Opportunistic Routing in Presence of Selfish Nodes for MANET

Opportunistic Routing protocols use broadcast nature of wireless communication to improve packet delivery from source to destination in mobile ad hoc network (MANET). In traditional routing protocols for MANET, each node uses the best neighbor for forwarding packet to destination. In opportunistic routing, a node selects and prioritizes multiple nodes which can act as potential packet forwarders. Similar to traditional routing protocols, opportunistic routing assumes that all nodes participating in the network are honest and cooperative. However, this is practically difficult in an open MANET. Few nodes participating in the network may behave selfishly; these nodes drop packets and do not offer service to other nodes. Such behavior exhibited by the nodes may cause a collapse of MANET communication. The selfish behavior attack is addressed by researchers for many existing MANET routing protocols. There are just a few works, which address selfish nodes attack for opportunistic routing protocols. The paper proposes an opportunistic routing protocol which can overcome the presence of selfish nodes. The proposed protocol discovers reliable candidate nodes for packet forwarding using a new metric called ‘path goodness’. The path goodness metric takes into account trustworthiness of the nodes on a path to the destination. The protocol decides trustworthiness of the nodes using packet forwarding behavior of the nodes. The work is a trust based extension of CORMAN opportunistic routing protocol. Simulation results show that, the proposed opportunistic routing protocol improves the packet delivery ratio by approximately 10 % in the presence of selfish nodes.

[1]  Lili Qiu,et al.  SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks , 2009, IEEE Transactions on Mobile Computing.

[2]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[3]  Jalel Ben-Othman,et al.  Enhancing data security in ad hoc networks based on multipath routing , 2010, J. Parallel Distributed Comput..

[4]  Zhiping Jia,et al.  Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory , 2011, IET Wirel. Sens. Syst..

[5]  Wei Chen,et al.  Optimal forwarder list selection in opportunistic routing , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[6]  Lie-Liang Yang,et al.  Ieee Transactions on Communications, Accepted for Publication 1 Cross-layer Aided Energy-efficient Opportunistic Routing in Ad Hoc Networks , 2022 .

[7]  Xing Chen,et al.  Throughput oriented forwarders selection analysis for opportunistic routing in wireless mesh network , 2013 .

[8]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[9]  Xin Yang,et al.  cTrust: Trust Management in Cyclic Mobile Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[10]  Susanne Wetzel,et al.  Cryptographic Versus Trust-based Methods for MANET Routing Security , 2008, STM@ESORICS.

[11]  Gene Tsudik,et al.  ALARM: Anonymous Location-Aided Routing in Suspicious MANETs , 2011, 2007 IEEE International Conference on Network Protocols.

[12]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[13]  Muthumanickam Gunasekaran,et al.  TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks , 2013, IET Inf. Secur..

[14]  Zehua Wang,et al.  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks , 2014, IEEE Transactions on Vehicular Technology.

[15]  Mahesh K. Marina,et al.  On-demand multipath distance vector routing in ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[16]  Srihari Nelakuditi,et al.  On the Efficacy of Opportunistic Routing , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[17]  Vicent Pla,et al.  Modeling and comparison of candidate selection algorithms in opportunistic routing , 2011, Comput. Networks.

[18]  Wang Bo,et al.  Trust-based minimum cost opportunistic routing for Ad hoc networks , 2011 .

[19]  Zhenyu Yang,et al.  Location-Aided Opportunistic Forwarding in Multirate and Multihop Wireless Networks , 2009, IEEE Transactions on Vehicular Technology.

[20]  Hacène Fouchal,et al.  Towards efficient deployment of wireless sensor networks , 2016, Secur. Commun. Networks.

[21]  Wonjun Lee,et al.  Eliminating Duplicate Forwarding in Wireless Opportunistic Routing , 2012, IEEE Communications Letters.

[22]  Sajjad Ahmad Madani,et al.  Coordinated opportunistic routing protocol for wireless mesh networks , 2013, Comput. Electr. Eng..

[23]  Robert Tappan Morris,et al.  ExOR: opportunistic multi-hop routing for wireless networks , 2005, SIGCOMM '05.

[24]  Jie Wu,et al.  Uncertainty Modeling and Reduction in MANETs , 2010, IEEE Transactions on Mobile Computing.

[25]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[26]  Alan Bundy,et al.  Constructing Induction Rules for Deductive Synthesis Proofs , 2006, CLASE.

[27]  Winston Khoon Guan Seah,et al.  Survey Paper: Opportunistic routing - A review and the challenges ahead , 2011 .

[28]  Zehua Wang,et al.  CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks , 2012, IEEE Journal on Selected Areas in Communications.

[29]  Soufiene Djahel,et al.  Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.

[30]  Lu Zhao,et al.  QMOR: QoS-Aware Multi-sink Opportunistic Routing for Wireless Multimedia Sensor Networks , 2014, Wirel. Pers. Commun..

[31]  Haitao Liu,et al.  Opportunistic routing for wireless ad hoc and sensor networks: Present and future directions , 2009, IEEE Communications Magazine.

[32]  Wang Bo,et al.  A Trusted Opportunistic Routing Algorithm for Vanet , 2012, 2012 Third International Conference on Networking and Distributed Computing.

[33]  Shaojie Tang,et al.  Energy-Efficient Opportunistic Routing in Wireless Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.