CFP last date
20 December 2024
Reseach Article

Trust and Shortest Path Selection based Routing Protocol for MANET

by Naveen Kumar Gupta, Amita Garg
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 12
Year of Publication: 2013
Authors: Naveen Kumar Gupta, Amita Garg
10.5120/13300-0778

Naveen Kumar Gupta, Amita Garg . Trust and Shortest Path Selection based Routing Protocol for MANET. International Journal of Computer Applications. 76, 12 ( August 2013), 20-23. DOI=10.5120/13300-0778

@article{ 10.5120/13300-0778,
author = { Naveen Kumar Gupta, Amita Garg },
title = { Trust and Shortest Path Selection based Routing Protocol for MANET },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 12 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number12/13300-0778/ },
doi = { 10.5120/13300-0778 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:45:43.730547+05:30
%A Naveen Kumar Gupta
%A Amita Garg
%T Trust and Shortest Path Selection based Routing Protocol for MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 12
%P 20-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc Network (MANET) comprises a Collection of wireless nodes that does not rely on any fixed infrastructure or base station. Trust based routing in MANET is challenging task due to its on demand dynamic nature which makes it susceptible to various types of attacks such as black holes, Byzantine, rushing attacks etc. The proposed trust based Management framework gives an overview about trust in MANETs. It works on the concept of trust factor in (initialization phase), for selecting the most efficient route and a routing path is evaluated using the concept of trust value that is updated during the route exchange process. The performance metric considered are throughput, number of drop packets and packet delivery ratio (PDR). The simulation results show that the proposed protocol gives better performance than existed protocol.

References
  1. C. Perkins, E. Royer and S. Das, "Ad hoc on demand distance vector routing", RFC-3651, (July 2003).
  2. David B. Johnson, David A. Maltz, Josh Broch ,"DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks", Computer Science Department, Carnegie Mellon University, 1994.
  3. Charles E. Perkins and Pravin Bhagwat, "Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers", ACM SIGCOMM ?94, 1994.
  4. Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay ," Different Types of Attacks on Integrated MANET-Internet Communication ",International Journal of Computer Science and Security (IJCSS) Volume (4): Issue (3), 2005.
  5. Manel Guerrero Zapata ," Secure Ad hoc On-Demand Distance Vector Routing", Mobile Computing and Communications Review, Volume 6, Number 3, 2006.
  6. Y. C. Hu, A. Perrig and D. B. Johnson, "Ariadne: A secure on demand routing protocol for ad-hoc networks" in Proc. 8th ACM conf. Mobile Computing Network, Sep. 2002, pp 12-23.
  7. Rajiv K. Nekkanti, Chung-wei Lee, "Trust Based Adaptive On Demand Ad Hoc Routing Protocol", ACMSE, Huntsville, Alabama, USA, 2004.
  8. Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen ," A Survey on Trust Management for Mobile Ad Hoc Networks", IEEE Communications Surveys & Tutorials, 2011.
  9. NaghamH. Saeed, MaysamF. Abbod, and Hamed S. Al-Raweshidy ," MANET Routing Protocols Taxonomy", International Conference on Future Communication Networks 2012.
  10. Sunil Taneja and Ashwani Kush ," A Survey of Routing Protocols in Mobile Ad Hoc Networks", International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010.
  11. NS-2 Reference "http://www. isi. edu/nsnam/ns/".
  12. Watchara and Sakuna ,"CAODV: Free Blackhole Attack in Ad Hoc Networks", International Conference on Computer Networks and Communication Systems, IPCSIT vol-35, 2012.
  13. Tameem Eissa & Shukor Abdul Razak & Rashid Hafeez Khokhar & Normalia Samian ," Trust-Based Routing Mechanism in MANET: Design and Implementation" , Springer Science, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Trust security shortest path AODV attacks MANET.