Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

An Unobservable On-demand Routing Protocol with Trust Management Mechanism

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 14
Year of Publication: 2015
Rajani B. Patil
Dhanashree Kulkarni

Rajani B Patil and Dhanashree Kulkarni. Article: An Unobservable On-demand Routing Protocol with Trust Management Mechanism. International Journal of Computer Applications 122(14):6-13, July 2015. Full text available. BibTeX

	author = {Rajani B. Patil and Dhanashree Kulkarni},
	title = {Article: An Unobservable On-demand Routing Protocol with Trust Management Mechanism},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {14},
	pages = {6-13},
	month = {July},
	note = {Full text available}


Mobile ad hoc network(MANET) is highly challenging network environment due to its own properties like open medium, dynamic topology, distributed cooperation, and capability constraint. MANET is self-directed and infrastructure less network. As network is wireless, routing plays an important part in the security of the whole system. Secure transmission of data in between nodes is an imperative concern. Any attacker get remote node by using transceiver and without being caught. The objective of this paper is to propose new secure unobservable routing protocol with trust management mechanism, where attacker gets blocked while making spoofing or eavesdropping attacks. Only unobservable message could be gathered by attacker. An USOR protocol is implemented on ns2 with its performance is evaluated by comparing with AODV and AMODV. The proposed protocol will also protect privacy information among network and will detect and block compromised nodes through trust-aware routing framework.


  • Pfitzmann and M. Hansen, ?Anonymity, unobservability, and pseudonymity: a consolidated proposal for terminology,? draft, July 2000.
  • Kui Ren, Ming Gu, and Zhiguo Wan , "USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks,"IEEE Trans. on Wireless Communications, vol. 11, no. 5, pp. 1922-1932, 2012.
  • J. Kong and X. Hong, "ANODR: aonymous on demand routing with untraceable routes for mobile ad-hoc networks," in Proc. ACM MOBIHOC' 03, pp. 291–302.
  • Chim T. M, Dong Y, Hui C. K, Li V. O. K. and Yiu S. M. (2009) "ARMR: Anonymous Routing Protocol with Multiple Routes For Communications in Mobile Ad Hoc Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1536– 1550.
  • K. E. Defrawy and G. Tsudik, "ALARM: anonymous location-aided routing in suspicious MANETs," IEEE Trans. Mobile Comput. , vol. 10, no. 9, pp. 1345–1358, 2011.
  • Zhu, Z. Wan, F. Bao, R. H. Deng, and M. KankanHalli, "Anonymous secure routing in mobile ad-hoc networks," in Proc. 2004 IEEE Conference on Local Computer Networks, pp. 102–108.
  • Y. Xiao, X. Shen, and D. -Z. Du (Eds. ), "A survey on attacks and countermeasures in mobile ad hoc networks", Wireless/Mobile Network Security, chapter 12, pp 1-38, Springer, 2006
  • S. Seys and B. Preneel, "ARM: anonymous routing protocol for mobile ad hoc networks," in Proc. 2006 IEEE International Conference on Advanced Information Networking and Applications, pp. 133–137.
  • L. Song, L. Korba, and G. Yee, "AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks," in Proc. 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 33–42.
  • Y. Dong, T. W. Chim, V. O. K. Li, S. -M. Yiu, and C. K. Hui, "ARMR: anonymous routing protocol with multiple routes for communications in mobile ad hoc networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1536– 1550, 2009. A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, "SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks," in Proc. 2004 IEEE LCN, pp. 618–624.
  • Sy, R. Chen, and L. Bao, "ODAR: on-demand anonymous routing in ad hoc networks," in 2006 IEEE Conference on Mobile Ad-hoc and Sensor Systems.
  • Y. Zhang, W. Liu, and W. Lou, "Anonymous communications in mobile ad hoc networks," in 2005 IEEE INFOCOM.
  • Dong, M. Li, Y. Liu, X. -Y. Li, and X. Liao, "Topological detection on wormholes in wireless ad hoc and sensor networks," IEEE/ACM Trans. Netw. , vol. 19, no. 6, pp. 1787–1796, Dec. 2011.
  • Guoxing Zhan, Weisong Shi, and Julia Deng, 2012 "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs" IEEE Transactions on Dependable and Secure Computing, Volume 9, Issue 2, pp. 184-197.
  • W. Gong, Z. You, D. Chen, X. Zhao, M. Gu, and K. Lam, "Trust based routing for misbehavior detection in ad hoc networks," Journal of Networks, vol. 5, no. 5, May 2010.
  • Shao-Shan Chiang, , Chih-Hung Huang, and Kuang-Chiung Chang, "A Minimum Hop Routing Protocol for Home Security Systems Using Wireless Sensor Networks," IEEE Transactions on Consumer Electronics, Vol. 53, No. 4, NOVEMBER 2007.
  • Xufei Mao Shaojie Tang, Xiaohua Xu Xiang-Yang Li, and Huadong Ma, "Energy-Efficient Op-portunistic Routing in Wireless Sensor Networks," IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 11, NOVEMBER 2011.
  • A Novel Security Scheme for Wireless Adhoc Network, Abhijit Das Soumya Sankar Basu Atal Chaudhuri, 978-1-4577-0787-2/11 IEEE 2011.
  • Huei-Wen Ferng,Rachmarini, D. ,"A secure routing protocol for wireless sensor networks with consideration of energy efficiency/Network Operations and Management Symposium (NOMS)," 2012 IEEE .
  • Anfeng Liu, Zhongming Zheng , Chao Zhang, Zhigang Chen, and Xuemin (Sherman) Shen,"Secure and Energy-Efficient Disjoint Multipath Routing for WSNs," IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER 2012.
  • Rong Fan, Jian Chen, Jian-Qing Fu, Ling-Di Ping,,"A Steiner-Based Secure Multicast Routing Protocol for Wireless Sensor Network/Parallel and Distributed Systems," IEEE Transactions on (Volume:PP , Issue: 99 ), April 2013.
  • Salwa Aqeel Mahdi, Mohamed Othman, Hamidah Ibrahim, Jalil Md. Desa and Jumat Sulaiman, "PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW," Journal of Computer Science 9 (5): 607-619, 2013, ISSN 1549-3636
  • S. Capkun, L. Buttyan, and J. Hubaux, ?Self-organized public-key management for mobile ad hoc networks,? IEEE Trans. Mobile Comput. , vol. 2, no. 1, pp. 52–64, Jan. -Mar. 2003.
  • K. Marina and R. Samir, "Ad Hoc on-Demand Multipath Distance Vector Routing," Wireless Communications and Mobile Computing, 2006, pp. 969-988. http://dx. doi. org/10. 1002/wcm. 432