Skip to main content

Advertisement

Log in

Implementation of Trust-Based Novel Approach for Security Enhancements in MANETs

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

MANET is completely a unique, self-sustained wireless communication network. It can be created when necessary without any infrastructural support. Mobile ad hoc networks (MANETs) have many nodes with good network communication capabilities. Being self-organizing in nature, the secured way of transferring the data is an important issue in case of multi-hop wireless networks in real-time systems. Hence, trust confirmation among MANET nodes is the major concern beneath bandwidth limitations, energy and dynamic topology. The malevolent nature prompts the insecure data transfer by reducing the degree of trust among the nodes, leads to a lot of energy consumptions and decreases the network link lifetime. Hence proposed, a unique Novel Energy Efficient Trust Aware Routing (NETAR) for traditional AODV protocol to improve the three degrees of trust among the nodes in MANET using neighbour-node trust rate estimation, bandwidth calculation, energy and malicious behaviour predictions with certain performance measurements to improve the Network Link Life Time (NLT) like Packet Delivery Ratio (PDR), end to end delay, false positive and throughput. The NS2 simulator tool is used. The simulation results show the improved performance of the proposed NETAR protocol compared to the existing protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Dhananjayan G, Subbiah J. T2AR: trust-aware ad-hoc routing protocol for MANET. Springerplus. 2016;5:1–16.

    Article  Google Scholar 

  2. JayamKumari A, Sakthivel M. Trust management model observation towards security enhancements and QoS in MANET’s. Int J Innov Res Comput Commun Eng. 2015;3:1944–7.

    Google Scholar 

  3. Sharma N, Popli R. A literary review of MANET security. Int J Adv Res Ideas Innov Technol. 2019;5(2):1237–9.

    Google Scholar 

  4. Renu and Sharma S, . Energy efficient secure routing framework based on multidimensional trust evaluation for MANET. J Netw Inform Secur. 2019;7(1):20–4.

    Google Scholar 

  5. Raju RL, Reddy CRK. Security improvisation through node trust prediction approach in mobile Ad Hoc network. Int J Interact Mob Technol. 2019;13(9):40–51.

    Article  Google Scholar 

  6. Anjum SS, Noor RM, Anisi MH. Review on MANET based communication for search and rescue operations. Wirel Pers Commun. 2015;94:31–52.

    Article  Google Scholar 

  7. Batham G, Sejwar V. Implementation of Dempster-Shafer theory for trust based communication in MANET. Int J Comput Appl. 2016;150(11):27–32.

    Google Scholar 

  8. Sahadevaiah K, Prasad Reddy PVGD, Narasimha G. A new security protocol for mobile. Ad Hoc Netw. 2012;3:9–15.

    Google Scholar 

  9. Desai AM, Jhaveri RH. Secure routing in mobile Ad Hoc networks: a predictive approach. Int J Inf Technol. 2018;11:345–56.

    Google Scholar 

  10. Saadoune M, Hajami A and Allali H. Distance quantification algorithm in AODV protocol, Networking and Internet Architecture, Cornell University, 1-12 (2014).

  11. Yadav P and Gaur M. A survey on formal modeling for secure routing in mobile Ad Hoc networks. In: International Conference on Distributed Computing and Internet Technology. 2015;18–23.

  12. Dangare N.N and Mangrulkar RS. Design and development of trust based approach to mitigate various attacks in mobile Ad-hoc network. In: International Conference on Quality Up-gradation in Engineering, Science and Technology (ICQUEST2015). 2015;27–32.

  13. Geetha D and Revathi B. AOMDV routing based enhanced security for black hole attack in MANETs. In: International Conference on Research Trends in Computer Technologies (ICRTCT-2013). 2013;20–24.

  14. Bruzgiene R, Narbutaite L, Adomkus T. MANET network in internet of things system, peer-reviewed chapter. Ad-hoc Networks, INTECH Open Sci. 2017. https://doi.org/10.5772/66408.

    Article  Google Scholar 

  15. Kothandaraman D, Chellappan C. Energy efficient node rank-based routing algorithm in mobile Ad-Hoc networks. Int J Comput Netw Commun. 2019;11(1):45–61.

    Google Scholar 

  16. Swetha MS, Thungamani M. A novel approach to secure mysterious location based routing for MANET. Int J Innov Technol Explor Eng. 2019;8(7):2587–91.

    Google Scholar 

  17. Mangrulkar RS, Chavan PV, Dagadkar SN. Improving route selection mechanism using trust factor in AODV protocol for MANET. Int J Comput Appl. 2010;7(10):36–9.

    Google Scholar 

  18. Kaur J, Singh T. A secured data transmission method using enhanced secret sharing scheme to prevent black hole attack in MANETs—a review. Int J Comput Appl. 2015;119(10):20–8.

    Google Scholar 

  19. Liu W, Yu M. AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans Veh Technol. 2014;63(9).

  20. Suma CC, Gururaj HL, Ramesh M. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks. Computat Methods Soc Sci. 2016;4(2):5–11.

    Google Scholar 

  21. Deafawy KE, Tsudik G. Privacy preserving location-based on-demand routing in MANETs. IEEE J Select Areas Commun 2011;29(10):1926–1934.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. S. Usha.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Data Science and Communication” guest-edited by Kamesh Namudri, Naveen Chilamkurti, Sushma S J and S. Padmashree.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Usha, M.S., Ravishankar, K.C. Implementation of Trust-Based Novel Approach for Security Enhancements in MANETs. SN COMPUT. SCI. 2, 257 (2021). https://doi.org/10.1007/s42979-021-00628-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-021-00628-2

Keywords

Navigation