Skip to main content

Advertisement

Log in

Trust Based Routing Algorithm to Improve Quality of Service in DSR Protocol

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor networks involve low power fixed and mobile nodes with limited energy resources. Lack of resources such as energy and bandwidth, could reduce cooperation between nodes that may lead to lower quality of service parameters. Lack of cooperation would result in not forwarding incoming packets by each node to save its remaining energy. Also, due to inherent characteristics of wireless sensor networks, they are vulnerable to be attacked by malicious or selfish nodes. Trust management methods can be used to deal with such problems by designing a routing protocol that is based on trust and can improve quality of service parameters. In this paper, we utilize a trust management system and provide a method to reduce energy consumption and improve quality of service parameters. We improved packet delivery ratio and the amount of remaining energy in Dynamic Source Routing protocol, while maintaining the end to end delay.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Zin, S. M., Anuar, N. B., Kiah, M. L. M., & Pathan, A. S. K. (2014). Routing protocol design for secure WSN: Review and open research issues. Journal of Network and Computer Applications, 41, 517–530.

    Article  Google Scholar 

  2. Jacquet, P., Muhlethaler, P., Clausen, T., Qayyum, A., & Viennot, L. (2001). Optimized link state routing protocol for ad hoc networks. In Multi topic conferences, 2001. IEEE INMIC 2001. technology for the 21st Century. proceedings. IEEE International (pp. 62–68).

  3. Perkins, C. E., & Royer, E. M. (1999). Ad hoc on-demand distance vector routing. In Second IEEE workshop on mobile computing systems and applications, 1999. Proceedings. WMCSA’99. (pp. 90–100).

  4. Marti, S., Giuli, T.J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In International conference on mobile computing and networking: Proceedings of the 6th annual international conference on mobile computing and networking (Vol. 6, No. 11, pp. 255–265).

  5. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski & H. Korth (Eds.), Mobile computing (pp. 153–181). Berlin: Springer.

    Chapter  Google Scholar 

  6. Umarani, V., & Sundaram, K. S. (2013). Survey of various trust models and their behavior in wireless sensor networks. International Journal of Emerging Technology and Advanced Engineering, 3, 180–188.

    Google Scholar 

  7. Perkins, C. E., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM SIGCOMM computer communication review (pp. 234–244).

  8. Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Royer, E. M. B. (2002). A secure routing protocol for ad hoc networks. In 10th IEEE international conference on network protocols, 2002. Proceedings (pp. 78–87).

  9. Hu, Y. C., Johnson, D. B., & Perrig, A. (2005). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1, 175–192.

    Article  Google Scholar 

  10. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11, 21–38.

    Article  Google Scholar 

  11. Gupta, N. K., & Garg, A. (2013). Trust and shortest path selection based routing protocol for MANET. International Journal of Computer Applications, 76, 20–23.

    Article  Google Scholar 

  12. Weifang, C., Xiangke, L., Changxiang, S., Shanshan. L., & Shaoliang, P. (2006). A trust-based routing framework in energy-constrained wireless sensor networks. In Wireless algorithms, systems, and applications (pp. 478–489). Springer.

  13. Pushpa, A. M. (2009). Trust based secure routing in AODV routing protocol. In 2009 IEEE international conference on Internet multimedia services architecture and application (IMSAA) (pp. 1–6).

  14. Zhan, G., Shi, W., & Deng, J. (2010). Tarf: A trust-aware routing framework for wireless sensor networks. In European conference on wireless sensor networks (pp. 65–80). Springer.

  15. Raha, A., Babu, S. S., Naskar, M. K., Alfandi, O., & Hogrefe, D. (2011). Trust integrated link state routing protocol for wireless sensor networks (TILSRP). In 2011 IEEE 5th international conference on advanced networks and telecommunication systems (ANTS), (pp. 1–6).

  16. Zahariadis, T., Leligou, H. C., Voliotis, S., Maniatis, S., Trakadas, P., & Karkazis, P. (2009). An energy and trust-aware routing protocol for large wireless sensor networks. In WSEAS international conference on Applied informatics and communications (AIC’09). World Scientific and Engineering Academy and Society (WSEAS).

  17. Marti, S., Giuli, T.J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In International conference on mobile computing and networking: Proceedings of the 6th annual international conference on mobile computing and networking (Vol. 6, No. 11, pp. 255–265).

  18. Renold, A. P., & Geethanjali, S. (2014). A trust-based AODV routing protocol for improved QoS in mobile ad-hoc networks. International Journal of Trust Management in Computing and Communications, 2, 7–21.

    Article  Google Scholar 

  19. Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10(6), 985–995.

    Article  Google Scholar 

  20. Pirzada, A. A., & McDonald, C. (2006). Trust establishment in pure ad-hoc networks. Wireless Personal Communications, 37(1), 39–168.

    Google Scholar 

  21. Ahmed, E., Samad, K., & Mahmood, W. (2006). Cluster-based intrusion detection (CBID) architecture for mobile ad hoc networks. In 5th AusCERT2006 proceedings, Gold Coast, May 2006, Australia.

  22. Gong, P., Chen, T. M., & Xu, Q. (2015). ETARP: an energy efficient trust-aware routing protocol for wireless sensor networks. Journal of Sensors, 2015. https://doi.org/10.1155/2015/469793

  23. Singh, T., Singh, J., & Sharma, S. (2016). Energy efficient secured routing protocol for MANETs. Wireless Networks, 23, 1–9.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hassan Taheri.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Salari-Moghaddam, S., Taheri, H. & Karimi, A. Trust Based Routing Algorithm to Improve Quality of Service in DSR Protocol. Wireless Pers Commun 109, 1–16 (2019). https://doi.org/10.1007/s11277-019-06546-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06546-0

Keywords

Navigation