Routing Selection Policy on Mobile Ad-Hoc Network using Trust based Mechanism Through AODV Routing Protocol

Authors

  • Versha Matre Research Scholar, Dr. A. P. J. Abdul Kalam University, Indore, Department of Computer Science and Engineering
  • Pradnya A. Vikhar Research Supervisor, Dr. A. P. J. Abdul Kalam University, Indore, Department of Computer Science and Engineering

Keywords:

Routing Selection Policy, Mobile Ad-Hoc Network, Trust based Mechanism, AODV, DSR, Routing Protocol

Abstract

This research article provides a detailed examination of a new Trust-Aware On-Demand Distance Vector (Proposed_TAODV) protocol specifically developed for Mobile Ad Hoc Networks (MANETs). It evaluates the performance of Proposed_TAODV in comparison to the current TAODV and Dynamic Source Routing (DSR) protocols. The scope of our research is on analysing essential network performance indicators, such as throughput, end-to-end latency, and packet delivery ratio. We examine these metrics over a range of network scenarios, including different numbers of nodes, data rates, node mobility, and the potential presence of malicious nodes. The Proposed_TAODV exhibits substantial improvements in network efficiency and security, constantly surpassing the performance of current protocols in managing massive volumes of traffic, dynamic network structures, and security risks, as shown by extensive simulations. The improved performance may be due to the protocol's strong routing algorithms and sophisticated trust management system, which efficiently address the problems presented by the dynamic and frequently hostile environment of MANETs. The results of this research highlight the capability of Proposed_TAODV to improve the dependability, safety, and overall performance of MANETs, making it a viable alternative for intricate networking situations where traditional protocols are inadequate.

Downloads

Download data is not yet available.

References

T. Varshney, T. Sharma, and P. Sharma, “Implementation of watchdog protocol with AODV in mobile ad hoc network,” Proceedings - 2014 4th International Conference on Communication Systems and Network Technologies, CSNT 2014, pp. 217–221, 2014, doi: 10.1109/CSNT.2014.50.

A. O. Bang and P. L. Ramteke, “MANET : History , Challenges And Applications,” no. March, 2019.

J. Loo, J. L. Mauri, and J. H. Ortiz, “Mobile Ad Hoc Networks,” Mobile Ad Hoc Networks: Current Status and Future Trends, p. 538, Jan. 2011, doi: 10.1201/B11447.

G. Kaur and P. Thakur, “Routing Protocols in MANET: An Overview,” 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies, ICICICT 2019, pp. 935–941, Jul. 2019, doi: 10.1109/ICICICT46008.2019.8993294.

K. Taneja, H. Taneja, and R. Kumar, “SPF: Segmented processor framework for energy efficient proactive routing based applications in MANET,” 2015 2nd International Conference on Recent Advances in Engineering and Computational Sciences, RAECS 2015, Apr. 2016, doi: 10.1109/RAECS.2015.7453411.

M. Kumar and R. Mishra, “An Overview of MANET : History , Challenges and Applications,” Indian Journal of Computer Science and Engineering, vol. 3, no. 1, pp. 121–125, 2012, [Online]. Available: http://www.ijcse.com/docs/INDJCSE12-03- 01-144.pdf

sadiya mirza, “manet(Sadiya Mirza)2018,” 2018.

J. G. Ponsam and R. Srinivasan, “A Survey on MANET Security Challenges,, Attacks and its Countermeasures,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), vol. 3, no. 1, pp. 274–279, 2014.

J. Zhou, L. Liu, and H. Tan, “Traffic-predictive QoS on-demand routing for multi- channel mobile ad hoc networks,” EURASIP J Wirel Commun Netw, vol. 2018, no. 1, pp. 1–13, Dec. 2018, doi: 10.1186/S13638-018-1274-3/FIGURES/9.

O. K. Sahingoz, “Mobile networking with UAVs: Opportunities and challenges,” 2013 International Conference on Unmanned Aircraft Systems, ICUAS 2013 - Conference Proceedings, pp. 933–941, 2013, doi: 10.1109/ICUAS.2013.6564779.

R. Meddeb, F. Jemili, B. Triki, and O. Korbaa, “A Deep Learning based Intrusion Detection Approach for MANET,” 2022, doi: 10.21203/rs.3.rs-1349334/v1.

L. Raja and C. S. Santhosh Baboo, “An Overview of MANET: Applications, Attacks and Challenges,” International Journal of Computer Science and Mobile Computing, vol. 3131, no. 1, pp. 408–417, 2014, [Online]. Available: https: //pdfs semantic scholar .org/6 e42/ 2d85d716ce18ddb6b177e93f36ecdb3a20da .pdf

I. A. Sumra, P. Sellappan, A. Abdullah, and A. Ali, “Security issues and Challenges in MANET-VANET-FANET: A Survey,” EAI Endorsed Transactions on Energy Web, vol. 5, no. 17, pp. e16–e16, Apr. 2018, doi: 10.4108/EAI.10-4-2018.155884.

P. Chitra, “A Study on Manet: Applications, Challenges and Issues,” IJERT Journal International Journal of Engineering Research and Technology, Accessed: Oct. 20, 2022. [Online]. Available: www.ijert.org

B. Banerjee and S. Neogy, “A brief overview of security attacks and protocols in MANET,” Proceedings of the 2021 IEEE 18th India Council International Conference, INDICON 2021, 2021, doi: 10.1109/INDICON52576.2021.9691554.

N. Dubey and K. Kumar Joshi, “An Approach to Detect Wormhole Attack in AODV based MANET,” Int J Comput Appl, vol. 114, no. 14, pp. 32–39, 2015, doi: 10.5120/20049-2098.

M. Rath, J. Swain, B. Pati, and B. K. Pattanayak, “Network Security: Attacks and Control in MANET,” https://services.igi- global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-4100-4.ch002, pp. 19–37, Jan. 1AD, doi: 10.4018/978-1-5225-4100-4.CH002.

Raja L, Baboo SS. An overview of MANET: Applications, attacks and challenges. International journal of computer science and mobile computing. 2014 Jan;3(1):408-17.

R. Krishnan, “1-4 Rahul Krishnan. A Survey on Game Theory Approaches for Improving Security in MANET,” American Journal of Electrical and Computer Engineering, vol. 2, no. 1, pp. 1–4, 2018, doi: 10.11648/j.ajece.20180201.11.

Hanif M, Ashraf H, Jalil Z, Jhanjhi NZ, Humayun M, Saeed S, Almuhaideb AM. AI-based wormhole attack detection techniques in wireless sensor networks. Electronics. 2022 Jul 26;11(15):2324.

Gohil Y, Sakhreliya S, Menaria S. A review on: detection and prevention of wormhole attacks in MANET. International Journal of Scientific and Research Publications. 2013 Feb;3(2):1-6.

Zougagh, H., Idboufker, N., El Mourabit, Y., Saadi, Y. and Elouaham, S., 2021. Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge. In Innovations in Bio-Inspired Computing and Applications: Proceedings of the 11th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2020) held during December 16-18, 2020 11 (pp. 217-230). Springer International Publishing.

Mishra P, Kispotta A. “Identification of Worm Hole Attack in MANET using Cluster basedApproach”.

S. Singh and H. S. Saini, “Intelligent Ad-Hoc-On Demand Multipath Distance Vector for Wormhole Attack in Clustered WSN,” Wirel Pers Commun, vol. 122, no. 2, pp. 1305–1327, 2022, doi: 10.1007/s11277-021-08950-x.

A. M. Bamhdi, “Efficient dynamic-power AODV routing protocol based on node density,” Comput Stand Interfaces, vol. 70, Jun. 2020, doi: 10.1016/j.csi.2019.103406.

Tarus HS, Alias SB, Parthasarathy R. A review of energy efficient on-demand routing protocols and the design of energy efficient algorithm in mobile ad hoc networks. InAIP Conference Proceedings 2023 Nov 27 (Vol. 2847, No. 1). AIP Publishing.

V. Sahu, P. Kumar Maurya, G. Sharma, A. Roberts, and M. Srivastava, “An Overview of AODV Routing Protocol,” International Journal of Modern Engineering Research (IJMER) www.ijmer.com, vol. 2, no. 3, Accessed: Oct. 21, 2022. [Online]. Available: https://www.researchgate.net/publication/252068339

J. H. Majeed, N. A. Habeeb, and W. K. Al-Azzawi, “Performance investigations of internet protocol versions for mobile Ad-hoc network based on qualnet simulator,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, no. 1, pp. 497–504, 2021, doi: 10.11591/ijeecs.v21.i1.pp497-504.

Downloads

Published

13.12.2023

How to Cite

Matre , V. ., & Vikhar , P. A. . (2023). Routing Selection Policy on Mobile Ad-Hoc Network using Trust based Mechanism Through AODV Routing Protocol. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 683–694. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4261

Issue

Section

Research Article