Verification and Validation of Trust-Based Opportunistic Routing Protocol

  • Sandeep A. Thorat
  • P. J. Kulkarni
  • S. V. Yadav
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 710)

Abstract

Data routing is an essential operation in working of a MANET. Many researchers have proposed novel routing protocols for MANET. Working of the routing protocols differs with each other. Each routing protocol follows a set of rules and has different characteristics. Various network simulators are popularly used to test performance and working of the novel routing protocols. However, there is a need to formally verify working of any novel routing protocol and to statistically validate experimental results collected from simulation. Our last research contribution proposed a novel trust-based opportunistic routing protocol, viz. ORPSN. This paper presents formal verification of ORPSN protocol using analytical proofs. The paper gives analytical proofs about optimality of the algorithm and loop freedom. The paper uses t-test to validate experimental results and observations. It compares performance of ORPSN and CORMAN opportunistic routing protocols in various test conditions. After statistical validation of experimental results, it is observed that performance of ORPSN is significantly better than CORMAN.

Keywords

MANET Routing protocol Opportunistic routing Verification Analytical proofs Validation Hypothesis testing 

References

  1. 1.
    Djahel, Soufiene, Farid Nait-Abdesselam, and Zonghua Zhang: Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges. In: IEEE communications surveys & tutorials 13, no. 4, 658–672, 2011.CrossRefGoogle Scholar
  2. 2.
    Govindan, Kannan, and Prasant Mohapatra: Trust computations and trust dynamics in mobile adhoc networks: a survey. In: IEEE Communications Surveys & Tutorials 14, no. 2, 279–298, 2012.CrossRefGoogle Scholar
  3. 3.
    Jadhav, Payal, and RachnaSatao: A survey on opportunistic routing protocols for wireless sensor networks. In: Procedia Computer Science 79, 603–609, 2016.CrossRefGoogle Scholar
  4. 4.
    Thorat, Sandeep A., and P. J. Kulkarni: Opportunistic routing in presence of selfish nodes for MANET. In: Wireless Personal Communications 82.2, 689–708, 2015.CrossRefGoogle Scholar
  5. 5.
    Yasin, Daniyal, Kashif Saghar, and Shahzad Younis: Formal modeling and verification of Rumor Routing protocol. In: 13th IEEE International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2016.Google Scholar
  6. 6.
    Šimoňák, Slavomír: Verification of communication protocols based on formal methods integration. In: Acta Polytechnica Hungarica 9.4, 117–128, 2012.Google Scholar
  7. 7.
  8. 8.
    Biswas, Sanjit, and Robert Morris: ExOR: opportunistic multi-hop routing for wireless networks. In: ACM SIGCOMM Computer Communication Review 35.4, 133–144, 2005.CrossRefGoogle Scholar
  9. 9.
    Chakchouk, Nessrine: A survey on opportunistic routing in wireless communication networks. In: IEEE Communications Surveys & Tutorials 17.4, 2214–2241, 2015.CrossRefGoogle Scholar
  10. 10.
    Patel, Tejas, and Pariza Kamboj: Opportunistic routing in wireless sensor networks: A review. In: IEEE International on Advance Computing Conference (IACC), 2015.Google Scholar
  11. 11.
    Rozner, Eric: SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. In: IEEE transactions on Mobile computing 8.12, 1622–1635, 2009.CrossRefGoogle Scholar
  12. 12.
    Yamazaki, Taku: Forwarding mechanism using prioritized forwarders for opportunistic routing. In: 18th IEEE Asia-Pacific Network Operations and Management Symposium (APNOMS), 2016.Google Scholar
  13. 13.
    Shabani, S., N. Moghim, and A. Bohlooli: EOpR: An opportunistic routing algorithm for adhoc networks. In: 5th IEEE International Conference on Computer and Knowledge Engineering (ICCKE), 2015.Google Scholar
  14. 14.
    Thorat, Sandeep A., and P. J. Kulkarni: Design issues in trust based routing for MANET. In: 5th IEEE International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–7, 2014.Google Scholar
  15. 15.
    M. Salehi, A. Boukerche, A. Darehshoorzadeh, and A. Mammeri: Towards a Novel Trust-based Opportunistic Routing Protocol for Wireless Networks. In: Wireless Networks, vol. 22, no. 3, pp. 927–943, 2016.CrossRefGoogle Scholar
  16. 16.
    Bo, Wang: Trust-based minimum cost opportunistic routing for Ad hoc networks. In: Journal of Systems and Software 84.12, 2107–2122, 2011.CrossRefGoogle Scholar
  17. 17.
    Bhargavan, Karthikeyan, Davor Obradovic, and Carl A. Gunter: Formal verification of standards for distance vector routing protocols. In: Journal of the ACM (JACM) 49.4, 538–576, 2002.MathSciNetCrossRefGoogle Scholar
  18. 18.
    Bourke, Timothy, Rob van Glabbeek, and Peter Höfner: A mechanized proof of loop freedom of the (untimed) AODV routing protocol. In: International Symposium on Automated Technology for Verification and Analysis. Springer International Publishing, 2014.Google Scholar
  19. 19.
    De Renesse, F., and A. H. Aghvami: Formal verification of ad-hoc routing protocols using SPIN model checker. In: Proceedings of the 12th IEEE Mediterranean Electro-technical Conference. MELECON 2004.Google Scholar
  20. 20.
    Vamsi, P. Raghu, and Krishna Kant: Sybil attack detection using sequential hypothesis testing in wireless sensor networks. In: IEEE International Conference on Signal Propagation and Computer Technology (ICSPCT), 2014.Google Scholar
  21. 21.
    Ho, Jun-Won: Sequential hypothesis testing based approach for replica cluster detection in wireless sensor networks. In: Journal of Sensor and Actuator Networks 1.2, 153–165, 2012.CrossRefGoogle Scholar
  22. 22.
    Wang, Zehua, Yuanzhu Chen, and Cheng Li: CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks. In: IEEE Journal on Selected Areas in Communications 30.2, 289–296, 2012.CrossRefGoogle Scholar
  23. 23.
  24. 24.
  25. 25.

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Sandeep A. Thorat
    • 1
  • P. J. Kulkarni
    • 2
  • S. V. Yadav
    • 1
  1. 1.Department of Computer Science and EngineeringRajarambapu Institute of TechnologyIslampurIndia
  2. 2.Walchand College of EngineeringSangliIndia

Personalised recommendations