Trust-based co-operative routing for secure communication in mobile ad hoc networks

Ankita A. Mahamune , M.M. Chandane

›› 2024, Vol. 10 ›› Issue (4) : 1079 -1087.

PDF
›› 2024, Vol. 10 ›› Issue (4) :1079 -1087. DOI: 10.1016/j.dcan.2023.01.005
Research article
research-article

Trust-based co-operative routing for secure communication in mobile ad hoc networks

Author information +
History +
PDF

Abstract

The working of a Mobile Ad hoc NETwork (MANET) relies on the supportive cooperation among the network nodes. But due to its intrinsic features, a misbehaving node can easily lead to a routing disorder. This paper presents two trust-based routing schemes, namely Trust-based Self-Detection Routing (TSDR) and Trust-based Co-operative Routing (TCOR) designed with an Ad hoc On-demand Distance Vector (AODV) protocol. The proposed work covers a wide range of security challenges, including malicious node identification and prevention, accurate trust quantification, secure trust data sharing, and trusted route maintenance. This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET. It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust (ESCT) scheme, Generalized Trust Model (GTM), and the conventional AODV protocol. The extensive simulations are conducted against three different varying network scenarios. The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes. Among the two proposed works, TCOR is more suitable for highly scalable networks; TSDR suits, however, the MANET application better with its small size. This work thus makes a significant contribution to the research community, in contrast to many previous works focusing solely on specific security aspects, and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.

Keywords

Mobile Ad hoc NETwork / Secure communication / AODV / Co-operative routing / Trust metric

Cite this article

Download citation ▾
Ankita A. Mahamune, M.M. Chandane. Trust-based co-operative routing for secure communication in mobile ad hoc networks. , 2024, 10(4): 1079-1087 DOI:10.1016/j.dcan.2023.01.005

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

T. Li, J. Ma, Q. Pei, H. Song, Y. Shen, C. Sun, DAPV: diagnosing anomalies in manets routing with provenance and verification, IEEE Access 7 (2019) 35302-35316.

[2]

J. Wilson, K. Subramaniam, Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network, Peer-to-Peer Networking and Applications 13 (2020) 1091-1101.

[3]

A.A. Mahamune, M.M. Chandane, TCP/IP layerwise taxonomy of attacks and defence mechanisms in mobile ad hoc networks, J. Inst. Eng. India Ser. B, Springer 103 (2021) 273-291.

[4]

W. Fang, W. Zhang, W. Chen, Y. Liu, C. Tang, TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing, Wireless Network 26 (2020) 3169-3182.

[5]

S. Du, J. Hou, S. Song, Y. Song, Y. Zhu, A geographical hierarchy greedy routing strategy for vehicular big data communications over millimeter wave, Physical Communication 40 (2020) 1-9.

[6]

D. Manivannan, S.S. Moni, S. Zeadally, Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs), Vehicular Communications 25 (2020) 1-18.

[7]

F. Li, Z. Guo, C. Zhang, W. Li, Y. Wang, ATM: an active-detection trust mechanism for vanets based on blockchain, IEEE Trans. Veh. Technol. 70 (2021) 4011-4021.

[8]

T.K. Saini, S.C. Sharma, Recent advancements, review analysis, and extensions of the aodv with the illustration of the applied concept, Ad Hoc Netw. 103 (2020) 1-20.

[9]

H. Kojima, N. Yanai, J.P. Cruz, ISDSRC: improving the security and availability of secure routing protocol, IEEE Access 7 (2019) 74849-74868.

[10]

C. Perkins, E. Belding-Royer, S. Das, Ad Hoc On-Demand Distance Vector (AODV) Routing, vol. 3561, Network Working Group, Request for Comments, 2003.

[11]

D. Johnson, Y. Hu, D. Maltz, The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4, vol. 4728, Network Working Group, Request for Comments, 2007.

[12]

A. Sharma, E.S. Pilli, A.P. Mazumdar, P. Gera, Towards trustworthy internet of things: a survey on trust management applications and schemes, Comput. Commun. 160 (2020) 475-493.

[13]

R.K. Chahal, N. Kumar, S. Batra, Trust management in social internet of things: a taxonomy, open issues, and challenges, Comput. Commun. 150 (2020) 13-46.

[14]

A.A. Mahamune, M.M. Chandane, An efficient trust-based routing scheme against malicious communication in manet, Int. J. Wireless Inf. Network 28 (2021) 344-361.

[15]

R.J. Cai, X.J. Li, P.H.J. Chong, An evolutionary self-cooperative trust scheme against routing disruptions in manets, IEEE Trans. Mobile Comput. 18 (1) (2019) 42-55.

[16]

P.R. Vamsi, K. Kant, Generalized trust model for cooperative routing in manets, Wireless Pers. Commun. 97 (2017) 4385-4412.

[17]

S.N. Mahapatra, B.K. Singh, V. Kumar, A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges, Arabian J. Sci. Eng. 45 (2020) 6211-6240.

[18]

M.A. Qurashi, C.M. Angelopoulos, V. Katos, An architecture for resilient intrusion detection in ad-hoc networks, J. Inf. Secur. Appl. 53 (2020) 1-12.

[19]

H. Riasudheen, K. Selvamani, S. Mukherjee, I. Divyasree, An efficient energy-aware routing scheme for cloud-assisted manets in 5G, Ad Hoc Netw. 97 (2020) 1-22.

[20]

H. Xu, et al., Trust-based probabilistic broadcast scheme for mobile ad hoc networks, IEEE Access 8 (2020) 21380-21392.

[21]

P. Theerthagiri, FUCEM: futuristic cooperation evaluation model using markov process for evaluating node reliability and link stability in mobile ad hoc network, Wireless Network 26 (2020) 4173-4188.

[22]

S. Ghasemnezhad, A. Ghaffari, Fuzzy logic based reliable and real-time routing protocol for mobile ad hoc networks, Wireless Pers. Commun. 98 (2018) 593-611.

[23]

A. Kumar, V. Varadarajan, A. Kumar, P. Dadheech, S.S. Choudhary, V.A. Kumar, B. Panigrahi, K.C. Veluvolu, Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm, Microprocess. Microsyst. 80 (2021) 103352-103364.

[24]

N. Djedjig, D. Tandjaoui, F. Medjek, I. Romdhani, Trust-aware and cooperative routing protocol for iot security, J. Inf. Secur. Appl. 52 (2020) 1-17.

[25]

E. Ochola, L. Mejaele, M. Eloff, J. van der Poll, Manet reactive routing protocols node mobility variation effect in analysing the impact of black hole attack, SAIEE Africa Research Journal 108 (2017) 80-92.

[26]

Z. Wei, H. Tang, F.R. Yu, M. Wang, P. Mason, Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning, IEEE Trans. Veh. Technol. 63 (2014) 4647-4658.

[27]

Exata network emulator software. https://www.ncs-in.com/product/exata-network-emulator/, 2022. (Accessed 12 November 2022).

[28]

A. Tavizi, A. Ghaffari, Tree-based reliable and energy-aware multicast routing protocol for mobile ad hoc networks, J. Supercomput. 74 (2018) 6310-6332.

AI Summary AI Mindmap
PDF

56

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/