Skip to main content
Log in

Improving Performance Through Reputation Based Routing Protocol for Manet

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In ad hoc networks, nodes act as routers and transmit data packets originating from other nodes to destinations beyond the transmission range of the source node. Traditional routing protocols designed for Mobile Ad hoc Network all nodes in the network are trustworthy. Security of routing protocol is challenging in realistic setting as networks are attacked by untrustworthy nodes which disrupt the communication. In this paper, it is proposed to investigate the performance of dynamic source routing (DSR) routing protocol under untrustworthy environment. A novel fuzzy based model with trust and reputation is proposed to enhance the performance of the network with untrustworthy nodes. Reputation system takes input of previous records of successful transmissions, capability of nodes calculated as total trust value and the node mobility. Trust and reputation parameters are used to identify a secured route for transmission in the network. Simulation results show improved Quality of Service of the proposed technique compared to DSR in untrustworthy environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Zhou, L., & Haas, Z. J. (1999). Securing ad hoc networks. Network IEEE, 13(6), 24–30.

    Article  Google Scholar 

  2. Wang, F., Wang, F., Huang, B., & Yang, L. T. (2010). COSR: a reputation-based secure route protocol in MANET. EURASIP Journal on Wireless Communications and Networking, 2010, 7.

    Google Scholar 

  3. Gupta, A. K., Sadawarti, H., & Verma, A. K. (2010). Performance analysis of AODV, DSR & TORA routing protocols. IACSIT International Journal of Engineering and Technology, 2(2), 226–231.

    Google Scholar 

  4. Eschenauer, L., Gligor, V. D., & Baras, J. (2004, January). On trust establishment in mobile ad-hoc networks. In Security protocols (pp. 47–66). Berlin: Springer.

  5. Wang, J., Liu, Y., & Jiao, Y. (2011). Building a trusted route in a mobile ad hoc network considering communication reliability and path length. Journal of Network and Computer Applications, 34(4), 1138–1149.

    Article  Google Scholar 

  6. Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.

    Article  Google Scholar 

  7. Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.

    Article  Google Scholar 

  8. Wang, J. L., & Huang, S. P. (2007, January). Fuzzy logic based reputation system for mobile ad hoc networks. In Knowledge-based intelligent information and engineering systems (pp. 1315–1322). Berlin: Springer.

  9. Tajeddine, A., Kayssi, A., Chehab, A., & Artail, H. (2011). Fuzzy reputation-based trust model. Applied Soft Computing, 11(1), 345–355.

    Article  Google Scholar 

  10. Gupta, A. K., Sadawarti, H., & Verma, A. K. (2010). Performance analysis of AODV, DSR & TORA routing protocols. IACSIT International Journal of Engineering and Technology, 2(2), 226–231.

    Google Scholar 

  11. Ross, T. J. (2009). Fuzzy logic with engineering applications. New York: Wiley.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Menaka.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Menaka, R., Ranganathan, V. & Sowmya, B. Improving Performance Through Reputation Based Routing Protocol for Manet. Wireless Pers Commun 94, 2275–2290 (2017). https://doi.org/10.1007/s11277-016-3396-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3396-4

Keywords

Navigation