An Efficient and Secure Routing in MANET using Trust Model
| An Efficient and Secure Routing in MANET using Trust Model | ||
|   |  | |
| © 2022 by IJETT Journal | ||
| Volume-70 Issue-9 | ||
| Year of Publication : 2022 | ||
| Authors : Anugraha, Krishnaveni | ||
| DOI : 10.14445/22315381/IJETT-V70I9P232 | ||
How to Cite?
 
Anugraha, Krishnaveni, "An Efficient and Secure Routing in MANET using Trust Model" International Journal of Engineering Trends and Technology, vol. 70, no. 9, pp. 330-336, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I9P232
Abstract
MANET is utilised in various applications due to its ability to the faster establishment of networks. The network 
will run well if mobile nodes trust one another and collaborate. Routing is difficult, and vulnerabilities are regularly exposed 
due to the frequent connection failures and dynamic topology induced by node mobility. As a consequence, security 
measures that can reduce the impacts of multiple assaults should be included in the MANET's routing. This research 
proposes a node trust evaluation approach based on cluster structure and a trust-based model security routing (TSR). The 
proposed technique used a hierarchical structure to improve the efficiency of node reliability evaluation. Because it assures 
node reliability evaluation, path establishment between nodes, and safe data exchange, the proposed method in this research 
can sustain network performance in the presence of hostile nodes. The integrity of data transfer is increased via node-tonode key exchange without CA. The suggested trust-based model security routing strategy outperformed the competition 
regarding packet delivery ratio, throughput, average delay, and packet loss. 
Keywords
 Adhoc, MANET, Trust, Routing, Performance.
Reference
[1] K. Sumathi, and A. Priyadharshini, “Energy Optimization in Manets using on-Demand Routing Protocol,” Procedia Computer 
Science, vol. 47, pp. 460-470, 2015.
[2] M. Malathi, and S.Jayashri, “Robust against Route Failure using Power Proficient Reliable Routing in MANET,” Alexandria 
Engineering Journal, vol. 57, no. 1, pp. 11-21, 2018.
[3] S.Chavhan, P. Venkataram, “Emergent Intelligence Based Qos Routing in MANET,” Procedia Computer Science, vol. 52, pp. 659-
664, 2015.
[4] A.Koul, and H.Kaur, “Quality of Service Oriented Secure Routing Model for Mobile Ad Hoc Networks,” in Proceedings of the 2017
International Conference on Intelligent Systems, Metaheuristics& Swarm Intelligence, pp. 88-92, 2017.
[5] S. N. Shah, and R. H. Jhaveri, “A Trust-Based Scheme Against Packet Dropping Attacks in Manets,” in 2nd International 
Conference on Applied and Theoretical Computing and Communication Technology, iCATccT, pp. 68-75, 2016.
[6] R. H. Jhaveri, N. M. Patel, D. C. Jinwala, J. H. Ortiz, and A. P. de la Cruz, “A Composite Trust Model for Secure Routing in Mobile 
Ad-Hoc Networks,” Ad Hoc Networks, vol. 2, pp. 19-45, 2017.
[7] G. Singal, V.Laxmi, M. S. Gaur, S. Todi, V. Rao, M. Tripathi, and R.Kushwaha, “Multi-Constraints Link Stable Multicast Routing 
Protocol in Manets,” Ad Hoc Networks, vol. 63, pp. 115-128, 2017.
[8] Y. M. Khamayseh, S. A. Aljawarneh, and A. E. Asaad, “Ensuring Survivability Against Black Hole Attacks in MANETS for 
Preserving Energy Efficiency, Sustainable Computing,” Informatics and Systems, vol. 18, pp. 90-100, 2018.
[9] P. S. Rajendra Prasad, “Efficient Performance Analysis of Energy Aware on Demand Routing Protocol in Mobile Ad-Hoc Network,” 
Engineering Reports, vol. 2, no. 3, pp. 1-14, 2019.
[10] N. M. Quy, N. T. Ban, and V. K. Quy, “An Adaptive on-Demand Routing Protocol with Qos Support for Urban-Manets,” IAENG 
International Journal of Computer Science, vol. 49, no. 1, pp. 1-8, 2022.
[11] R. K. Sahu, and N. S. Chaudhari, “Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique,” Electronics,
vol. 7, no. 5, pp. 56, 2018.
[12] H. H. Choi, and J. R. Lee, “Local Flooding-Based on-Demand Routing Protocol for Mobile Ad Hoc Networks,” IEEE Access, vol. 7, 
pp. 85937-85948, 2019.
[13] H. N. Saha, and P.Mitra, “Intelligent Energy Aware Fidelity Based on-Demand Secure Routing Protocol for MANET,” International 
Journal of Computer Network & Information Security, vol. 10, no. 4, pp. 48-64, 2018.
[14] S. K. Duvvuri, and S.Ramakrishna, “Adaptive Neuro-Fuzzy Inference System Based on-Demand Fault Tolerant Routing Protocol 
(ANFIS-ODFTR) for Manets,” International Journal of Computer Networks and Applications, vol. 8, no. 6, pp. 719-729, 2021.
[15] R. Hinge, and J. Dubey, “Opinion Based Trusted AODV Routing Protocol for MANET,” in Proceedings of the Second International 
Conference on Information and Communication Technology for Competitive Strategies, pp. 1-5, 2016.
[16] A. Koul, and H.Kaur, “Quality of Service Oriented Secure Routing Model for Mobile Ad Hoc Networks,” In Proceedings of the 
International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, pp. 88-92, 2017.
[17] S. Gurung, and S.Chauhan, “A Novel Approach for Mitigating Route Request Flooding Attack in MANET,” Wireless Networks, vol. 
24, no. 8, pp. 2899-2914, 2018.
[18] H. Ehsan, and F. A. Khan, “Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs,” in 2012 IEEE 11th 
International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1181-1187, 2012.
[19] P. Choudhury, S. Nandi, A. Pal, and N. C. Debnath, “Mitigating Route Request Flooding Attack in MANET using Node 
Reputation,” in IEEE 10th International Conference on Industrial Informatics, pp. 1010-1015, 2012.
[20] V. Laxmi, D. Mehta, M. S. Gaur, P.Faruki, and C. Lal, “Impact Analysis of JellyFish Attack on TCP-based Mobile Ad-Hoc 
Networks,” in Proceedings of the 6th International Conference on Security of Information and Networks, pp. 189-195, 2013.
[21] B. P. Pooja, M. P. Manish, and B. P. Megha, “Jellyfish Attack Detection and Prevention in MANET,” in 2017 Third International 
Conference on Sensing, Signal Processing and Security (ICSSS), pp. 54-60, 2017.
[22] D. Bhawsar, and A. Suryavanshi, “Collaborative Intrusion Detection and Prevention Against Jellyfish Attack in MANET,” 
International Journal of Computer Applications, vol. 129, no. 13, pp. 37-42, 2015.
[23] M. Abu Zant, and A.Yasin, “Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol AIF_AODV,” Security 
and Communication Networks, vol. 2019, pp. 1-13, 2019.
[24] Z. A. Zardari, J. He, M. S.Pathan, S. Qureshi, M. I. Hussain, F.Razaque, and N.Zhu, “Detection and Prevention of Jellyfish Attacks 
Using KNN Algorithm and Trusted Routing Scheme in Manet,” International Journal of Network Security, vol. 23, no. 1, pp. 77-87, 
2021.
[25] A. Al Sharah, T. Oyedare, and S. Shetty, “Detecting and Mitigating Smart Insider Jamming Attacks in Manets Using ReputationBased Coalition Game,” Journal of Computer Networks and Communications, vol. 2016, pp. 1-14, 2016.
[26] K. Manojkumar, S. Devi, "Jamming Attack in Wireless Sensor Networks using Ant Colony Algorithm," SSRG International Journal 
of Computer Science and Engineering, vol. 8, no. 2, pp. 6-9, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSEV8I2P102
[27] M.Supriya, Dr.T.Adilakshmi, "Secure Routing using ISMO for Wireless Sensor Networks," SSRG International Journal of 
Computer Science and Engineering, vol. 8, no. 12, pp. 14-20, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSEV8I12P103
[28] S Yasaswini, G.M.Naik, P G K Sirisha, "Efficient Loss Recovery in Ad Hoc Networks," SSRG International Journal of Computer 
Science and Engineering, vol. 4, no. 1, pp. 1-7, 2017. Crossref, https://doi.org/10.14445/23488387/IJCSE-V4I1P101
[29] Nelesh Sharma, Dr. NirupamaTiwari, "Implementation of Multipath AODV for Enhanced Performance in Wireless Ad hoc 
Network," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 9, pp. 15-19, 2019. 
Crossref, https://doi.org/10.14445/23488387/IJCSE-V6I9P104.
