Analysis and Evaluation of Cooperative Trust Models in Ad Hoc Networks: Application to OLSR Routing Protocol

  • Fatima LakramiEmail author
  • Najib EL Kamoun
  • Ouidad Labouidya
  • Khalid Zine-Dine
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 92)


Mobile Ad Hoc Networks are wireless networks, of which the installation does not require any existing infrastructure, this property has induced the philosophy of “all distributed” and distributed control. The departure and arrival of a node is autonomous and does not interfere with the continuity of services. These advantages allow the deployability of these networks in situations where the use of wired networks is expensive, difficult or even impossible. However, with these advantages, some security concerns are emerging. Indeed, with a shared communication medium and in the absence of a central entity or a fixed infrastructure, traditional security solutions are not adapted, it is now difficult to manage encryption keys, certificate distribution, and trust management between nodes. As a node does not necessarily have knowledge about others when the network is growing, trust a priori may not exist. We are interested in this paper to study security problems in Manets in general, and more particularly those related to trust management. This paper detail, the principle, the constraints, and the challenges of deploying suitable trust models, to deal with Manets constraints. An example of a light trust model for enforcing security in OLSR routing protocol used for Manets, is presented and evaluated.


Ad Hoc network Distributed control Selfishness Security Trust models OLSR 


  1. 1.
    Gagandeep, A., Kumar, P.: Analysis of different security attacks in MANETs on protocol stack A-review. Int. J. Eng. Adv. Technol. (IJEAT) 1(5), 269–275 (2012)Google Scholar
  2. 2.
    Rajkumar, K., Prasanna, S.: Complete analysis of various attacks in Manet. Int. J. Pure Appl. Math. 119(15), 1721–1727 (2018)Google Scholar
  3. 3.
    Beghriche, A., Bilami, A.: Un modèle de Sécurité basé sur la Confiance Floue Pour Assurer la Qualité de Service (QoS) dans Les Réseaux Mobiles AdhocGoogle Scholar
  4. 4.
    Pooja, P., Puja, P.: Trust based security in Manet. Int. J. Res. Eng. Technol. 5, 11 (2018)Google Scholar
  5. 5.
    Singh, D., Bedi, S.S.: Novel intrusion detection in MANETs based on trust. Int. J. Comput. Sci. Inf. Technol. 6(4), 3556–3560 (2015)Google Scholar
  6. 6.
    Maglaras, L.A.: A novel distributed intrusion detection system for vehicular adhoc networks. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 6(4), 101–106 (2015)Google Scholar
  7. 7.
    Shams, E.A., Rizaner, A.: A novel support vector machine based intrusion detection system for mobile adhoc networks. Wireless Netw. 24(5), 1821–1829 (2018)CrossRefGoogle Scholar
  8. 8.
    Tripathy, B.K., Bera, P., Rahman, M.A.: Analysis of trust models in Mobile Adhoc Networks: a simulation based study. In: The 8th International Conference on Communication Systems and Networks (COMSNETS), pp. 1–8. IEEE, January 2016Google Scholar
  9. 9.
    Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: DoS attacks in mobile adhoc networks: a survey. In: Second International Conference on Advanced Computing & Communication Technologies, pp. 535–541. IEEE, January 2012Google Scholar
  10. 10.
    Omar, M., Challal, Y., Bouabdallah, A.: Certification-based trust models in mobile adhoc networks: a survey and taxonomy. J. Netw. Comput. Appl. 35(1), 268–286 (2012)CrossRefGoogle Scholar
  11. 11.
    Cho, J.H., Swami, A., Chen, R.: A survey on trust management for mobile adhoc networks. IEEE Commun. Surv. Tutorials 13(4), 562–583 (2010)CrossRefGoogle Scholar
  12. 12.
    Marias, G.F., Georgiadis, P., Flitzanis, D., Mandalas, K.: Cooperation enforcement schemes for MANETs: a survey. Wireless Commun. Mobile Comput. 6(3), 319–332 (2006)CrossRefGoogle Scholar
  13. 13.
    Mishra, A., Nadkarni, K.M.: Security in wireless adhoc networks. In: The Handbook of Adhoc Wireless Networks, pp. 477–527. CRC press, Boca Raton (2002)Google Scholar
  14. 14.
    Zougagh, H., Toumanari, A., Latif, R., Idboufker, N.: A novel security approach for struggling black hole attack in optimised link state routing protocol. Int. J. Sens. Netw. 18(1–2), 101–110 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Fatima Lakrami
    • 1
    Email author
  • Najib EL Kamoun
    • 1
  • Ouidad Labouidya
    • 1
  • Khalid Zine-Dine
    • 2
  1. 1.STIC Laboratory, Faculty of SciencesChouaib Doukkali UniversityEl JadidaMorocco
  2. 2.LAROSERI Lab, Faculty of SciencesChouaib Doukkali UniversityEl JadidaMorocco

Personalised recommendations