Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

A Novel Leader based Reputation Approach for Mobile Ad Hoc Networks

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 47 - Number 14
Year of Publication: 2012
T. Sakthivel
S. Vijaybhanu
Rm. Chandrasekaran

T Sakthivel, S Vijaybhanu and Rm.chandrasekaran. Article: A Novel Leader based Reputation Approach for Mobile Ad Hoc Networks. International Journal of Computer Applications 47(14):30-38, June 2012. Full text available. BibTeX

	author = {T. Sakthivel and S. Vijaybhanu and Rm.chandrasekaran},
	title = {Article: A Novel Leader based Reputation Approach for Mobile Ad Hoc Networks},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {47},
	number = {14},
	pages = {30-38},
	month = {June},
	note = {Full text available}


Mobile ad hoc networks perform well only when nodes in the network cooperate in routing and packet forwarding. As these networks are lack of security aspects, selfish and malicious nodes become a part of that network resulting in performance degradation. This paper suggests a leader based reputation system for identifying routing misbehavior. The reputation system is constructed using trust value and decision made in routing that are based on past experience, observations and/ or informed behavior of other nodes. Trust value is evaluated using trust resilient algorithm and it is based on two important parameters namely, efficacy factor and feedback reliability. A node with high battery life and high trust value is elected as a leader. The member nodes report the reputation value and feedback to the leader. The leader node maintains a reputation and feedback records of all its member nodes. The reputation value is an integer value and feedback is just a phrase conveying the satisfaction level of performance of a node. A node with continuous negative feedback is treated as a malicious node and isolated from the network. Feedback is aggregated using modified periodic per hop adaptive aggregation techniques. This proposal detects a malicious node effectively and avoids false reporting as it considers only feedback from the highly reputed node. We perform an overall analysis of our paper by simulation using the network simulator (NS- 2). The experimental results clearly indicate the effectiveness and advantages of our proposed system in eliminating misbehaving nodes.


  • Imrich Chlamtac, Marco Conti, and Jennifer J. N. Liu "Mobile ad hoc networking: imperatives and challenges" Elsevier transactions on ad hoc networks, volume 1, pp. 13- 64, 2003
  • David B. Johnson and David A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks", in Mobile Computing, pp. 153-181, Kluwer Academic Publishers, 1996.
  • Matthias Hollick, Jens Schmitt, Christian Seipl, and Ralf Steinmetz "On the Effect of Node Misbehavior in Ad Hoc Networks" IEEE international conference on communications, volume 6, pp. 3759- 3763, 2004
  • Paul Resnick, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara "Reputation Systems: Facilitating Trust in Internet Interactions" communications of ACM, volume 43, issue 12, 2000.
  • Kun Zeng, Przemys?aw Pawelczak, and Danijela Cabric "Reputation-Based Cooperative Spectrum Sensing with Trusted Nodes Assistance" IEEE communications letters, volume 14, issue 3, 2010
  • Po-Wah Yau and Chris J. Mitchell "Reputation Methods for Routing Security for Mobile Ad Hoc Networks" IEEE transaction on mobile future and symposium on trends in communications, pp. 130- 137, 2003
  • Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks" ACM proceedings of the 6th annual international conference on mobile computing and networking, pp. 255- 265, 2000.
  • Sonja Buchegger and Jean Yves Le Boudec "Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Adhoc NeTworks)" proceedings of 3rd ACM international symposium on mobile Adhoc networking and computing, pp. 226- 236, 2002
  • Pietro Michiardi and Refik Molva "CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks" Springer transaction on advanced communication and multimedia security, pp. 107- 121, 2002
  • Sonja Buchegger and Jean-Yves Le Boudec "The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks" WiOpt'03 proceedings on modeling and optimization in mobile, ad hoc and wireless networks, volume 1, 2003
  • Orhan Dagdeviren and Kayhan Erciyes "A Hierarchical Leader Election Protocol for Mobile Ad hoc Networks" LNCS, volume- 5101, pp. 509- 518, Springer, 2008
  • Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi and Prabir Bhattachary "Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET" IEEE transaction on dependable and secure computing, volume 8, issue 1, pp. 89- 103, 2011
  • Yacine Rebahi, Vicente . E Mujica V, and Dorgham Sisalem "A Reputation-Based Trust Mechanism for Ad hoc Networks" proceedings of IEEE symposium on computers and communications, pp. 37- 42, 2005
  • Lidong Zhou and Zygmunt J. Haas "Securing Ad Hoc Networks" IEEE transaction on network, volume 13, issue 6, pp. 24- 30, 1999
  • Sudarshan Vasudevan, Brian DeCleene, Jim Kurose, and Don Towsley "Secure Leader Election in Wireless Ad Hoc Networks" IEEE proceedings of DARPA information survivability conference and exposition, volume 1, pp. 261- 272, 2003
  • Jochen Mundinger and Jean-Yves Le Boudec "Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars" Elsevier transaction on performance evaluation, volume 65, issue 3- 4, pp. 212- 226, 2008
  • Sonja Buchegger and Jean-Yves Le Boudec "A Robust Reputation System for Mobile Ad-hoc Networks" EPFL IC Technical report IC/ 2003/ 50, 2003
  • Mohamed Tamer Refaei, Luiz A. DaSilva, Mohamed Eltoweissy, and Tamer Nadeem "Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks" IEEE Transactions on computers, volume 59, issue 5, 2010
  • Elena Fasolo, Michele Rossi, Jorg Widmer and Michele Zorzi "In-network Aggregation Techniques for Wireless Sensor Networks: A Survey" IEEE transactions on wireless communications, volume 14, issue 2, pp. 70- 87, 2007
  • "The Network Simulator (ns-2)," http://www. isi. edu/nsnam/ns/, 2012