Skip to main content
Log in

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Due to the characteristics of mobile ad hoc networks, such networks are more susceptible to the destruction of malicious attacks or denial of cooperation. It would be easy for an adversary or a malicious node to launch attacks on routing function, especially attacks on packet routing. In order to mitigate these hazards, we incorporate the concept of ‘trust’ into MANETs, and abstract a decentralized trust inference model. The core of this model is trust computation, which is divided into two parts: historical trust assessment and trust prediction. We can quantify a node’s historical trust based on its historical behaviors via introducing multiple trust attributes. The fuzzy AHP method based on entropy weights is used to calculate the weight of trust attributes. By making use of the obtained historical trust data sequence, we propose an improved dynamic grey-Markov chain prediction measure to effectively estimate node’s trust prediction. In order to verify the validity of our trust model, we propose a trust-enhanced unicast routing protocol and a trust-enhanced multicast routing protocol, respectively. Both of the two new protocols can provide a feasible approach to kick out the untrustworthy nodes and choose the optimal trusted routing path. Moreover, the new proposed data-driven route maintenance mechanisms can reduce the routing overhead. The persuasive experiments have been conducted to evaluate the effectiveness of the new proposed trust-enhanced routing protocols in the aspects of packets delivery ratio, end-to-end latency, malicious node detection and attack resistance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys and Tutorials, 14(2), 279–298.

    Article  Google Scholar 

  2. Li, W., Parker, J., & Joshi, A. (2012). Security through collaboration and trust in MANETs. Mobile Networks and Applications, 17(3), 342–352.

    Article  Google Scholar 

  3. Liang, Z., & Shi, W. (2008). Analysis of ratings on trust inference in open environments. Performance Evaluation, 65(2), 99–128.

    Article  Google Scholar 

  4. Onolaja, O., Bahsoon, R., & Theodoropoulos, G. (2011). Trust dynamics: A data-driven simulation approach. Trust Management V, 358, 323–334.

    Google Scholar 

  5. Zhang, F., Jia, Z., Xia, H., Li, X., & Sha, E. (2012). Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1,1) model. Computer Communications, 35(5), 589–596.

    Article  Google Scholar 

  6. Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.

    Article  Google Scholar 

  7. Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET-Information Security, 6(2), 77–83.

    Article  Google Scholar 

  8. Eissa, T., Razak, S., & Khokhar, R. (2013). Trust-based routing mechanism in MANET: Design and implementation. Mobile Networks and Applications, 18(5), 666–677.

    Article  Google Scholar 

  9. Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications, 36(9), 1078–1093.

    Article  Google Scholar 

  10. Cho, J., & Chen, I. (2013). On the tradeoff between altruism and selfishness in MANET trust management. Ad Hoc Networks, 11(8), 2217–2234.

    Article  Google Scholar 

  11. Mohanapriya, M., & Krishnamurthi, I. (2014). Trust based DSR routing protocol for mitigating cooperative black hole attacks in ad hoc networks. Arabian Journal for Science and Engineering, 39(3), 1825–1833.

    Article  Google Scholar 

  12. Xia, H., Jia, Z., & Sha, E. (2014). Research of trust model based on fuzzy theory in mobile ad hoc networks. IET-Information Security, 8(2), 88–103.

    Article  Google Scholar 

  13. Mitchell, R., & Chen, I. (2014). A survey of intrusion detection in wireless network applications. Computer Communications, 42, 1–23.

    Article  Google Scholar 

  14. Rahimi, M., & Riazi, A. (2014). On local entropy of fuzzy partitions. Fuzzy Sets and Systems, 234, 97–108.

    Article  MathSciNet  MATH  Google Scholar 

  15. Wu, Gin-Der, & Zhu, Zhen-Wei. (2014). An enhanced discriminability recurrent fuzzy neural network for temporal classification problems. Fuzzy Sets and Systems, 237, 47–62.

    Article  MathSciNet  MATH  Google Scholar 

  16. Zhang, L. X., & Lam, J. (2010). Necessary and sufficient conditions for analysis and synthesis of Markov jump linear systems with incomplete transition descriptions. IEEE Transactions on Automatic Control, 55(7), 1695–1701.

    Article  MathSciNet  Google Scholar 

  17. Xie, Y. H., Hu, J. K., Xiang, Y. H., Yu, S., Tang, S. S., & Wang, Y. (2013). Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration. IEEE Transactions on Parallel and Distributed Systems, 24(9), 1807–1817.

    Article  Google Scholar 

  18. Marina, M. K. & Das, S. R.(2001). On-demand multipath distance vector routing for ad hoc networks. In Proceedings of international conference on network protocols, Riverside, CA, USA (pp. 11–14). November 2001.

  19. Manvi, S. S., & Kakkasageri, M. S. (2008). Multicast routing in mobile ad hoc networks by using a multiagent system. Information Sciences, 178(6), 1611–1628.

    Article  MathSciNet  Google Scholar 

  20. ‘NS-2’. http://www.isi.edu/nsnam/ns/. Accessed December 2012.

  21. Shen, J., Tan, H. W., Wang, J., Wang, J. W., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178.

    Google Scholar 

  22. Xie, S. D., & Wang, Y. X. (2014). Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wireless Personal Communications, 78(1), 231–246.

    Article  Google Scholar 

  23. Chen, I. R., Bao, F. Y., Chang, M., & Cho, J. H. (2014). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200–1210.

    Article  Google Scholar 

  24. Zhao, H. Y., Yang, X., & Li, X. L. (2013). cTrust: Trust management in cyclic mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 62(6), 2792–2806.

    Article  Google Scholar 

Download references

Acknowledgement

We would like to thank anonymous referees for their helpful suggestions to improve this paper. This research is sponsored by the Natural Science Foundation of China (NSFC) under Grant Nos. 61402245, 61572267 and 61272425, the Project funded by China Postdoctoral Science Foundation under Grand Nos. 2015T80696 and 2014M551870, the Shandong Provincial Natural Science Foundation No. ZR2014FQ010, the Project funded by Qingdao Postdoctoral Science Foundation, the Open Project Foundation of Shandong Provincial Key Laboratory of Software Engineering under Grant No. 2013SE01, PAPD, CICAEET and Foundation of Huawei under Grant No. YB2013120027. And it is partially supported by NSF CNS-1015802, HK GRF 123609, China Thousand-Talent Program, China National 863 Program 2013AA013202.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Xia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xia, H., Yu, J., Pan, Zk. et al. Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wireless Netw 22, 2239–2257 (2016). https://doi.org/10.1007/s11276-015-1094-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1094-x

Keywords

Navigation