Skip to main content
Log in

An Overview of Trust-Based Routing Design Under Adversarial Mobile Ad Hoc Network Environment

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

During the last few years, the employment of trust-based routing in mobile ad hoc networks (MANETs) has received increasing attention. Trust-based routing protocols have been proposed as a new approach to ensure reliable routing under adversarial MANET environment. In this paper, firstly, we adopt a systematic approach to examine those typical routing attacks existing in dynamic source routing (DSR) protocol, and study how the attackers can achieve their attacking goals by executing various malicious actions. Then we analyze the necessity of trust-based routing protocols by reviewing some conventional reliable routing schemes. Specifically, we survey the state of art of the trust-based routing protocols and utilize a general framework that allows for analyzing most of them easily. Finally, we provide a comparison of these existing trust-based routing protocols based on a general framework. Our work contributes to understanding (1) how those attackers achieve their goals by disobeying the DSR regulations (2) what are the basic mechanisms when designing trust-based routing protocol and (3) the strengths and vulnerabilities of different design components.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Perkins, C. E., Belding-Royer, E. M., & Das, S. R. (2003). Ad hoc on demand distance vector (AODV) routing: IETF RFC 3561, July 2003.

  2. Johnson, D. B., Maltz, D. A., Hu, Y. C., & Jetcheva, J. G. (2007). The dynamic source routing protocol for mobile ad hoc networks (DSR): IETF RFC 4728, February 2007.

  3. Pradip, M., Jawandhiya, M. M. G., Ali, M. S., & Deshpande, M. S. (2010). A survey of mobile ad hoc network attacks. International Journal of Engineering Science and Technology, 2(9), 4063–4071.

    Google Scholar 

  4. Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless network security (pp. 103–135). Springer, US.

  5. Peng, N., & Kun, S. (2005). How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks, 3(6), 795–819.

    Article  Google Scholar 

  6. Jin-Hee, C., Swami, A., & Ing-Ray, C. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.

    Article  Google Scholar 

  7. Hoffman, K., Zage, D., & Nita-Rotaru, C. (2009). A survey of attack and defense techniques for reputation systems. ACM Computing Surveys, 42(1), 1–31.

    Article  Google Scholar 

  8. Han, Y., Zhiqi, S., Chunyan, M., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98(10), 1755–1772.

    Article  Google Scholar 

  9. Su Mon, B., Hannan, X., Adereti, A., Malcolm, J. A., & Christianson, B. (2007). A performance comparison of wireless ad hoc network routing protocols under security attack. In Proceedings of third international symposium on information assurance and security (pp. 50–55).

  10. Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the ACM workshop on wireless security, Atlanta, USA, 2002, pp. 1–10.

  11. Hu, Y. C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38.

    Article  Google Scholar 

  12. Castelluccia, C., & Montenegro, G. (2002). Protecting AODV against impersonation attacks. SIGMOBILE Mobile Computing Communications Review, 6(3), 108–109.

    Article  Google Scholar 

  13. Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc networks. In Proceedings of 10th IEEE international conference on network protocols (pp. 78–87).

  14. Zouridaki, C., Mark, B. L., Hejmo, M., & Thomas, R. K. (2007). Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs. Journal of Computer Security, 15(1), 3–38.

    Article  Google Scholar 

  15. De Floriano, R. (2009). Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANETs. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 1(4), 54–70.

    Article  Google Scholar 

  16. Fenye, B., Ing-Ray, C., MoonJeong, C., & Jin-Hee, C. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.

    Article  Google Scholar 

  17. Mcknight, D. H., & Chervany, N. L. (1996). The meanings of trust, Carlson School of Management. University of Minnesota, Technical Report TR 94-04.

  18. Wei, Y., Yan, S., & Liu, K. J. R. (2005). HADOF: Defense against routing disruptions in mobile ad hoc networks. In Proceedings of the IEEE INFOCOM 2005 (pp. 1252–1261).

  19. RahimiZadeh, K., & Kabiri, P. (2014). Trust-based routing method using a mobility-based clustering approach mobile ad hoc networks. Security and Communication Networks, 7(11), 1746–1763.

    Article  Google Scholar 

  20. Djenouri, D., & Badache, N. (2008). Struggling against selfishness and black hole attacks in MANETs. Wireless Communications and Mobile Computing, 8(6), 689–704.

    Article  Google Scholar 

  21. Yu, W., & Ray Liu, K. J. (2005). Attack-resistant cooperation stimulation in autonomous ad hoc networks. IEEE Journal on Selected Areas in Communications, 23(12), 2260–2271.

    Article  Google Scholar 

  22. Pirzada, A. A., McDonald, C., & Datta, A. (2006). Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing, 5(6), 695–710.

    Article  Google Scholar 

  23. Buchegger, S., & Le Boudec, J. Y. (2005). Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine, 43(7), 101–107.

    Article  Google Scholar 

  24. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, Massachusetts, USA (pp. 255–265).

  25. Bo, Y., Yamamoto, R., & Tanaka, Y. (2012). Historical evidence based trust management strategy against black hole attacks in MANET. In Proceedings of 14th international conference on advanced communication technology (ICACT), 2012.

  26. Ghosh, T., & Pissinou, N. (2005). Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10(6), 985–995.

    Article  Google Scholar 

  27. Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., & Lam, K.-Y. (2010). Trust based routing for misbehavior detection in ad hoc networks. Journal of Networks, 5(5), 551–558.

    Article  Google Scholar 

  28. Li, W., Parker, J., & Joshi, A. (2012). Security through collaboration and trust in MANETs. Mobile Network Application, 17(3), 342–352.

    Article  Google Scholar 

  29. Hongmei, D., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10), 70–75.

    Article  Google Scholar 

  30. Weerasinghe, H., & Huirong, F. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Proceedings of the future generation communication and networking (FGCN 2007) (pp. 362–367).

  31. Tsou, P.-C., Chang, J.-M., Lin, Y.-H., Chao, H.-C., & Chen J.-L. (2011). Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. In Proceedings of the 13th international conference on advanced communication technology (ICACT), Seoul, Korea (pp. 1–5).

  32. Cai, R. J., & Chong, P. H. J. (2014). A neighborhood connectivity-based trust scheme to identify active black hole attacks. In Proceedings of IEEE international conference on communication systems (ICCS) (pp. 543–548).

  33. Michiardi, P., & Molva, R. (2002). CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of joint working conference on communications and multimedia security, Norwell, MA, USA (pp. 107–120).

  34. Osathanunkul, K., & Ning, Z. (2011). A countermeasure to black hole attacks in mobile ad hoc networks. In Proceedings of IEEE international conference on networking, sensing and control (ICNSC) (pp. 508–513).

  35. Nguyen, C. T., Camp, O., & Loiseau, S. (2007) A Bayesian network based trust model for improving collaboration in mobile ad hoc networks. In Proceedings of IEEE international conference on research, innovation and vision for the future, Piscataway, NJ, USA (pp. 144–151).

  36. Haiguang, C., Huafeng, W., Xi, Z., & Chuanshan, G. (2007). Agent-based trust model in wireless sensor networks. In Proceedings of IEEE international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing, Piscataway, NJ, USA (pp. 119–124).

  37. Sun, Y. L., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 305–317.

    Article  Google Scholar 

  38. Wang, Y., & Singh, M. P. (2007). Formal trust model for multiagent systems. In Proceedings of 20th international joint conference on artificial intelligence, Hyderabad, India (pp. 1551–1556).

  39. Ding, X., & Luo, H. (2007). Trust evaluation based reliable routing in wireless mesh network. In Proceedings of IEEE 3rd international conference on wireless communications, networking, and mobile computing, NJ, USA (pp. 294–230).

  40. Jie, L., Ruidong, L., & Kato, J. (2008). Future trust management framework for mobile ad hoc networks. IEEE Communications Magazine, 46(4), 108–114.

    Article  Google Scholar 

  41. Meka, K. D., Virendra, M., & Upadhyaya, S. (2006). Trust based routing decisions in mobile ad-hoc networks. In Proceedings of the workshop on secure knowledge management (SKM 2006), 2006.

  42. Velloso, P. B., Laufer, R. P., Cunha, D. D. O., Duarte, O. C. M. B., & Pujolle, G. (2010). Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Transactions on Network and Service Management, 7(3), 172–185.

    Article  Google Scholar 

  43. Gera, P., Garg, K., & Misra, M. (2010). Trust based multi path DSR protocol. In Proceedings of availability, reliability, and security (pp. 204–209).

  44. De Rango, F. (2009) Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET. In Proceedings of wireless telecommunications symposium (pp. 1–8).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peter Han Joo Chong PhD.

Appendix

Appendix

See Table 4.

Table 4 Comparison of trust-based routing schemes

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cai, R.J., Tan, W.CW. & Chong, P.H.J. An Overview of Trust-Based Routing Design Under Adversarial Mobile Ad Hoc Network Environment. Wireless Pers Commun 96, 3923–3946 (2017). https://doi.org/10.1007/s11277-017-4359-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4359-0

Keywords

Navigation