A Review of Various Trust Based Models in MANET
Keywords:
QoS Constraints, Trust prophecy, malicious nodes, and Trust based QoS routing.Abstract
(MANETs) Mobile Ad-hoc Networks is a group of mobile nodes that are connected dynamically, in which each node acts as a router to all other nodes. Due to the absence of centralized administration and dynamic nature, MANETs are vulnerable to various kinds of attacks from malicious nodes. Several secure routing protocols like AODV, DSR, TSR, and OLSR have been used in MANET for transmission of data. In MANET, we are using trust based QoS aware routing protocol for identifying the malicious nodes in the network. Trust is mandatory in routing for transmission of data securely. Hence trust models, trust computation is implemented in the routing protocols. In this paper, survey of several trusts based and QoS aware routing protocol is performed. In this review paper, the study of different trust based and QoS aware AODV protocols that are using trusted infrastructure and trust models is performed for preventing the attacks and misbehavior from malicious nodes in the network. The performance of trust based routing protocol has been analyzed that helps to work efficiently and can be used in various applications of MANETs for improving the security performance of the network.
References
- T., B Wang, X Chen, W Chang, "A Light- Weight Trust- Based QoS Routing Algorithm for Ad Hoc Networks",
- Pervasive and Mobile Computing 13, pp. 164-180, 2015
- Suparna, Tanumoy, Sarmistha, "Trust Based energy Efficient Detection and Avoidance of Black Hole attack to ensure routing in MANET", Applications and Innovations in Mobile Computing, pp. 157-164, 2016
- P Kautoo, Dr. Piyush Shukla, Dr. Sanjay Silakari, "Trust formulization in Dynamic Source Routing Protocol using SVM", IJITCS, MECS, pp. 43-50, 2015
- C. Kanani, A. Sinhal, "Ant Colony Optimization based modified AOMDV for multipath routing in MANET", IJCA, Volume 82, Pp. 14-19, Nov 2014
- R. Menaka, Dr. V. Ranganathan, "A Survey of Trust related Protocols for Mobile Ad Hoc Networks". IJETAR journal, volume 3, Pp. 903-910, April 2015
- Dr. K. Thirunadana, Sikamani, D. Santhosh Kumar, "Efficient and Secure Trust based Ad Hoc Routing in MANET", ICCTET, Pp. 255-258, 2015
- Radha Krishna Bara, Jyotsna Kumar Mandala and Moirangthem Marjit Singh, "QoS of MANET Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack", ICIMTA , Procedia Technology 10, Pp. 530 - 537, 2014
- K. Govindan, P. Mohapatra, "Trust Computations and Trust Dynamics in Mobile Ad Hoc Networks: A Survey", IEEE Communications Surveys and Tutorials 14, Pp. 279-298, 2012
- G.M. Kaur, K. Kumar, "QoS Routing Protocols for Mobile Ad Hoc Networks: A Survey", IJWMC-5, Pp. 107-118, 2012
- Z.K.Lee, G. Lee, H. Rai oh, H. Song, "QoS aware Routing and Power Control Algorithm for Multimedia Service over Multihop Mobile Ad Hoc Network", Wireless Communications and Mobile Computing-12, pp. 567-579, 2012
- P. V Krishna, V.Saritha, et al, "Quality ofSservice enabled Ant Colony-based Multipath Routing for Mobile Ad hoc Networks", Published in IET communications- 6, Pp. 76-83, 2014
- Yogendra Jain, Pankaj Sharma, "Trust based Ad Hoc on- Demand Distance Vector for MANET", NCSI Conference, Pp. 1-11, 2015
- Rutvij H. Jhaveri, Sankita Patel, Devesh Jinwala, "DoS attacks in Mobile Ad-hoc Networks: A Survey", pp. 535-541, 2012
- Jin Hee Cho, Ananthram Swami, Ray Chen, "A Survey on Trust Management for Mobile Ad Hoc Networks", IEEE Communication Surveys and Tutorials 13, pp. 562- 583, 2014
- Sudhir Agrawal, Sanjeev jain, Sanjeev Sharma, "A survey of Routing attacks and security measures in Mobile ad hoc networks", Journal of computing, Volume 3, pp. 41-48, 2015
- T. Eissa, S. A. Razak, Rashid H. Khokhar, N. Samian, "Trust- based Routing Mechanism in MANET: Design and Implementation", Springer Journal, Pp. 666-677, 2011
- Pedro B. Velloso, Rafael P. Laufer, Daniel de O.Cunha , "Trust Management in Mobile Ad Hoc Networks using a Scalable Maturity-based Model", IEEE Transactions in Network-7, Pp. 172-185, 2010
- A Menaka Pushpa, "Trust based Secure Routing in AODV Routing Protocol’, IEEE Transaction, Pp. 1-6, 2009
- S. Lu, L. Li, and K. Yan Lam, L. Jia, "SAODV: A MANET routing protocol that can withstand Black Hole attack", Published in IEEE ICCIS, pp. 421-425, 2009
- A. Khokhar, L.Abusalah, M Guizani, "A Survey of Secure Mobile Ad Hoc Routing Protocols", IEEE Communication in Surveys and Tutorials- 19, pp. 78-93, 2008
- C Liu, J. Kaiser, "A Survey of Mobile Ad Hoc Network Routing Protocols", University of Magdeburg, Pp. 1-36, 2005
- L Khelladi, D Djenouri , N Badache, "A Survey of Security issues in Mobile Ad Hoc and Sensor Networks", IEEE Communication Surveys and Tutorials, Pp. 2-28, 2005
- Wendi, L Chen, B Heinzelman, "QoS-aware Routing based on Bandwidth estimation for Mobile Ad Hoc Networks", IEEE Communication, Pp. 561-572, 2005
- A Perrig, Y hu, "A Survey of Secure Wireless Ad Hoc Routing", IEEE Computer Society-2 , pp. 28-39, 2004
- R Kravets, S Yi, "MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks", II Annual PKI’03, pp 1- 3, 2003
- Y C Hu, A Perrig, and D B Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks", 8th Annual IICMCN Mobicom, pp. 12-23, 2002
- C Zhu, M Scott Corson, "QoS Routing for Mobile Ad Hoc Networks", Flarion Technologies, Pp. 1-10, 2002
- Rinzboorg, N. Asokan, "Key Agreement in Ad Hoc Networks", Computer Communication, Volume 23, Pp. 1627-1637, 2000
- B Praveen Kumar,B Bharath Bhushan, P Chandra Sekhar, N Papanna, "A Survey on MANET Security Challenges and Routing Protocols", IJCTA, Volume 4, pp 248-256,2000
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.