Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks

Quality of service QoS provisioning in mobile ad hoc networks MANETs is one of the fundamental concerns in this area. Autonomous mobility of nodes is one of the main factors affecting the network QoS. A lack of fixed infrastructure and central control on the nodes complicate guaranteeing the QoS in MANETs. Security is a major factor affecting the QoS in such networks. This paper proposes a new routing method based on trust among the nodes and applies a clustering approach to MANETs. This routing scheme can calculate the trustworthiness of the route and the shortest routes to the destination by avoiding identified malicious nodes. The effects of node mobility and number of malicious nodes on routing performances are investigated in the reported research. Simulation is used to show the effectiveness of the proposed approach in comparison with a categorized trust method, Ad hoc On-demand Distance Vector, trust vector-based Ad hoc On-demand Distance Vector, and trust vector-based dynamic source routing in terms of end-to-end delay, network throughput, and packet delivery ratio at the expense of a moderate increase in the routing overhead. The proposed trust-based routing method finds the trustworthy route by applying end-to-end trust calculation and finds the optimal route by performing clustering scheme from the source node to the destination node. In the extended proposed routing method, adding a nonce-based encryption scheme results in improved packet delivery ratio, network throughput, and malicious node detection rate. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Ruidong Li,et al.  Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.

[2]  Mohammad S. Obaidat,et al.  A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks , 2016, Secur. Commun. Networks.

[3]  Azzedine Boukerche,et al.  Joint authentication and quality of service provisioning in cooperative communication networks , 2012, Comput. Commun..

[4]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[5]  Abderrahim Benslimane,et al.  A secure and resistant architecture against attacks for mobile ad hoc networks , 2010, Secur. Commun. Networks.

[6]  Juan-Carlos Cano,et al.  An overview of anonymous communications in mobile ad hoc networks , 2012, Wirel. Commun. Mob. Comput..

[7]  Chonggang Wang,et al.  Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks , 2013, Secur. Commun. Networks.

[8]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[9]  Ioannis Lambadaris,et al.  Trust establishment in cooperative wireless relaying networks , 2014, Wirel. Commun. Mob. Comput..

[10]  Ram Ramanathan,et al.  Hierarchically‐organized, multihop mobile wireless networks for quality‐of‐service support , 1998, Mob. Networks Appl..

[11]  Junzhou Luo,et al.  A trust degree based access control in grid environments , 2009, Inf. Sci..

[12]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[13]  Bo Wang,et al.  A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..

[14]  Kai-Wei Ke,et al.  Mobile awareness based cluster selection mechanisms in wireless ad hoc networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[15]  Xiaoyan Hong,et al.  Performance evaluation of anonymous routing protocols in MANETs , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[16]  Sherali Zeadally,et al.  Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.

[17]  Haiying Shen,et al.  ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs , 2011, IEEE Transactions on Mobile Computing.

[18]  Jamal N. Al-Karaki,et al.  Stimulating Node Cooperation in Mobile Ad hoc Networks , 2008, Wirel. Pers. Commun..

[19]  Nei Kato,et al.  Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[20]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[21]  Miss Laiha Mat Kiah,et al.  A more secure and scalable routing protocol for mobile ad hoc networks , 2013, Secur. Commun. Networks.

[22]  In-Young Ko,et al.  AODV-RIP: improved security in mobile ad hoc networks through route investigation procedure , 2010 .

[23]  Paolo Santi,et al.  The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[24]  Mukesh Singhal,et al.  Trust Management in Distributed Systems , 2007, Computer.

[25]  Phillip Rogaway,et al.  Nonce-Based Symmetric Encryption , 2004, FSE.

[26]  Yanheng Liu,et al.  Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..

[27]  Ming Gu,et al.  Trust Based Routing for Misbehavior Detection in Ad Hoc Networks , 2010, J. Networks.

[28]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[29]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[30]  Edwin Hsing-Mean Sha,et al.  Impact of trust model on on-demand multi-path routing in mobile ad hoc networks , 2013, Comput. Commun..

[31]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[32]  Otto Carlos Muniz Bandeira Duarte,et al.  Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.

[33]  Anupam Joshi,et al.  Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..

[34]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.