Abstract
The ideal routing operation in a Mobile Ad Hoc NETwork (MANET) is fundamentally dependent on the supportive node cooperation because the existence of even a single misbehaving node can cause the problem of routing disruption. This paper proposes an Efficient Trust-based Routing Scheme (ETRS) to mitigate the misbehaving nodes thereby achieving secure communication in MANET. The proposed scheme addresses the wide security concerns including the detection and prevention of malicious nodes, the reliable sharing of trust information, and the trusted route maintenance at one place. The scheme is developed and implemented in the framework of an underlying dynamic routing protocol Ad hoc On-demand Distance Vector (AODV). Its potential is validated through a comparative performance analysis with the state-of-the-art Evolutionary Self-Cooperative Trust (ESCT) scheme and the standard AODV. The superiority is proved by carrying out extensive simulations based on the measurements of Packet Delivery Ratio (PDR), end to end delay, throughput, jitter, number of data packets dropped, and the Probability of Detection (PoD) of node behavior against the variations in node density, node mobility, and attacker scenarios. The proposed scheme thus provides a gross contribution to the research society which is unlike many works from literature those focused only on selected security concerns causing the routing schemes to achieve a trade-off in the desired values of performance metrics and claim the efficiency at the expense of other aspects.
Similar content being viewed by others
References
Li, T., Ma, J., Pei, Q., Song, H., Shen, Y., Sun, C.: DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification. IEEE Access 7, 35302–35316 (2019).
Wilson, J., Subramaniam, K.: Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network. Peer-to-Peer Networking and Applications, Springer 13, 1091–1101 (2020).
Du, S., Hou, J., Song, S., Song, Y., Zhu, Y.: A geographical hierarchy greedy routing strategy for vehicular big data communications over millimeter wave. Physical Communication, Elsevier 40, 1–9 (2020).
Manivannan, D., Moni, S.S., Zeadally, S.: Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Vehicular Communications, Elsevier 25, 1–18 (2020)
Fang, W., Zhang, W., Chen, W., Liu, Y., Tang, C.: TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wireless Networks, Springer 26, 3169–3182 (2020).
Saini, T.K., Sharma, S.C.: Recent advancements, review analysis, and extensions of the aodv with the illustration of the applied concept. Ad Hoc Networks, Elsevier 103, 1–20 (2020).
Kojima, H., Yanai, N., Cruz, J.P.: ISDSRC: Improving the security and availability of secure routing protocol. IEEE Access 7, 74849–74868 (2019).
Pereira, E.E.A., Leonardo, E.J.: Performance Evaluation of DSR for MANETs with Channel Fading. International Journal of Wireless Information Networks, Springer 27, 494–502 (2020).
Sharma, A., Pilli, E.S., Mazumdar, A.P., Gera, P.: Towards trustworthy internet of things: A survey on trust management applications and schemes. Computer Communications, Elsevier 160, 475–493 (2020)
Chahal, R.K., Kumar, N., Batra, S.: Trust management in social internet of things: A taxonomy, open issues, and challenges. Computer Communications, Elsevier 150, 13–46 (2020).
Cai, R.J., Li, X.J., Chong, P.H.J.: An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs. IEEE Transactions on Mobile Computing 18(1), 42–55 (2019).
Mahapatra, S.N., Singh, B.K., Kumar, V.: A survey on secure transmission in internet of things: Taxonomy, recent techniques, research requirements, and challenges. Arabian Journal for Science and Engineering, Springer 45, 6211–6240 (2020).
Qurashi, M.A., Angelopoulos, C.M., Katos, V.: An architecture for resilient intrusion detection in ad-hoc networks. Journal of Information Security and Applications, Elsevier 53, 1–12 (2020).
Riasudheen, H., Selvamani, K., Mukherjee, S., Divyasree, I.: An efficient energy-aware routing scheme for cloud-assisted manets in 5G. Ad Hoc Networks, Elsevier 97, 1–22 (2020).
Xu, H., et al.: Trust-based probabilistic broadcast scheme for mobile ad hoc networks. IEEE Access 8, 21380–21392 (2020).
Theerthagiri, P.: FUCEM: futuristic cooperation evaluation model using markov process for evaluating node reliability and link stability in mobile ad hoc network. Wireless Networks, Springer 26, 4173–4188 (2020).
Djedjig, N., Tandjaoui, D., Medjek, F., Romdhani, I.: Trust-aware and cooperative routing protocol for iot security. Journal of Information Security and Applications, Elsevier 52, 1–17 (2020).
Jhaveri, R.H., Patel, N.M.: Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. International Journal of Communication Systems, Wiley 30, 1–24 (2016).
Desai, A.M., Jhaveri, R.H.: Secure routing in mobile Ad hoc networks: a predictive approach. International Journal of Information Technology volume, Springer 11, 345–356 (2018).
Jhaveri, R.H., Desai, A., Patel, A., Zhong, Y.: A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs. Security and Communication Networks, Wiley-Hindawi, 1–13 (2018).
Ochola, E., Mejaele, L., Eloff, M., van der Poll, J.: Manet Reactive Routing Protocols Node Mobility Variation Effect in Analysing the Impact of Black Hole Attack. SAIEE Africa Research Journal 108, 80–92 (2017).
Chen, I.R., Bao, F., Chang, M., Cho, J.H.: Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing. IEEE Transactions On Parallel and Distributed Systems 25, 1200–1210 (2014).
EXata: Exata network emulator software (2021). https://www.scalable-networks.com/exata-network-emulator-software
Moradipour, O., Fathi, M.: An Anti-Gray Hole Attack Scheme in Mobile Ad Hoc Network. International Journal of Wireless Information Networks, Springer 27, 558–567 (2020)
Poongodi, T., Khan, M.S., Patan, R., Gandomi, A.H., Balusamy, B.: Robust defense scheme against selective drop attack in wireless ad hoc networks. IEEE Access 7, 18409–18419 (2019).
Bhati, B.S., Venkataram, P.: Performance Analysis of Privacy Protection System During Data Transfer in MANETs. International Journal of Wireless Information Networks, Springer 25, 30–43 (2018).
Elmahdi, E., Yoo, S.M., Sharshembiev, K.: Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. Journal of Information Security and Applications, Elsevier 51, 1–10 (2020).
Bai, R., Singhal, M.: A Study on Different Security Attacks Associated With Routing In Mobile Ad Hoc Networks. International Journal of Pure and Applied Mathematics 119(14), 1833–1841 (2018).
Ndajah, P., Matine, A.O., Hounkonnou, M.N.: Black Hole Attack Prevention in Wireless Peer-to-Peer Networks: A New Strategy. International Journal of Wireless Information Networks, Springer 26, 48–60 (2019).
El-Semary, A.M., Diab, H.: BP-AODV: Blackhole protected aodv routing protocol for MANETs based on chaotic map. IEEE Access 7, 95197–95211 (2019).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mahamune, A.A., Chandane, M.M. An Efficient Trust-Based Routing Scheme Against Malicious Communication in MANET. Int J Wireless Inf Networks 28, 344–361 (2021). https://doi.org/10.1007/s10776-021-00523-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10776-021-00523-w