@ARTICLE{ iet:/content/journals/10.1049/iet-ifs.2009.0140, author = {X. Li}, author = {Z. Jia}, author = {P. Zhang}, author = {R. Zhang}, author = {H. Wang}, keywords = {ad hoc on demand trusted multipath distance vector routing protocol;multiple loop free paths;multihop routing;mobile ad hoc networks;mobile wireless nodes;malicious nodes;data packet delivery;route discovery;trust based reactive on demand multipath routing;self organised system;MANET;}, ISSN = {1751-8709}, language = {English}, abstract = {A mobile ad hoc network (MANET) is a self-organised system comprised of mobile wireless nodes. All nodes act as both communicators and routers. Owing to multi-hop routing and absence of centralised administration in open environment, MANETs are vulnerable to attacks by malicious nodes. In order to decrease the hazards from malicious nodes, the authors incorporate the concept of trust to MANETs and build a simple trust model to evaluate neighbours’ behaviours – forwarding packets. Extended from the ad hoc on-demand distance vector (AODV) routing protocol and the ad hoc on-demand multipath distance vector (AOMDV) routing protocol, a trust-based reactive multipath routing protocol, ad hoc on-demand trusted-path distance vector (AOTDV), is proposed for MANETs. This protocol is able to discover multiple loop-free paths as candidates in one route discovery. These paths are evaluated by two aspects: hop counts and trust values. This two-dimensional evaluation provides a flexible and feasible approach to choose the shortest path from the candidates that meet the requirements of data packets for dependability or trust. Furthermore, the authors give a routing example in details to describe the procedures of route discovery and the differences among AODV, AOMDV and AOTDV. Several experiments have been conducted to compare these protocols and the results show that AOTDV improves packet delivery ratio and mitigates the impairment from black hole, grey hole and modification attacks.}, title = {Trust-based on-demand multipath routing in mobile ad hoc networks}, journal = {IET Information Security}, issue = {4}, volume = {4}, year = {2010}, month = {December}, pages = {212-232(20)}, publisher ={Institution of Engineering and Technology}, copyright = {© The Institution of Engineering and Technology}, url = {https://digital-library.theiet.org/;jsessionid=1gmkayovklqfh.x-iet-live-01content/journals/10.1049/iet-ifs.2009.0140} }