Skip to main content

Advertisement

Log in

A Cooperative Routing for MANET Based on Distributed Trust and Energy Management

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A mobile ad-hoc network is an autonomous system having collection of mobile nodes connected by wireless links. Mobile nodes in a MANET communicate with each other based on unconditional cooperation and inherited trustworthiness. MANET is vulnerable due to the characteristics such as dynamic topology and openness. This leads to the exploitation of MANET by performing various kinds of attacks by the presence of malicious and (or) selfish nodes. Such nodes affect the normal routing process in a MANET thereby impacting the routing performances such as packet delivery ratio. Hence, the necessity of trust factor between communication nodes is substantiated. In this paper the proposed solution identifies the malicious and selfish behaviour of nodes by dynamic calculation of trust and energy values of the nodes in the topology. The proposed algorithm, Trust and Energy based Ad hoc On Demand Distance Vector improves the traditional AODV algorithm by the dynamic incorporation of trust and energy values for each node in the topology in order to achieve cooperative routing. In Trust and Energy based Ad hoc On Demand Distance Vector, the source node selects the cooperative path rather than the shortest path thereby isolating the malicious and selfish nodes. Finally, the simulation results show that the proposed Trust and Energy based Ad hoc On Demand Distance Vector routing algorithm isolate the malicious and selfish nodes, and substantially improves the routing performance such as packet delivery ratio and average end to end latency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Toumpis, S., & Toumpakaris, D. (2006). Wireless ad hoc networks and related topologies: Applications and research challenges. Elektrotechnik and Informationstechnik, 123(6), 232–241.

    Article  Google Scholar 

  2. Huang, E., Hu, W., Crowcroft, J., & Wassell, I. (2005). Towards commercial mobile ad hoc network applications: A radio dispatch system. In MobiHoc’05, pp. 355–365.

  3. Boukerche, A., Turgut, B., Aydin, N., Ahmad, M. Z., Bölöni, L., & Turgut, D. (2011). Routing protocols in ad hoc networks: A survey. Computer Networks, 55(13), 3032–3080.

    Article  Google Scholar 

  4. Perkins, C., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proceedings ACM SIGCOMM, pp. 234–244.

  5. Clausen, T., Jacquet, P., Laouiti, A., Muhlethaler, P.,Qayyum, A., & Viennot, L. (2001). Optimized link state routing protocolfor ad hoc networks. In Proceedings IEEE INMIC, pp. 62–68.

  6. Perkins, C. E., & Roye, E. M. (1999). Ad-hoc on-demand distance vectorrouting. In Proceedings the mobile computing systems and applications, pp. 90–100.

  7. Perkins, C. E. (2003). Ad-hoc on-demand distance vector routing. RFC 3561, July.

  8. Johnson, D., Hu, Y., & Maltz, D. (2007). The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. February; rfc4728.

  9. Hu, Y.-C., Johnson, D.B., & Perrig, A. (2002). Secure efficient distance vector routing in mobile wireless ad hoc networks. In Proceedings of IEEE workshop mobile computing systems and applications, pp. 3–13.

  10. Sanzgiri, K. et al. (2002). Authenticated routing for ad hoc networks. In Proceedings of 10th IEEE international conference on network protocols, pp. 78–87.

  11. Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware ad hoc routing for wireless networks. In Proceedings of ACM international symposium. on mobile ad hoc networking and computing, pp. 299–302.

  12. Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security, 6(2), 77–83.

    Article  Google Scholar 

  13. Wang, B., Huang, C. H., Li, L. Y., & Yang, W. Z. (2011). Trust based minimum cost opportunistic routing for Ad Hoc networks. Journal of Systems and Software, 84(12), 2107–2122.

    Article  Google Scholar 

  14. Hollick, M., Schmitt, J., Seipl, C., & Steinmetz, R.(2004). On the effect of node misbehavior in ad hoc networks. In Proceedings of IEEE international conference on communication, networking and broadcasting, pp. 3759–3763.

  15. Sun, Y. L., Han, Z., Yu, W., & Ray Liu, K. J. (2006). Attacks on trust valuation in distributed networks. In Proceedings of 40th annual conference on information sciences and systems, pp. 1461–1466.

  16. Ming-Yang, S. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection system. Computer Communications, 34(1), 107–117.

    Article  Google Scholar 

  17. Djahel, S., Naït-abdesselam, F., & Zhang, Z. (2010). Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges. IEEE communications surveys and tutorials, 13(4), 658–672.

    Article  Google Scholar 

  18. Agrawal P., Ghosh, R. K., & Das, S. K. (2008). Cooperative black and gray hole attacks in mobile ad hoc networks. In Proceedings of 2nd international conference on ubiquitous information management and communication Korea, pp. 310–314.

  19. Baadachen, A., & AliBelmehdi, (2012). Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. Journal of Network and Computer Applications, 35(3), 1130–1139.

    Article  Google Scholar 

  20. Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications, In Proceedings of IEEE, pp. 1755–1772.

  21. Marti, S., Giuli, T.J., Lai, K., & Baker, M. (2000). Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings of 6th annual international conference on mobile computing and networking, pp. 255–265.

  22. Buchegger, S., & Boudec, J. (2002). Performance Analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in distributed ad hoc networks. In Proceedings of IEEE/ACM workshop mobile ad hoc networking and computing, pp. 226–236.

  23. Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of sixth joint working conference on communication and multimedia, pp. 107–121.

  24. Wang, J., Liu, Y., & Jiao, Y. (2011). Building a trusted route in mobile ad-hoc networks considering communication reliability and path length. Journal of Network and Computer Applications, 34(4), 1138–1149.

    Article  Google Scholar 

  25. Resnick, P., & Zeckhauser, R. (2001). Trust among strangers in internet transactions: Empirical analysis of eBays’s reputation system. The Economics of the Internet and E-commerce, 11, 127–157.

    Article  Google Scholar 

  26. Yang, H., Shu, J., Meng, X., & Lu, S. (2006). SCAN: Self-organized network-layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 261–273.

    Article  Google Scholar 

  27. Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.

    Article  MathSciNet  Google Scholar 

  28. Marina, M.K., & Das, S.R. (2001). On-demand multipath distance vector routing in ad hoc networks. In Proceedings of international conference for network protocols, pp. 14–23.

  29. http://www.isi.edu/nsnam/ns/. July 2009.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to U. Venkanna.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Venkanna, U., Agarwal, J.K. & Velusamy, R.L. A Cooperative Routing for MANET Based on Distributed Trust and Energy Management. Wireless Pers Commun 81, 961–979 (2015). https://doi.org/10.1007/s11277-014-2165-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-2165-5

Keywords

Navigation