Skip to main content
Log in

Agent-based trusted on-demand routing protocol for mobile ad-hoc networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The routing performance in mobile ad hoc networks (MANETs) relies on the co-operation of the individual nodes that constitute the network. The existence of misbehaving nodes may paralyze the routing operation in MANETs. To overcome this behavior, the trustworthiness of the network nodes should be considered in the route selection process combined with the hop count. The trustworthiness is achieved by measuring the trust value for each node in the network. In this paper, a new protocol based on self monitoring (agent-based) and following the dynamic source routing (DSR) algorithm is presented. This protocol is called agent-based trusted dynamic source routing protocol for MANETs. The objective of this protocol is to manage trust information locally with minimal overhead in terms of extra messages and time delay. This objective is achieved through installing in each participated node in the network a multi-agent system (MAS). MAS consists of two types of agents: monitoring agent and routing agent. A new mathematical and more realistic objective model for measuring the trust value is introduced. This model is weighted by both number and size of routed packets to reflect the “selective forwarding” behavior of a node. The performance evaluation via simulation shows that our protocol is better than standard and trusted DSR. The simulation is done over a variety of environmental conditions such as number of malicious nodes, host density and movement rates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Raju, J., & Garcia, J. J. (2000) A comparison of on-demand and table driven routing for ad-hoc wireless networks. In IEEE international conference on communications (ICC2000), pp. 1702–1706.

  2. Stênico, J., & Ling, L. (2013). Topology Control for Ad-Hoc Networks: A comprehensive review for table driven and on-demand routing protocols. Communications and Network, 5(3), 239–246.

    Article  Google Scholar 

  3. Alireza, A., et al. (2012) A survey of security challenges in cognitive radio networks: Solutions and future research directions. In Proceedings of the IEEE, (vol. 100, no. 12, pp. 3172–3186).

  4. Hu, Y. C., & Perrig, A. (2004). A survey of secure wireless ad hoc routing. IEEE Security and Privacy, 2(3), 28–39.

    Article  Google Scholar 

  5. Hu, C., Johnson, D. B., & Perrig, A. (2002) SEAD: Secure efficient distance vector routing in mobile wireless ad hoc networks. In Proceedings 4th IEEE workshop on mobile computing systems and applications (WMCSA 02), IEEE Press, pp. 3–13.

  6. Hu, Y. C., Perrig, A., & Johnson, D. B. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of the 8th Ann. Int’l conference of mobile computing and Networking (MobiCom 2002) (pp. 12–23) ACM Press.

  7. Perrig, A., & Tygar, D. (2002). The TESLA broadcast authentication protocol. RSA CryptoBytes, 5(2), 1–13.

    Google Scholar 

  8. Papadimitratos, P., & Haas, Z. J. (2002) Secure routing for mobile ad hoc networks. In Proceedings of the SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), San Antonio, TX, pp. 27–31.

  9. Zheng, Y., et al. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134.

    Article  Google Scholar 

  10. Sun, Y. L., Yu, W., Han, Z., & Liu, K. (2006). Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 305–317.

    Article  MATH  Google Scholar 

  11. Li, X., Lyu, M. R., & Liu, J. (2004) A trust model based routing protocol for secure ad hoc networks. In Proceedings of IEEE Aerospace Conference, Big Sky, Montana, USA, pp 1286–1295.

  12. Pirzada, A. A. & McDonald, C. (2006) Reliable routing in MANETs using direct trust mechanisms. In Advances in Ad Hoc and Sensor Networks. Berlin: Springer, ch. 6, pp. 133–159.

  13. Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.

    Article  Google Scholar 

  14. Rahman, A. A. & Hailes, S. (1997) A distributed trust model. In Proceedings of the ACM New Security Paradigms Workshop, Cumbria, UK, pp. 48–60.

  15. He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor network. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.

    Article  Google Scholar 

  16. Maleknasab, M., & Bidaki, M. (2013). Trust-based clustering in mobile ad hoc networks: Challenges and issues. International Journal of Security and Its Applications, 7(5), 321–342.

    Article  Google Scholar 

  17. Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless networks. In I. A. Korth (Ed.), Mobile Computing (Vol. 353, pp. 153–181). Norwell: Kluwer.

    Chapter  Google Scholar 

  18. Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications, 11(1), 38-47.

  19. Liu, K., & Deng, J. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.

    Article  Google Scholar 

  20. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of Mobile Computing and Networking (MobiCom’00), pp. 255–265.

  21. Buchegger, S. & Boudec, L. (2002) Performance analysis of the CONFIDANT protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, pp. 226–236.

  22. Michiardi, P., & Molva, R. (2002) CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the 6th IFIP conference on security communications, and multimedia, Portoroz, Slovenia, pp. 107–121.

  23. Pirzada, A. A., McDonald, C., & Datta, A. (2007). Dependable dynamic source routing without a trusted third party. Journal of Research and Practice in Information Technology, 39(1), 71–85.

    Google Scholar 

  24. Dhurandher, S. K. & Mehra, V. (2009). Multi-path and message trust-based secure routing in ad hoc networks. In Proceedings international conference advances in computing, control and telecomm. Technologies, Trivandrum, Kerala, pp. 189–194.

  25. Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. Information Security, IET, 4(4), 212–232.

    Article  MathSciNet  Google Scholar 

  26. Dhurandher, S. K., Obaidat, M. S., Verma, K., Gupta, P., & Dhurandher, P. (2011). FACES: friend-based ad hoc routing using challenges to establish security in MANETs systems. Systems Journal IEEE, 5(2), 176–188.

    Article  Google Scholar 

  27. Minar, N., Kramer, K. H., & Maes, P. (1999) Cooperative mobile agents for dynamic network routing. In Software Agents for Future Communication Systems. Springer, Berlin, pp. 287–304,

  28. Scott, D., Beresford, A., & Mycroft, A. (2003) Spatial security policies for mobile agents in a sentient computing environment. In Proceedings of FASE 2003, Lecture Notes in Computer Science, (Vol. 2621, pp. 102–117) Warsaw, Poland.

  29. He, Q., Wu, D., & Khosla, P. (2002) Sori: A secure and objective reputation-based incentive scheme for ad-hoc networks. In Proceedings of IEEE WCNC, Atlanta, USA.

  30. Le, J. Y. & Vojnovic, M. (2005). Perfect simulation and stationary of a class of mobility models. In Proceedings of INFOCOM, Miami, FL, USA, pp. 2743–2754.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hossam Mahmoud Ahmed Fahmy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abdel-Halim, I.T., Fahmy, H.M.A. & Bahaa-Eldin, A.M. Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. Wireless Netw 21, 467–483 (2015). https://doi.org/10.1007/s11276-014-0793-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-014-0793-z

Keywords

Navigation