3.8 Article

An Efficient Trust-Based Routing Scheme Against Malicious Communication in MANET

Journal

Publisher

SPRINGER
DOI: 10.1007/s10776-021-00523-w

Keywords

Mobile Ad hoc NETworks; AODV; Black hole; Trust-based routing; Reliable trust information sharing; Trusted route maintenance

Ask authors/readers for more resources

The paper introduces an Efficient Trust-based Routing Scheme (ETRS) to address security concerns in MANET, which includes detection and prevention of malicious nodes, reliable sharing of trust information, and trusted route maintenance. Through performance analysis, the ETRS scheme proves to be superior to existing schemes in terms of Packet Delivery Ratio, end to end delay, throughput, jitter, and Probabilty of Detection of node behavior.
The ideal routing operation in a Mobile Ad Hoc NETwork (MANET) is fundamentally dependent on the supportive node cooperation because the existence of even a single misbehaving node can cause the problem of routing disruption. This paper proposes an Efficient Trust-based Routing Scheme (ETRS) to mitigate the misbehaving nodes thereby achieving secure communication in MANET. The proposed scheme addresses the wide security concerns including the detection and prevention of malicious nodes, the reliable sharing of trust information, and the trusted route maintenance at one place. The scheme is developed and implemented in the framework of an underlying dynamic routing protocol Ad hoc On-demand Distance Vector (AODV). Its potential is validated through a comparative performance analysis with the state-of-the-art Evolutionary Self-Cooperative Trust (ESCT) scheme and the standard AODV. The superiority is proved by carrying out extensive simulations based on the measurements of Packet Delivery Ratio (PDR), end to end delay, throughput, jitter, number of data packets dropped, and the Probability of Detection (PoD) of node behavior against the variations in node density, node mobility, and attacker scenarios. The proposed scheme thus provides a gross contribution to the research society which is unlike many works from literature those focused only on selected security concerns causing the routing schemes to achieve a trade-off in the desired values of performance metrics and claim the efficiency at the expense of other aspects.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available