International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

A Trust-Based Design for Secure and Quality of Service Routing in Mobile Ad Hoc Networks

Author NameAuthor Details

G. Sripriya, T. Santha

G. Sripriya[1]

T. Santha[2]

[1]Department of Computer Science, Dr. G. R. D. College of Science, Coimbatore, Tamil Nadu, India

[2]Dr.G.R.D. College of Science, Coimbatore, Tamil Nadu, India

Abstract

The Mobile Ad Hoc Network (MANET), with its high dynamics, vulnerable links, and total decentralization, poses significant security issues. The MAODV (Multicast Ad-hoc On-Demand Distance Vector) protocol, a crucial routing protocol used in ad-hoc networks, falls short of security standards and is susceptible to assaults brought on by the hostile environment. The harmful nodal points can readily damage Mobile Ad-Hoc Networks (MANETs), which are made up of numerous wireless networks. The hardest task will be sharing bandwidth between wireless nodes while maintaining Quality of Service (QoS) for routing. To identify the potentially harmful nodes, trust-based routing strategies must be developed. The proposed effort entails constructing trust-based QoS routing with a secure mix of social and QoS trust. The suggested design's first method begins with the eradication of dead nodes, which leads to a packet collecting error. These dead nodes may also cause difficulty in the route analysis when employing trust mechanisms for communication. The suggested approach will perform better in terms of forwarding node selection based on packet behavioral characteristics. The forward node will be chosen depending on several parameters, including the residual energy between nodal locations, channel quality between nodes, and connection quality. The proposed method is simulated using the Network Simulator tool (NS2), and the simulation results show that the proposed approach is accurate and efficient in identifying and detaching problematic nodes at regular intervals.

Index Terms

Mobile Ad-Hoc Networks (MANETs)

Trust-Based QoS Routing

Forward Node Selection

Network Simulator Tool (NS2)

Reference

  1. 1.
    Pathan, Muhammad Salman, Nafei Zhu, Jingsha He, Zulfiqar Ali Zardari, Muhammad Qasim Memon, and Muhammad Iftikhar Hussain. 2018. "An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs" Future Internet 10, no. 2: 16. https://doi.org/10.3390/fi10020016.
  2. 2.
    Kumar, M., Bhandari, R., Rupani, A., & Ansari, J. H. (2018, June). Trust-based Performance Evaluation of Routing Protocol Design with Security and QoS over MANET. In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE) (pp. 139-142). IEEE
  3. 3.
    Singh, S., Chawla, M., Prasad, D., Anand, D., Alharbi, A., & Alosaimi, W. An Improved Binomial Distribution-Based Trust Management Algorithm for Remote Patient Monitoring in WBANs. Sustainability, 14(4), 2141, 2022.
  4. 4.
    R. Ferdous, V. Muthukumarasamy, and A. Sattar. A Node-based Trust Management Scheme forMobile Ad-Hoc Networks. Proceedings of the 4thInternationalConference on Network and SystemSecurity (NSS), pp. 275–280, 2010
  5. 5.
    Lwin, M. T., Yim, J., & Ko, Y. B. (2020). Blockchain-based lightweight trust management in mobile ad-hoc networks. Sensors, 20(3), 698.
  6. 6.
    Harold Robinson, Y., & Golden Julie, E. (2019). MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks. Wireless Personal Communications, 109(2), 739-760.
  7. 7.
    Am, A. B. (2021). High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism. Peer-to-Peer Networking and Applications, 14(3), 1229-1241.
  8. 8.
    Gayathri, D., & Raman, S. J. (2017, January). Pltrust AODV: Physical logical factor estimated trust embedded AODV for optimised routing in Manets. In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS) (pp. 1-5). IEEE.
  9. 9.
    Sheikh MS, Liang J, Wang W. Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey. Wireless Communications and Mobile Computing. 2020 Jan 17;2020.
  10. 10.
    Vaseer, G., Ghai, G., &Ghai, D. (2018, December). Distributed Trust-Based Multiple Attack Prevention for Secure MANETs. In 2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS) (pp. 108-113). IEEE.
  11. 11.
    Wadhwani, G. K., Khatri, S. K., & Mutto, S. K. (2020). Trust framework for attack resilience in MANET using AODV. Journal of Discrete Mathematical Sciences and Cryptography, 23(1), 209-220.
  12. 12.
    Rajkumar, B., & Narsimha, G. (2016). Trust based certificate revocation for secure routing in MANET. Procedia Computer Science, 92, 431-441.
  13. 13.
    Rahmani M, Benchaiba M. A comparative study of replication schemes for structured P2P networks[C]. Proc of the 9th Int Conf on Internet and Web Applications and Services. Lisbon, 2014: 147-158.
  14. 14.
    Lu, K. D., Zeng, G. Q., Luo, X., Weng, J., Zhang, Y., & Li, M. (2020). An adaptive resilient load frequency controller for smart grids with DoS attacks. IEEE Transactions on Vehicular Technology, 69(5), 4689-4699.
  15. 15.
    De la Rocha, A., Dias, D., & Psaras, Y. (2021). Accelerating Content Routing with Bitswap: A multi-path file transfer protocol in IPFS and Filecoin.
  16. 16.
    Elbreiki W, Hassan S, Habbal A, et al. A Comparative study of chord and pastry for the name resolution system implementation in information centric networks[C]. The 4th Int Conf on Internet Applications, Protocols and Services. Kuala Lumpur: IEEE, 2015: 359-367.
  17. 17.
    Naik, A. R., & Keshavamurthy, B. N. (2020). Next level peer-to-peer overlay networks under high churns: a survey. Peer-to-Peer Networking and Applications, 13(3), 905-931.
  18. 18.
    Djellabi, B., Amad, M., & Baadache, A. (2022). Handfan: A flexible peer-to-peer service discovery system for internet of things applications. Journal of King Saud University-Computer and Information Sciences.
  19. 19.
    Seddiki M, Benchaïba M. SWS: A smart walk mechanism for resources search in unstructured mobile P2P networks[C]. The 1st Int Conf on New Technologies of Information and Communication. Cairo: IEEE, 2015: 1-6.
  20. 20.
    An, N., Liang, X., Zheng, X., Yuan, S., Wang, X., & Guan, Z. (2022, May). Achieving Secure and Efficient P2P Data Trading based on Blockchain for Internet of Things. In Proceedings of the Fourth ACM International Symposium on Blockchain and Secure Critical Infrastructure (pp. 139-144).
  21. 21.
    Attkan, A., & Ranga, V. (2022). Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security. Complex & Intelligent Systems, 1-33.
  22. 22.
    Wang S M, Ye D D, Huang X M, et al. Consortium blockchain for secure resource sharing in vehicular edge computing: a contract-based approach. IEEE Transactions on Network Science and Engineering, 2021, 8(2): 1189-1201.
  23. 23.
    Y. S. Ha, J. C. Shim. “Wild Animal Repellent System for Prevention of Crop Damage by Wild Boars,” Journal of Korea Multimedia Society, Vol. 24, No. 2, pp. 215-221, February 2021.
  24. 24.
    Keum, D., & Ko, Y. B. (2022). Trust-Based Intelligent Routing Protocol with Q-Learning for Mission-Critical Wireless Sensor Networks. Sensors, 22(11), 3975.
  25. 25.
    Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access, 10, 14260-14269.
SCOPUS
SCImago Journal & Country Rank