Skip to main content
Log in

A cluster-based trust-aware routing protocol for mobile ad hoc networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Routing protocols are the binding force in mobile ad hoc network (MANETs) since they facilitate communication beyond the wireless transmission range of the nodes. However, the infrastructure-less, pervasive, and distributed nature of MANETs renders them vulnerable to security threats. In this paper, we propose a novel cluster-based trust-aware routing protocol (CBTRP) for MANETs to protect forwarded packets from intermediary malicious nodes. The proposed protocol organizes the network into one-hop disjoint clusters then elects the most qualified and trustworthy nodes to play the role of cluster-heads that are responsible for handling all the routing activities. The proposed CBTRP continuously ensures the trustworthiness of cluster-heads by replacing them as soon as they become malicious and can dynamically update the packet path to avoid malicious routes. We have implemented and simulated the proposed protocol then evaluated its performance compared to the clustered based routing protocol (CBRP) as well as the 2ACK approach. Comparisons and analysis have shown the effectiveness of our proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Andel, T. R., & Yasinac, A. (2006). On the credibility of manet simulations (Vol. 39, pp. 48–54). Los Alamitos, CA: IEEE Computer Society Press.

  2. Arsenault, A. & Turner, S. (2000, November). Internet x.509 public key infrastructure. Internet Engineering Task Force (IETF).

  3. Bhargava, B., Zoltowski, M., & Meunier, P. (2002). Trusted routing and intruder identification in mobile ad hoc networks. Research proposal for cerias 2002. Purdue University.

  4. Buchegger, S. & Le Boudec, J.-Y. (2002, June 09–11). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing (MobiHoc ’02) (pp. 226–236), Lausanne, Switzerland.

  5. Chlamtac, I., Conti M., & Liu, J. (2003, July). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks 1(1), 13-64.

    Google Scholar 

  6. Chatterjee, M., Das, S. K., & Turgut, D. (2002, April). WCA: A weighted clusrering algorithm for mobile ad hoc networks. Journal of Cluster Computing, 5, 193–204.

    Article  Google Scholar 

  7. Hahn, G., Nyang, D., Song, J., Lee, J., & Park, B. (2004, May 12–15). Secure cluster based routing protocol incorporating the distributed pki mechanisms. In Proceedings of the 12th IEEE mediterranean electrotechnical conference (MELECON 2004) (pp. 787–790), Dubrovnik, Croatia.

  8. Hu, Y.-C., Perrig, A., & Johnson, D. (2005, January). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11, 21–38.

    Google Scholar 

  9. Jiang, M., Li, J., & Tay, Y. C. (1999). Cluster based routing protocol(cbrp). Internet Draft, MANET working group.

  10. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski & H. Korth (Eds.). Mobile computing (Vol. 353). Kluwer.

  11. Li, X., Lyu, M. R., & Liu, J. (2004, March 6–13). A trust model based routing protocol for secure ad hoc networks. In Proceedings 2004 IEEE aerospace conference (pp. 1286–1295), Big Sky, MT, USA.

  12. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007, May). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6, 536–550.

    Google Scholar 

  13. Liu, W., Chiang, C., Wu, H., & Gerla, C. (1997, April). Routing in clustered multihop mobile wireless networks with fading channel. In IEEE Singapore international conference on networks (SICON’97) (pp. 197–211).

  14. NS-2 Simulator. (2006). http://www.insi.edu/nsnam/ns.

  15. Palchaudhuri, S., Le Boudec, J. Y., & Vojnovic, M. (2005, April 4–6). Perfect simulations for random trip mobility models. In Proceedings of the 38th annual simulation symposium (pp. 72–79), San Diego, CA, USA.

  16. Park, C., Lee, Y. H., Yoon, H., Choi, D. S., & Jin, S. H. (2005, February). Cluster-based trust evaluation in ad hoc networks. In 7th international conference on advanced communication technology. LNCS (pp. 503–507).

  17. Perkins, C., & Bhagwat, P. (1994, August 31–September 2). Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. In ACM SIGCOMM’94 conference on communications architectures, protocols and applications (pp. 234–244), London, UK.

  18. Perkins, C. E., & Royer, E. M. (1999, February 25–26). Ad-hoc on-demand distance vector routing. In Proceedings of the second IEEE workshop on mobile computer systems and applications (WMCSA ’99) (pp. 90–100), New Orleans, Louisiana.

  19. Pirzada, A. A., Datta, A., & Mcdonald, C. S. (2004, November). Trust based routing for ad-hoc wireless networks, In Proceedings of 12th IEEE international conference on networks (ICON’ 04) (pp. 326–330), Piscataway, NJ, USA.

  20. Pirzada, A. A., & McDonald, C. (2003, December 8–11). A review of secure routing protocols for ad hoc mobile wireless networks. In Proceedings of 7th international symposium on digital signal processing and communication systems (pp. 118–123), Brisbane, Australia.

  21. Pirzada, A. A., & McDonald, C. (2004, January 18–22). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australian conference on computer science (ACSC ’04) (pp. 47–54), Dunedin, New Zealand.

  22. Royer, E., & Toh, C.-K. (1999, September). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Wireless Communications and IEEE Personal Communications, 6, 46–55.

    Google Scholar 

  23. Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2002, November). A secure routing protocol for ad hoc networks, In Proceedings of the 10th IEEE international conference on network protocols (pp. 78–87), Paris, France.

  24. Theodorakopoulos, G., & Baras, J. S. (2004). Trust evaluation in ad-hoc networks. In Proceedings of the 2004 ACM workshop on wireless security (WiSe ’04) (pp. 1–10), New York, NY, USA.

  25. Virendra, M., Jadliwala, M., Chandrasekaran, M., & Upadhyaya, S. (2005, April 18–21). Quantifying trust in mobile ad-hoc networks. In Proceedings of the international conference on integration of knowledge intensive multi-agent systems (KIMAS) (pp. 65–70), Weltham , MA, USA.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haidar Safa.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Safa, H., Artail, H. & Tabet, D. A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Netw 16, 969–984 (2010). https://doi.org/10.1007/s11276-009-0182-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-009-0182-1

Keywords

Navigation