Open Access
Subscription Access
Open Access
Subscription Access
Strengthening the Mobile AD HOC Networks Using Enhanced Self-Detection Routing Scheme
Subscribe/Renew Journal
Reliable routing in Mobile Ad hoc NETwork (MANET) depends on individual node cooperation. The entire network performance may degrade because of even a single misbehaving node participating as an intermediate node. Thus, there is a need for incorporating secure routing with MANET to successfully operate in an adverse environment where routing security threats are employed. Looking at a few of the unsuccessful attempts by state-of-the-art routing schemes at certain applications, this paper proposes a trust-based secure routing termed as Enhanced Self-Detection Routing Scheme (ESDRS). This proposed scheme incorporates a self-detection procedure into a standard dynamic routing protocol Ad hoc On-Demand Distance Vector (AODV), finally resulting in detection and reaction to malicious nodes in MANET. The validation of the proposed approach is carried out through a comparative performance analysis with the recent Evolutionary Self-Cooperative Trust (ESCT) scheme and the standard AODV. The comparison is based on computations of Packet Delivery Ratio (PDR), delay, throughput, jitter, number of dropped data packets, Probability of Detection (PoD) of malicious and benevolent behavior, and normalized routing overhead while varying the number of nodes, the number of attackers, and node speed. Simulation results affirm that the proposed scheme improves the metric values as compared to the other routing schemes.
Keywords
Mobile Adhoc Network, AODV, Routing Disruption, Trust-Based Routing Scheme, Trust Metric
Subscription
Login to verify subscription
User
Font Size
Information
- J. Wilson and K. Subramaniam, “Improved Multi Objective Data Transmission using Conventional Route Selection Algorithm in Mobile Ad Hoc Network”, Peer-to-Peer Networking and Applications, Vol. 13, pp. 1091-1101, 2020.
- T. Li, J. Ma, Q. Pei, H. Song, Y. Shen and C. Sun, “DAPV: Diagnosing Anomalies in MANETs Routing with Provenance and Verification”, IEEE Access, Vol. 7, pp. 35302-35316, 2019
- S. Du, J. Hou, S. Song, Y. Song and Y. Zhu, “A Geographical Hierarchy Greedy Routing Strategy for Vehicular Big Data Communications over Millimeter wave”, Physical Communication, Vol. 40, pp. 1-9, 2020.
- D. Manivannan, S.S. Moni and S. Zeadally, “Secure Authentication and Privacy Preserving Techniques in Vehicular Ad-Hoc Networks”, Vehicular Communications, Vol. 25, pp. 1-18, 2020.
- W. Fang, W. Zhang, W. Chen, Y. Liu and C. Tang, “TMSRS: Trust Management-based Secure Routing Scheme in Industrial Wireless Sensor Network with Fog Computing”, Wireless Networks, Vol. 26, pp. 3169-3182, 2020.
- H.A. Ali, M.F. Areed and D.I. Elewely, “An On-Demand Power and Load-Aware Multi-Path Node-Disjoint Source Routing Scheme Implementation using NS2 for Mobile Ad-Hoc Networks”, Simulation Modelling Practice and Theory, Vol. 80, pp. 50-65, 2018.
- D. Gan Zhang, J. Xin Gao, X. Huan Liu, T. Zhang and D. Xin Zhao, “Novel Approach of Distributed and Adaptive Trust Metrics for MANET”, Wireless Networks, Vol. 25, pp. 3587-3603, 2019.
- H. Kojima, N. Yanai and J.P. Cruz, “ISDSRC: Improving the Security and Availability of Secure Routing Protocol”, IEEE Access, Vol. 7, pp. 74849-74868, 2019.
- R.J. Cai, X.J. Li and P.H.J. Chong, “An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs”, IEEE Transactions on Mobile Computing, Vol. 18, No. 1, pp. 42-55, 2019.
- M. Ponguwala and S. Rao, “E2-SR: A Novel Energy-Efficient Secure Routing Scheme to Protect MANET-IoT”, IET Communications, Vol. 13, pp. 3207-3216, 2019.
- S.N. Mahapatra, B.K. Singh and V. Kumar, “A Survey on Secure Transmission in Internet of Things: Taxonomy, Recent Techniques, Research Requirements, and Challenges”, Arabian Journal for Science and Engineering, Vol. 45, pp. 6211-6240, 2020.
- A. Sharma, E.S.Pilli, A.P. Mazumdar and P. Gera, “Towards Trustworthy Internet of Things: A Survey on Trust Management Applications and Schemes”, Computer Communications, Vol. 160, pp. 475-493, 2020.
- R.K. Chahal, N. Kumar and S. Batra, “Trust Management in Social Internet of Things: A Taxonomy, Open Issues, and Challenges”, Computer Communications, Vol. 150, pp. 13-46, 2020.
- M.A. Qurashi, C.M. Angelopoulos and V. Katos, “An Architecture for Resilient Intrusion Detection in Ad-Hoc Networks”, Journal of Information Security and Applications, Vol. 53, pp. 1-12, 2020.
- H. Riasudheen, K. Selvamani, S. Mukherjee and I. Divyasree, “An Efficient Energy-Aware Routing Scheme for Cloud-Assisted Manets in 5G”, Ad Hoc Networks, Vol. 97, pp. 1-22, 2020.
- H. Xu, “Trust-Based Probabilistic Broadcast Scheme for Mobile Ad Hoc Networks”, IEEE Access, Vol. 8, pp. 21380-21392, 2020.
- P. Theerthagiri, “FUCEM: Futuristic Cooperation Evaluation Model using Markov Process for Evaluating Node Reliability and Link Stability in Mobile Ad Hoc Network”, Wireless Networks, Vol. 26, pp. 4173-4188, 2020.
- N. Djedjig, D. Tandjaoui, F. Medjek and I. Romdhani, “Trust-Aware and Cooperative Routing Protocol for IoT Security”, Journal of Information Security and Applications, Vol. 52, pp. 1-17, 2020.
- X. Huang, R. Yu, J. Kang and Y. Zhang, “Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks”, IEEE Access, Vol. 5, pp. 25408-25420, 2017.
- A. Anand, H. Aggarwal and R. Rani, “Partially Distributed Dynamic Model for Secure and Reliable Routing in Mobile Ad hoc Networks”, Journal of Communications and Networks, Vol.18, pp. 938-947, 2016.
- W. Gong, Z. You, D. Chen, X. Zhao, M. Gu and K. Lam, “Trust based Routing for Misbehavior Detection in Ad Hoc Networks”, Journal of Networks, Vol. 5, pp. 551-558, 2010.
- E. Ochola, L. Mejaele, M. Eloff and J. Van Der Poll, “MANET Reactive Routing Protocols Node Mobility Variation Effect in Analysing the Impact of Black Hole Attack”, SAIEE Africa Research Journal, Vol. 108, pp. 80-92, 2017.
- Z. Wei, H. Tang, F. R. Yu, M. Wang and P. Mason, “Security Enhancements for Mobile Ad Hoc Networks with Trust Management using Uncertain Reasoning”, IEEE Transactions on Vehicular Technology, Vol. 63, pp. 4647-4658, 2014.
- Exata Network Emulator Software, Available at https://www.scalable-networks.com/exata-network-emulator-software, Accessed at 2021.
- D.J. Persis and T.P. Robert, “Review of Ad-Hoc on-Demand Distance Vector Protocol and its Swarm Intelligent Variants for Mobile Ad-hoc Network”, IET Networks, Vol. 6, pp. 87-93, 2017.
- A.M. El-Semary and H. Diab, “BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs based on Chaotic Map”, IEEE Access, Vol. 7, pp. 95197-95211, 2019.
Abstract Views: 141
PDF Views: 1