Abstract
MANET is completely a unique, self-sustained wireless communication network. It can be created when necessary without any infrastructural support. Mobile ad hoc networks (MANETs) have many nodes with good network communication capabilities. Being self-organizing in nature, the secured way of transferring the data is an important issue in case of multi-hop wireless networks in real-time systems. Hence, trust confirmation among MANET nodes is the major concern beneath bandwidth limitations, energy and dynamic topology. The malevolent nature prompts the insecure data transfer by reducing the degree of trust among the nodes, leads to a lot of energy consumptions and decreases the network link lifetime. Hence proposed, a unique Novel Energy Efficient Trust Aware Routing (NETAR) for traditional AODV protocol to improve the three degrees of trust among the nodes in MANET using neighbour-node trust rate estimation, bandwidth calculation, energy and malicious behaviour predictions with certain performance measurements to improve the Network Link Life Time (NLT) like Packet Delivery Ratio (PDR), end to end delay, false positive and throughput. The NS2 simulator tool is used. The simulation results show the improved performance of the proposed NETAR protocol compared to the existing protocols.
Similar content being viewed by others
References
Dhananjayan G, Subbiah J. T2AR: trust-aware ad-hoc routing protocol for MANET. Springerplus. 2016;5:1–16.
JayamKumari A, Sakthivel M. Trust management model observation towards security enhancements and QoS in MANET’s. Int J Innov Res Comput Commun Eng. 2015;3:1944–7.
Sharma N, Popli R. A literary review of MANET security. Int J Adv Res Ideas Innov Technol. 2019;5(2):1237–9.
Renu and Sharma S, . Energy efficient secure routing framework based on multidimensional trust evaluation for MANET. J Netw Inform Secur. 2019;7(1):20–4.
Raju RL, Reddy CRK. Security improvisation through node trust prediction approach in mobile Ad Hoc network. Int J Interact Mob Technol. 2019;13(9):40–51.
Anjum SS, Noor RM, Anisi MH. Review on MANET based communication for search and rescue operations. Wirel Pers Commun. 2015;94:31–52.
Batham G, Sejwar V. Implementation of Dempster-Shafer theory for trust based communication in MANET. Int J Comput Appl. 2016;150(11):27–32.
Sahadevaiah K, Prasad Reddy PVGD, Narasimha G. A new security protocol for mobile. Ad Hoc Netw. 2012;3:9–15.
Desai AM, Jhaveri RH. Secure routing in mobile Ad Hoc networks: a predictive approach. Int J Inf Technol. 2018;11:345–56.
Saadoune M, Hajami A and Allali H. Distance quantification algorithm in AODV protocol, Networking and Internet Architecture, Cornell University, 1-12 (2014).
Yadav P and Gaur M. A survey on formal modeling for secure routing in mobile Ad Hoc networks. In: International Conference on Distributed Computing and Internet Technology. 2015;18–23.
Dangare N.N and Mangrulkar RS. Design and development of trust based approach to mitigate various attacks in mobile Ad-hoc network. In: International Conference on Quality Up-gradation in Engineering, Science and Technology (ICQUEST2015). 2015;27–32.
Geetha D and Revathi B. AOMDV routing based enhanced security for black hole attack in MANETs. In: International Conference on Research Trends in Computer Technologies (ICRTCT-2013). 2013;20–24.
Bruzgiene R, Narbutaite L, Adomkus T. MANET network in internet of things system, peer-reviewed chapter. Ad-hoc Networks, INTECH Open Sci. 2017. https://doi.org/10.5772/66408.
Kothandaraman D, Chellappan C. Energy efficient node rank-based routing algorithm in mobile Ad-Hoc networks. Int J Comput Netw Commun. 2019;11(1):45–61.
Swetha MS, Thungamani M. A novel approach to secure mysterious location based routing for MANET. Int J Innov Technol Explor Eng. 2019;8(7):2587–91.
Mangrulkar RS, Chavan PV, Dagadkar SN. Improving route selection mechanism using trust factor in AODV protocol for MANET. Int J Comput Appl. 2010;7(10):36–9.
Kaur J, Singh T. A secured data transmission method using enhanced secret sharing scheme to prevent black hole attack in MANETs—a review. Int J Comput Appl. 2015;119(10):20–8.
Liu W, Yu M. AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans Veh Technol. 2014;63(9).
Suma CC, Gururaj HL, Ramesh M. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks. Computat Methods Soc Sci. 2016;4(2):5–11.
Deafawy KE, Tsudik G. Privacy preserving location-based on-demand routing in MANETs. IEEE J Select Areas Commun 2011;29(10):1926–1934.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Data Science and Communication” guest-edited by Kamesh Namudri, Naveen Chilamkurti, Sushma S J and S. Padmashree.
Rights and permissions
About this article
Cite this article
Usha, M.S., Ravishankar, K.C. Implementation of Trust-Based Novel Approach for Security Enhancements in MANETs. SN COMPUT. SCI. 2, 257 (2021). https://doi.org/10.1007/s42979-021-00628-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-021-00628-2