is not combative with routing attacks. It is necessary to determine whether the misbehavior is likely a result of malicious activity or due to the backup scenario of opportunistic forwarding. On the other hand, if context-sensitive trust information is available on every node, it ensures a fair decision making and also supports secured routing in an opportunistic approach. This work investigates the utilization of context attributes along with generic trust model to allow POR for secure and reliable data forwarding. This paper introduces context-sensitive trust for choosing the data forwarding node in POR (CPOR) to assist opportunistic routing in selecting the trusted optimal data forwarding node and to cope with both security and reliability of communications. The proposed work exercises both coarse- and fine-grained trust evaluation to strengthen the trustworthiness. The coarse-grained trust measure includes positive progress per hop and behavioral attribute of the nodes in terms of routing service. The fine-grained trust evaluation differs the opportunistic routing environment from the adverse scenarios and aids the source node such that it builds a highly trusted positive progress set using contextual attributes. The fine-grained trust evaluation deduces the ideal contextual information such as the link quality, battery energy, and the backup service to determine the accurate trust value of nodes. As a result, it involves optimal routes and enables CPOR to maintain the routing performance equal to the POR even in the presence of malicious nodes in the network. The simulation results demonstrate that the packet delivery ratio of the proposed context-aware trust model is substantially high even when 50% of the total nodes are found malicious and outperforms the trust-aware opportunistic routing protocol (TAOR).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13
Figure 14

Similar content being viewed by others

References

  1. Shengbo Yang, Feng Zhong, Chai Kiat Yeo, Bu Sung Lee and Jeff Boleng 2009 Position based opportunistic routing for robust data delivery in MANETs. In: Proceedings of IEEE Communications Society (GLOBECOM), pp. 1–6

  2. Shengbo Yang, Chai Kiat Yeo and Bu Sung Lee 2012 Toward reliable data delivery for highly dynamic mobile ad hoc networks. IEEE Trans. Mobile Comput. 11(1):111–124

  3. Tavakolifard M 2009 Situation-aware trust management. In: ACM Proceedings of 3rd conference on Recommender Systems, pp. 413–416

  4. Tavakolifard M, Herrmann P and Knapskog S J 2009 Inferring trust based on similarity with TILLIT. In: Proceedings of 3rd International conference on Trust Management, IFIP Advances in Information and Communication Technology: Trust Management III, Springer Boston, vol. 300, pp. 138–148

  5. Cahill V, Grey E, Seigneur J M, Jensen C and Chen Y 2003 Using trust for secure collaboration in uncertain environments. IEEE Trans. Pervasive Comput. Mag. 2

  6. Jin-Hee Cho, Ananthram Swami and Ing-Ray Chen 2011 A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4): 562–583

    Article  Google Scholar 

  7. Ricardo Neisse, Maarten Wegdam, Marten van Sinderen and Gabriele Lenzini 2007 Trust management model and architecture for context-aware service platforms. In: ACM Proceedings of the OTM Confederated International Conference on “On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA and IS”, vol. 2, pp. 1803–1820

  8. Melanie Hartmann, Holger Ziekow and Max Muhlhauser 2007 Context aware routing in sensor networks. IEEE ITG- GI conference on Communication in Distributed Systems, pp. 1–6

  9. Jiaxi You, Dominik Lieckfeldt, Frank Reichenbach and Dirk Timmermann 2009 Context-aware geographic routing for sensor networks with routing holes. IEEE Conference on Wireless Communication and Networking, pp. 1–6

  10. Mirco Musolesi and Cecilia Mascolo 2006 CAR: Context-aware adaptive routing for delay tolerant mobile networks. In: ACM Proceedings of the International Conference on Wireless Communications and Mobile Computing. pp. 533–538

  11. Maria Moloney and Stefan Weber 2005 A context-aware trust-based security system for ad hoc networks. IEEE Workshop of the 1st international conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 153–160

  12. Paul K and Westhoff D 2002 Context aware detection of selfish nodes in DSR based ad-hoc networks. IEEE Conf. Global Commun. 1: 178–182

    Google Scholar 

  13. Zahariadis T, Trakadas P, Leligou H C, Maniatis S, Karkazis P 2013 A novel trust-aware geographical routing scheme for wireless sensor networks. Wirel. Personal Commun., Springer 69(2): 805–826

  14. Leligou H C, Trakadas P, Maniatis S, Karkazis P and Zahariadis T 2012 Combining trust with location information for routing in wireless sensor networks. Wirel. Commun. Mobile Comput. 12(12): 1091–1103

    Article  Google Scholar 

  15. Joana Urbano, Ana Paula Rocha and Eugenio Oliveira 2010 Trust estimation using contextual fitness. In: ACM Proceedings of the 4th KES International Conference on Agent and Multi-agent Systems: Technologies and Applications, vol. 1, pp. 42–51

  16. Wenjia Li, Anupam Joshi and Tim Finin 2013 CAST: Context-aware security and trust framework for mobile ad-hoc networks using policies. ACM Trans. Distrib. Parallel Databases 31(2): 353–376

    Article  Google Scholar 

  17. Salehi Mahmood and Azzedine Boukerche 2014 Trust-aware opportunistic routing protocol for wireless networks. In: Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 79–86

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A Rajesh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajesh, A., Mohan Kumar, N. Context sensitive trust based geographic opportunistic routing in mobile ad hoc networks. Sādhanā 41, 1261–1274 (2016). https://doi.org/10.1007/s12046-016-0557-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12046-016-0557-9

Keywords

Navigation