CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Survey of various Trust based QoS aware Routing Protocol in MANET

by Jyoti Verma, Piyush Kumar Shukla, Rajeev Pandey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 137 - Number 3
Year of Publication: 2016
Authors: Jyoti Verma, Piyush Kumar Shukla, Rajeev Pandey
10.5120/ijca2016908671

Jyoti Verma, Piyush Kumar Shukla, Rajeev Pandey . Survey of various Trust based QoS aware Routing Protocol in MANET. International Journal of Computer Applications. 137, 3 ( March 2016), 34-43. DOI=10.5120/ijca2016908671

@article{ 10.5120/ijca2016908671,
author = { Jyoti Verma, Piyush Kumar Shukla, Rajeev Pandey },
title = { Survey of various Trust based QoS aware Routing Protocol in MANET },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 137 },
number = { 3 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 34-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume137/number3/24258-2016908671/ },
doi = { 10.5120/ijca2016908671 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:37:23.485818+05:30
%A Jyoti Verma
%A Piyush Kumar Shukla
%A Rajeev Pandey
%T Survey of various Trust based QoS aware Routing Protocol in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 137
%N 3
%P 34-43
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

(MANETs) Mobile Ad-hoc Networks is a group of mobile nodes that are connected dynamically, in which each node acts as a router to all other nodes. Due to the absence of centralized administration and dynamic nature, MANETs are vulnerable to various kinds of attacks from malicious nodes. Several secure routing protocols like AODV, DSR, TSR, and OLSR have been used in MANET for transmission of data. In MANET, we are using trust based QoS aware routing protocol for identifying the malicious nodes in the network. Trust is mandatory in routing for transmission of data securely. Hence trust models, trust computation is implemented in the routing protocols. In this paper, survey of several trusts based and QoS aware routing protocol is performed. In this review paper, the study of different trust based and QoS aware AODV protocols that are using trusted infrastructure and trust models is performed for preventing the attacks and misbehavior from malicious nodes in the network. The performance of trust based routing protocol has been analyzed that helps to work efficiently and can be used in various applications of MANETs for improving the security performance of the network.

References
  1. B Wang, X Chen, W Chang, “ A Light- Weight Trust-Based QoS Routing Algorithm for Ad Hoc Networks”, Pervasive and Mobile Computing 13, pp. 164-180, 2014
  2. Suparna, Tanumoy, Sarmistha, “Trust Based energy Efficient Detection and Avoidance of Black Hole attack to ensure routing in MANET”, Applications and Innovations in Mobile Computing, pp. 157-164, 2014
  3. P Kautoo, Dr. Piyush Shukla, Dr. Sanjay Silakari, “Trust formulization in Dynamic Source Routing Protocol using SVM” , IJITCS, MECS, pp. 43-50, 2014
  4. C. Kanani, A. Sinhal, “Ant Colony Optimization based modified AOMDV for multipath routing in MANET”, IJCA, Volume 82, Pp. 14-19, Nov 2013
  5. R. Menaka, Dr. V. Ranganathan, “A Survey of Trust related Protocols for Mobile Ad Hoc Networks”. IJETAR journal, volume 3, Pp. 903-910, April 2013
  6. Dr. K. Thirunadana, Sikamani, D. Santhosh Kumar, “ Efficient and Secure Trust based Ad Hoc Routing in MANET”, ICCTET, Pp. 255-258, 2013
  7. Radha Krishna Bara, Jyotsna Kumar Mandala and Moirangthem Marjit Singh, “QoS of MANET Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack” , ICIMTA , Procedia Technology 10, Pp. 530 – 537, 2013
  8. K. Govindan, P. Mohapatra, “Trust Computations and Trust Dynamics in Mobile Ad Hoc Networks: A Survey”, IEEE Communications Surveys and Tutorials 14, Pp. 279-298, 2012
  9. G.M. Kaur, K. Kumar, “QoS Routing Protocols for Mobile Ad Hoc Networks: A Survey”, IJWMC-5, Pp. 107-118, 2012
  10. Z.K.Lee, G. Lee, H. Rai oh, H. Song, “QoS aware Routing and Power Control Algorithm for Multimedia Service over Multihop Mobile Ad Hoc Network”, Wireless Communications and Mobile Computing-12, pp. 567-579, 2012
  11. P. V Krishna, V.Saritha, et al, “Quality ofSservice enabled Ant Colony-based Multipath Routing for Mobile Ad hoc Networks”, Published in IET communications- 6, Pp. 76-83, 2012
  12. Yogendra Jain, Pankaj Sharma, “Trust based Ad Hoc on-Demand Distance Vector for MANET”, NCSI Conference, Pp. 1-11, 2012
  13. Rutvij H. Jhaveri, Sankita Patel, Devesh Jinwala, “DoS attacks in Mobile Ad-hoc Networks: A Survey” , pp. 535-541, 2012
  14. Jin Hee Cho, Ananthram Swami, Ray Chen, “ A Survey on Trust Management for Mobile Ad Hoc Networks”, IEEE Communication Surveys and Tutorials 13, pp. 562-583, 2011
  15. Sudhir Agrawal, Sanjeev jain, Sanjeev Sharma, “ A survey of Routing attacks and security measures in Mobile ad hoc networks”, Journal of computing, Volume 3, pp. 41-48, 2011
  16. T. Eissa, S. A. Razak, Rashid H. Khokhar, N. Samian, “Trust- based Routing Mechanism in MANET: Design and Implementation”, Springer Journal, Pp. 666-677, 2011
  17. Pedro B. Velloso, Rafael P. Laufer, Daniel de O.Cunha , “Trust Management in Mobile Ad Hoc Networks using a Scalable Maturity-based Model”, IEEE Transactions in Network-7, Pp. 172-185, 2010
  18. A Menaka Pushpa, “Trust based Secure Routing in AODV Routing Protocol’, IEEE Transaction, Pp. 1-6, 2009
  19. S. Lu, L. Li, and K. Yan Lam, L. Jia, “SAODV: A MANET routing protocol that can withstand Black Hole attack”, Published in IEEE ICCIS, pp. 421-425, 2009
  20. A. Khokhar, L.Abusalah, M Guizani, “A Survey of Secure Mobile Ad Hoc Routing Protocols”, IEEE Communication in Surveys and Tutorials- 19, pp. 78-93, 2008
  21. C Liu, J. Kaiser, “ A Survey of Mobile Ad Hoc Network Routing Protocols”, University of Magdeburg, Pp. 1-36, 2005
  22. L Khelladi, D Djenouri , N Badache, “A Survey of Security issues in Mobile Ad Hoc and Sensor Networks”, IEEE Communication Surveys and Tutorials, Pp. 2-28, 2005
  23. Wendi, L Chen, B Heinzelman, “ QoS-aware Routing based on Bandwidth estimation for Mobile Ad Hoc Networks”, IEEE Communication, Pp. 561-572, 2005
  24. A Perrig, Y hu, “ A Survey of Secure Wireless Ad Hoc Routing”, IEEE Computer Society-2 , pp. 28-39, 2004
  25. R Kravets, S Yi, “MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks”, II Annual PKI’03, pp 1-3, 2003
  26. Y C Hu, A Perrig, and D B Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks”, 8th Annual IICMCN Mobicom, pp. 12-23, 2002
  27. C Zhu, M Scott Corson, “QoS Routing for Mobile Ad Hoc Networks”, Flarion Technologies, Pp. 1-10, 2002
  28. Rinzboorg, N. Asokan, “ Key Agreement in Ad Hoc Networks”, Computer Communication, Volume 23, Pp. 1627-1637, 2000
  29. B Praveen Kumar,B Bharath Bhushan, P Chandra Sekhar, N Papanna, “A Survey on MANET Security Challenges and Routing Protocols”, IJCTA, Volume 4, pp 248-256,2000
Index Terms

Computer Science
Information Sciences

Keywords

QoS Constraints Trust prophecy malicious nodes and Trust based QoS routing.