Light-weight trust-based routing protocol for mobile ad hoc networks

Light-weight trust-based routing protocol for mobile ad hoc networks

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Mobile ad hoc networks (MANETs) were originally designed for a cooperative environment. To use them in hostile environments, trust-based routing can be used, where instead of establishing the shortest routes as done in traditional routing protocols, most trusted routes are established. In this study, the authors present a light-weight trust-based routing protocol. It is light-weight in the sense that the intrusion detection system (IDS) used for estimating the trust that one node has for another, consumes limited computational resource. Moreover, it uses only local information thereby ensuring scalability. Our light-weight IDS takes care of two kinds of attacks, namely, the blackhole attack and the grey hole attack. Whereas our proposed approach can be incorporated in any routing protocol, the authors have used AODV as the base routing protocol to evaluate our proposed approach and give a performance analysis.


    1. 1)
    2. 2)
    3. 3)
    4. 4)
      • Marti, S., Giuli, T.J., La, K., Baker, M.: `Mitigating routing misbehaviour in a mobile ad-hoc environment', Proc. Sixth Annual ACM/IEEE Int. Conf. on Mobile Computing and Networking, August 2000.
    5. 5)
      • Buchegger, S., Le Boudec, J.: `Performance analysis of the CONFIDANT protocol (cooperation of nodes – fairness in dynamic ad-hoc networks', Proc. Third ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc’02), June 2002, p. 226–336.
    6. 6)
      • Michiardi, P., Molva, R.: `Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks', Proc. Sixth IFIP Communication and Multimedia Security Conf. (CMS’02), September 2002.
    7. 7)
    8. 8)
    9. 9)
      • Balakrishnan, V., Varadharajan, V., Lucs, P., Tupakula, U.K.: `Trust enhanced secure mobile ad-hoc network routing', Proc. 21st Int. Conf. on Advanced Information Networking and Applications Workshops (AINAW’07), 2007.
    10. 10)
      • Buttyan, L., Hubaux, J.: `Enforcing service availability in mobile ad hoc networks', Proc. IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), 2000, p. 87–96.
    11. 11)
      • Buttyan, L., Hubaux, J.: `Stimulating cooperation in self-organizing mobile ad hoc networks', Proc. ACM/Kluwer Mobile Networks and Applications (MONET), 2003, 8, p. 579–592.
    12. 12)
      • Hu, Y., Perrig, A., Johnson, D.B.: `Ariadne: a secure on-demand routing protocol for ad-hoc networks', Proc. Mobicom 2002, National Science Foundation and the Polytechnic University, 23–26 September 2002, Atlanta, Georgia, USA.
    13. 13)
      • Balakrishnan, V., Varadharajan, V., Tupakula, U.K.: `Fellowship: defense against flooding and packet drop attacks in MANET', Proc. 10th IEEE/IFIP Network Operations and Management Symp., 2006, Vancouver, Canada, p. 1–4.
    14. 14)
      • Pirzada, A.A., McDonald, C.: `Establishing trust in pure ad hoc networks', Proc. 27th Australian Computer Science Conf. (ACSC), 2004, 26, p. 47–54.
    15. 15)
      • H.N. Saha , D. Bhattacharyya , P.K. Banerjee . A distributed administration based approach for detecting and preventing attacks on mobile ad hoc networks. Int. J. Sci. Eng. Res. , 3
    16. 16)
      • Xing, F., Wang, W.: `Understanding dynamic denial of service attacks in mobile ad hoc networks', Proc. Military Communications Conf., (MILCOM 2006), 2006, p. 1–7.
    17. 17)
      • Lima, M.N., da Silva, H.W., dos Santos, A.L., Pujolle, G.: `Requirements for survivable routing in MANETs', Proc. Wireless Pervasive Computing, (ISWPC 2008), 2008, p. 441–445.
    18. 18)
    19. 19)
      • Zakhary, S.R., Radenkovic, M.: `Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments', Proc. IEEE/IFIP WONS 2010 – Seventh Int. Conf. on Wireless On-demand Network Systems and Services, 2010, p. 161–167.
    20. 20)
      • Su, M.-Y., Chiang, K.-L., Liao, W.-C.: `Mitigation of black-hole nodes in mobile ad hoc networks', Proc. Parallel and Distributed Processing with Applications (ISPA), 2010, p. 162–167.
    21. 21)
      • Tamilselvan, L., Sankaranarayanan, V.: `Prevention of blackhole attack in MANET', Proc. Wireless Broadband and Ultra Wideband Communications, 2007 (AusWireless 2007), 2007, p. 21–26.
    22. 22)
      • Bhalaji, N., Shanmugam, A.: `Association between nodes to combat blackhole attack in DSR based MANET', Proc. Wireless and Optical Communications Networks (WOCN), 2009, p. 1–5.
    23. 23)
      • Abusalah, L., Khokhar, A., BenBrahim, G., ElHajj, W.: `TARP: trust-aware routing protocol', Proc. ACM IWCMC 2006, 3–6 July 2006, Vancouver, Canada.
    24. 24)
      • Rezgui, A., Eltoweissy, M.: `TARP: a trust-aware routing protocol for sensor-actuator networks', Proc. Fourth IEEE Int. Conf. on Mobile Ad Hoc and Sensor Networks, October 2007, Pisa, Italy.
    25. 25)
      • Umuhoza, D., Agbinya, J.I., Omlin, C.W.: `Estimation of trust metrics for MANET using QoS parameters and source routing algorithms', Proc. Second Int. Conf. on Wireless Broadband and Ultra Wideband Communications, (AusWireless 2007), 2007.
    26. 26)
      • Li, X., Lyu, M.R., Liu, J.: `A trust model based routing protocol for secure ad hoc networks', Proc. IEEE Aerospace Conf., 2004.
    27. 27)
      • Virendra, M., Jadliwala, M., Chandrasekaran, M., Upadhyaya, S.: `Quantifying trust in ad-hoc networks', Proc. IEEE Int. Conf. on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), 2005, p. 65–71.
    28. 28)
      • Meka, K.D., Virendra, M., Upadhyaya, S.: `Trust based routing decisions in mobile ad-hoc networks', Proc. Workshop on Secure Knowledge Management (SKM 2006), 2006.
    29. 29)
      • Perkins, C.E., Royer, E.M.: `Ad-hoc on-demand vector routing', Proc. Second IEEE Workshop on Mobile Computing Systems and Applications, February 1999, New Orleans, LA, p. 90–100.

Related content

This is a required field
Please enter a valid email address