Abstract
In ad hoc networks, nodes act as routers and transmit data packets originating from other nodes to destinations beyond the transmission range of the source node. Traditional routing protocols designed for Mobile Ad hoc Network all nodes in the network are trustworthy. Security of routing protocol is challenging in realistic setting as networks are attacked by untrustworthy nodes which disrupt the communication. In this paper, it is proposed to investigate the performance of dynamic source routing (DSR) routing protocol under untrustworthy environment. A novel fuzzy based model with trust and reputation is proposed to enhance the performance of the network with untrustworthy nodes. Reputation system takes input of previous records of successful transmissions, capability of nodes calculated as total trust value and the node mobility. Trust and reputation parameters are used to identify a secured route for transmission in the network. Simulation results show improved Quality of Service of the proposed technique compared to DSR in untrustworthy environment.
Similar content being viewed by others
References
Zhou, L., & Haas, Z. J. (1999). Securing ad hoc networks. Network IEEE, 13(6), 24–30.
Wang, F., Wang, F., Huang, B., & Yang, L. T. (2010). COSR: a reputation-based secure route protocol in MANET. EURASIP Journal on Wireless Communications and Networking, 2010, 7.
Gupta, A. K., Sadawarti, H., & Verma, A. K. (2010). Performance analysis of AODV, DSR & TORA routing protocols. IACSIT International Journal of Engineering and Technology, 2(2), 226–231.
Eschenauer, L., Gligor, V. D., & Baras, J. (2004, January). On trust establishment in mobile ad-hoc networks. In Security protocols (pp. 47–66). Berlin: Springer.
Wang, J., Liu, Y., & Jiao, Y. (2011). Building a trusted route in a mobile ad hoc network considering communication reliability and path length. Journal of Network and Computer Applications, 34(4), 1138–1149.
Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.
Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.
Wang, J. L., & Huang, S. P. (2007, January). Fuzzy logic based reputation system for mobile ad hoc networks. In Knowledge-based intelligent information and engineering systems (pp. 1315–1322). Berlin: Springer.
Tajeddine, A., Kayssi, A., Chehab, A., & Artail, H. (2011). Fuzzy reputation-based trust model. Applied Soft Computing, 11(1), 345–355.
Gupta, A. K., Sadawarti, H., & Verma, A. K. (2010). Performance analysis of AODV, DSR & TORA routing protocols. IACSIT International Journal of Engineering and Technology, 2(2), 226–231.
Ross, T. J. (2009). Fuzzy logic with engineering applications. New York: Wiley.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Menaka, R., Ranganathan, V. & Sowmya, B. Improving Performance Through Reputation Based Routing Protocol for Manet. Wireless Pers Commun 94, 2275–2290 (2017). https://doi.org/10.1007/s11277-016-3396-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3396-4