International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Eigen Vector Based Trust Model (EVTM) for Ensuring Quality of Service (QoS) in Mobile Ad Hoc Networks

Author NameAuthor Details

Srinivasulu Sirisala, Nageswararao Sirisala, G. Rajeswarappa

Srinivasulu Sirisala[1]

Nageswararao Sirisala[2]

G. Rajeswarappa[3]

[1]Department of Computer Science and Engineering, CVR College of Engineering, Hyderabad, Telangana, India.

[2]Department of Computer Science and Engineering, K.S.R.M. College of Engineering, kadapa, Andhra Pradesh, India.

[3]Department of Computer Science and Engineering, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh, India.

Abstract

Mobile Ad Hoc Networks (MANETs) are the infrastructure less networks. In MANETs due to node’s mobility there is frequent change of topology and nodes are provided with limited energy sources. Due to these reasons nodes may behave selfishly means they may deny forwarding other nodes’ packets in order to save their energy. Hence it pivotal to compute the nodes’ trust in MANETs for establishing reliable and secure communication paths. In MANETs, low trustworthiness of routes can significantly impact network performance. Therefore, it is strongly advisable to incorporate the trustworthiness evaluation of a node when considering it as an intermediate node. In this paper an Eigen Vector based Trust Model (EVTM) is proposed for ensuring QoS in establishing routing paths between source and destination. The proposed method constructs the global trust matrix and is used to compute the dominant eigen trust vector. It ranks the each intermediate node between source and destination based on node’s fitness degree. Through experiments conducted in the ns-2 simulator, the method demonstrates superior performance across various metrics, including throughput, packet delivery ratio, packet delay, energy consumption, and packet drop. Notably, its consistent high performance, irrespective of the number of mobile nodes, underscores the effectiveness and scalability of the Eigen-based trust model in fostering trustworthy routing paths in MANETs.

Index Terms

Mobile Ad Hoc Networks

Trust Vector

Dominant Eigen Vector

Trust

Quality of Service (QoS)

Global Trust Matrix (GTM)

Reference

  1. 1.
    S. Vassilaras, D. Vogiatzis, and G. S. Yovanof, “Security and Cooperation in clustered mobile ad hoc networks with centralized supervision”, IEEE Journal on Selected Areas in Communications, 2006, Vol. 24, No. 2, pp. 329-342.
  2. 2.
    G. Dhananjayan and J. Subbiah, “T2AR: trust-aware ad-hoc routing protocol for MANET”, SpringerPlus, , 2016, Vol. 5, 995.
  3. 3.
    M. S. Khan, M. I. Khan, S. Malik, O. Khalid, M. Azim, and N. Javaid, “MATF: A multi-attribute trust framework for MANETs”, EURASIP Journal on Wireless Communications and Networking, 2016.
  4. 4.
    Y. Li and X. Wu, “Cooperative packet-forwarding strategies in mobile ad hoc networks with unreliable channels: An evolutionary game approach”, International Journal of Distributed SensorNetworks, 2019.
  5. 5.
    K. RahimiZadeh and P. Kabiri, “Trust?based routing method using a mobility?based clustering approach in mobile ad hoc networks”, Security Comm. Networks, 2014, Vol. 7, pp. 1746-1763.
  6. 6.
    S. NageswaraRao and C. Shobabindu, “Uncertain Rule Based Fuzzy Logic QoS Trust Model in MANETs”, International Conference on Advanced Computing and Communications -ADCOM, 2015,,pp. 55-60.
  7. 7.
    A. Dorri, “An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET”, Wireless Netw. , 2014,Vol. 23, pp. 1767-1778.
  8. 8.
    L. G. Delgado, E. P. Segarra, and A. M. Mezher, “A novel dynamic reputation-based source routing protocol for mobile ad hoc networks”, J Wireless Com Network 2019, Vol. 77.
  9. 9.
    J. -H. Cho, A. Swami and I. -R. Chen, "A Survey on Trust Management for Mobile Ad Hoc Networks," in IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 562-583, Fourth Quarter 2011, doi: 10.1109/SURV.2011.092110.00088.
  10. 10.
    Sirisala, Nageswara & Chigarapalle, Shoba. (2017). “A novel QoS trust computation in MANETs using fuzzy petri nets”. International Journal of Intelligent Engineering and Systems. 10. 116-125. 10.22266/ijies2017.0430.13.
  11. 11.
    Sirisala, Srinivasulu & Ramakrishna, S.. “Survey: Enhanced Trust Management for Improving QoS in MANETs”: AICC 2018. 2019, 10.1007/978-981-13-1580-0_25.
  12. 12.
    N. Ramya and S. Rathi, "Detection of selfish Nodes in MANET - a survey," 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2016, pp. 1-6, doi: 10.1109/ICACCS.2016.7586378.
  13. 13.
    S. Janakiraman and B. B. Jayasingh, “A Hyper Exponential Factor-Based Semi-Markov Prediction Mechanism for Selfish Rendezvous Nodes in MANETs”, Wireless Pers Commun., 2019,Vol. 108, pp. 1493-1511
  14. 14.
    Savita, Verma, A. Eigen Vector Centrality (EVC) Routing for Delay Tolerant Networks: A Time Associated Matrix-Based Approach. Wireless Pers Commun 128, 2023, 1217–1233
  15. 15.
    J. Manoranjini, A. Chandrasekar, and S. Jothi, “Improved QoS and avoidance of black hole attacks in MANET using trust detection framework”, Automatika, 2019, pp. 274-284.
  16. 16.
    Sirisala, S., Rama Krishna, S.: Fuzzy COPRAS-based Node Cooperation Enforcing Trust Estimation Scheme for enhancing Quality of Service (QoS) during reliable data dissemination in MANETs. Int. J. Commun. Syst. 34(7), e4767 (2021). https://doi.org/10.1002/dac.4767
  17. 17.
    Roles A, ElAarag H. Coexistence with malicious and selfish nodes in wireless ad hoc networks: A Bayesian game approach. J Algorithm Comput Technol. 2017;11(4):353-365.
  18. 18.
    T. Kavitha, K. Geetha, and R. Muthaiah, “India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach”, J Med Syst., 2019,Vol. 43.
  19. 19.
    H. Xia, Z. Li, Y. Zheng, A. Liu, Y. Choi, and H. Sekiya, “A Novel Light-Weight Subjective Trust Inference Framework in MANETs”, IEEE Transactions on Sustainable Computing, 2020, Vol. 5, No. 2, pp. 236-248.
  20. 20.
    M. Ponguwala and S. Rao, “E2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT”, IET Communications, , 2019, Vol. 13, No. 19, pp. 3207-3216.
  21. 21.
    H. Xia, Z. Li, Y. Zheng, A. Liu, Y. -J. Choi and H. Sekiya, "A Novel Light-Weight Subjective Trust Inference Framework in MANETs," in IEEE Transactions on Sustainable Computing, 2020, vol. 5, no. 2, pp. 236-248.
  22. 22.
    X. Song, Y. Fu and M. Zhao, "Improved Artificial Bee Colony Algorithm Based on Eigenvectors of Covariance Matrix," 2023 2nd International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT), Xiamen, China, 2023, pp. 39-45, doi: 10.1109/CCPQT60491.2023.00013.
  23. 23.
    W. G. Kumar, K. S. Kumar, and S. K. Mutto, “Trust framework for attack resilience in MANET using AODV”, Journal of Discrete Mathematical Sciences and Cryptography, 2020, pp. 209-220.
  24. 24.
    Bairwa, A.K., Joshi, S. (2022). An Improved Scheme in AODV Routing Protocol for Enhancement of QoS in MANET. In: Nanda, P., Verma, V.K., Srivastava, S., Gupta, R.K., Mazumdar, A.P. (eds) Data Engineering for Smart Systems. Lecture Notes in Networks and Systems, vol 238. Springer, Singapore. https://doi.org/10.1007/978-981-16-2641-8_17.
SCOPUS
SCImago Journal & Country Rank