Trusted AODV for Trustworthy Routing in MANET
A Mobile ad-hoc network (MANET) is an extremely testing lively network. They are self configuring, autonomous, quickly deployable and operate without infrastructure. Mobile ad hoc networks consist of nodes that cooperate to provide connectivity and are free to move and organize randomly. Nodes can connect and depart the network at anytime and should be in position to relay traffic. These nodes are often vulnerable to failure thus making mobile ad hoc networks open to threats and attacks. Communication in MANET relies on mutual trust between the participating nodes but the features of MANET make this hard. Nodes sometimes fail to transmit and start dropping packets during the transmission. Such nodes are responsible for untrustworthy routing. A trust based scheme can be used to track this behavior of untrustworthy nodes and segregate them from routing, thus provide trustworthiness. In this paper a trust based AODV protocol is presented which assigns a trust value for each node. Nodes are allowed to participate in routing based on their trust values. A threshold value is assigned and if the nodes trust value is greater than this value its marked as trustworthy node and allowed to participate in routing else the node is marked untrustworthy. This scheme increases PDR and decreases delay thereby enhancing the trustworthiness in AODV based MANET routing. The work is implemented and simulated on NS-2. The simulation result shows the proposed protocol provides more reliable and consistent data transfer compared with general AODV in presence of unpredictable and unreliable nodes in MANET.
KeywordsAd-hoc MANET AODV Trust Qos
Unable to display preview. Download preview PDF.
- 1.Kortuem, G., Schneider, J., Preuitt, D., Thompson, T.G.C., F’ickas, S., Segall, Z.: When Peer to-Peer comes Face-to-Face: Collaborative Peer-to-Peer Computing in Mobile Ad hoc Networks. In: 1st International Conference on Peer-to-Peer Computing, Linkoping, Sweden, pp. 75–91 (2001) Google Scholar
- 2.Narayan, P., Syrotiuk, V.R.: Evaluation of the AODV and DSR Routing Protocols Using the MERIT Tool. In: The Proceeding of ADHOC-NOW (2004) Google Scholar
- 3.Perkins, C.E., Belding Royer, E.M., Das, S.R.: Ad-hoc On-Demand Distance Vector (AODV) Routing. In: Mobile Adhoc Networking Working Group, Internet Draft (February 2003) Google Scholar
- 4.Jawhar, I., Wu, J.: Quality of Service Routing in Mobile Ad Hoc Networks. In: Cardei, M., Cardei, I., Du, D.Z. (eds.) Resource Management and Wireless Networking. Kluwer Academic Publishers Google Scholar
- 5.Pushpa, A.M.: Trust based secure routing in AODV routing protocol. In: IEEE International Conference (2009) Google Scholar
- 6.Jassim, H.S., Yussof, S.: A Routing Protocol based on Trusted and shortest Path selection for Mobile Ad hoc Network. In: IEEE 9th Malaysia International Conference on Communications (2009) Google Scholar
- 7.Mangrulkar, R.S., Atique, M.: Trust based secured adhoc On demand Distance Vector Routing protocol for mobile adhoc network. In: Sixth International Conference on Wireless Communication and Sensor Networks, WCSN (2010) Google Scholar
- 8.Mangrulkar, R.S., Atique, M.: Trust Based Secured Adhoc on Demand Distance Vector Routing Protocol for Mobile Adhoc Network (2010) Google Scholar
- 9.Sharma, S., Mishra, R., Kaur, I.: New trust based security approach for ad-hoc networks. In: 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT (2010) Google Scholar
- 10.Umuhoza, D., Agbinya, J.I., Omlin, C.W.: Estimation of Trust Metrics for MANET Using QoS Parameter and Source Routing Algorithms. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (2007) Google Scholar
- 11.Ferdous, R., Muthukkumarasamy, V., Sattar, A.: Trust Management Scheme for Mobile Ad-Hoc Networks. In: IEEE 10th International Conference on Computer and Information Technology, CIT (2010) Google Scholar
- 12.Subramanian, S., Ramachandran, B.: Trust Based Scheme for QoS Assurance in Mobile Ad Hoc Networks. International Journal of Network Security & Its Applications (IJNSA) 4(1) (January 2012) Google Scholar