Trust Based Model for Mobile Ad-Hoc Network in Internet of Things

  • Upendra SinghEmail author
  • Mukul Shukla
  • Ashish Kumar Jain
  • Mohan Patsariya
  • Ravikant Itare
  • Sakshi Yadav
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)


Internet of things (IoT) is the internet connectivity of heterogeneous network with physical devices. The main idea of IoT is to establish communication of smart devices with global communication. These wireless networks can be wireless sensor network (WSN), Wi-Fi and mobile ad-hoc network (MANET). To make IoT a reality for smart and user-friendly environment as well as economical, it needs compatibility of IoT with wireless sensor network (WSN) and mobile ad-hoc network (MANET). This MANET is an infrastructure less network that provides dynamic environment to the nodes that makes easy deployment and less configuration of the network. During incorporation of wireless networks with physical devices improves the performance of the system in terms of efficiency, reliability and security. This combination of IoT with MANET will be beneficial for the development of predictive model. This paper proposed a trust-based model for IoT and MANET which calculates trust value for a node by combining both direct and indirect trust opinion. For combining recommended trust evidences, ARMA/GARCH theory has been used which is helpful for the prediction of trust value for each node in multi-step. To increase the security and reliability of the proposed model a protocol is also designed which ensures end-to-end delivery through trusted nodes. Result shows that proposed approach improves the value of throughput and packet delivery ratio while it reduces the end-to-end delay. As compare to existing approach PDR value increases by 7%, End-to-end delay decreases by 20% and throughput increases by 7%. Also it has been observed that proposed approach improves efficiency and security.


Internet of things Mobile ad-hoc network ARMA theory GARCH theory Trust value 


  1. 1.
    Bruzgiene, R., Narbutaite, L., Adomkus, T.: MANET network in internet of things system, pp. 1–27 (2017)Google Scholar
  2. 2.
    Djedjig, N., Tandjaoui, D., Medjek, F.: Trust-based RPL for the Internet of Things. In: 20th IEEE Symposium on Computers and Communication (ISCC), pp. 1–6 (2015)Google Scholar
  3. 3.
    Rath, M., Panigrahi, C.R.: Prioritization of security measures at the junction of MANET and IoT. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, pp. 1–5 (2016)Google Scholar
  4. 4.
    Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)CrossRefGoogle Scholar
  5. 5.
    Virendra, M., Jadliwala, M., Chandrasekaran, M., Upadhyaya, S.: Quantifying trust in mobile ad-hoc networks. In: KIMAS 2005, 18–21 April 2005, pp. 1–6 (2005)Google Scholar
  6. 6.
    Liu, S., Yang, Y., Wang, W.: Research of AODV routing protocol for ad hoc networks. In: 2013 AASRI Conference on Parallel and Distributed Computing and Systems Research of AODV Routing Protocol for Ad Hoc Networks, pp. 1–11 (2013)Google Scholar
  7. 7.
    Jain, S., Baras, J.S.: Distributed trust based routing in mobile ad-hoc networks. In: 2013 IEEE Military Communications Conference, pp. 1–7 (2013)Google Scholar
  8. 8.
    Ghosh, U., Datta, R.: A secure addressing scheme for large-scale managed network. IEEE Trans. Netw. Serv. Manag. 12, 1–14 (2015)CrossRefGoogle Scholar
  9. 9.
    Velloso, P.B., Laufer, R.P., Cunha, D.D.O.O., Duarte, O.C.M.B., Pujolle, G.: Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Trans. Netw. Serv. Manag. 7(3), 1–14 (2010)Google Scholar
  10. 10.
    Chatterjee, P., Ghosh, U., Sengupta, I., Ghosh, S.K.: A trust enhanced secure clustering framework for wireless ad hoc networks, pp. 1–16. Springer, New York (2014)Google Scholar
  11. 11.
    El Defrawy, K., Tsudik, G.: Privacy-preserving location-based on-demand routing in MANETs. IEEE J. Sel. Areas Commun. 29(10), 1–9 (2011)CrossRefGoogle Scholar
  12. 12.
    Zhang, C., Zhu, X., Song, Y., Fang, Y.: A formal study of trust-based routing in wireless ad hoc networks. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9 (2010)Google Scholar
  13. 13.
    Jain, A.K., Tokekar, V., Singh, U.: Detection and avoidance of integrated attacks on MANET using trusted hyperbolic AODV routing protocol. J. Mob. Comput. Commun. Mob. Netw. 3, 21–34 (2016)Google Scholar
  14. 14.
    Singh, U., Samvatsar, M., Sharma, A., Jain, A.K.: Detection and avoidance of unified attacks on MANET using trusted secure AODV routing protocol. In: Symposium on Colossal Data Analysis and Networking (CDAN), pp. 1–6 (2016)Google Scholar
  15. 15.
    Parihar, R., Jain, A., Singh, U.: Support vector machine through detecting packet dropping misbehaving nodes in MANET. In: International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, pp. 481–486 (2017)Google Scholar
  16. 16.
    Anguraj, D.K., Smys, S.: Trust-based intrusion detection and clustering approach for wireless body area networks. Wirel. Pers. Commun. 104, 1–20 (2019)CrossRefGoogle Scholar
  17. 17.
    Panda, M., Patra, M.R.: A novel classification via clustering method for anomaly based network intrusion detection system. Int. J. Recent Trends Eng. 2(1), 1–7 (2009)Google Scholar
  18. 18.
    Sharma, A., Bhuriya, D., Singh, U.: Secure data transmission on MANET by hybrid cryptography technique. In: 2015 International Conference on IEEE Computer, Communication and Control (IC4), 10–12 September 2015, pp. 1–6 (2015)Google Scholar
  19. 19.
    Saurabh, V.K., Sharma, R., Itare, R., Singh, U.: Cluster based technique for detection and prevention of black-hole attack in MANETs. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), pp. 489–494 (2017)Google Scholar
  20. 20.
    Chouhan, A.S., Sharma, V., Singh, U., Sharma, R.: A modified AODV protocol to detect and prevent the wormhole using hybrid technique. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), pp. 621–625 (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Upendra Singh
    • 1
    Email author
  • Mukul Shukla
    • 1
  • Ashish Kumar Jain
    • 2
  • Mohan Patsariya
    • 3
  • Ravikant Itare
    • 5
  • Sakshi Yadav
    • 4
  1. 1.Shri Govindram Seksaria Institute of Technology and ScienceIndoreIndia
  2. 2.Institute of Engineering and Technology, DAVVIndoreIndia
  3. 3.BSF Polytechnic CSMTTekanpurIndia
  4. 4.TechbeanssolutionIndoreIndia
  5. 5.TCSIndoreIndia

Personalised recommendations