CFP last date
20 May 2024
Reseach Article

A Light-Weight Trust based Mobility Aware Routing Algorithm for Mobile Ad Hoc Networks

by Saurin J. Choksi, Nikhil N. Gondaliya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 14
Year of Publication: 2014
Authors: Saurin J. Choksi, Nikhil N. Gondaliya
10.5120/17077-7522

Saurin J. Choksi, Nikhil N. Gondaliya . A Light-Weight Trust based Mobility Aware Routing Algorithm for Mobile Ad Hoc Networks. International Journal of Computer Applications. 97, 14 ( July 2014), 26-30. DOI=10.5120/17077-7522

@article{ 10.5120/17077-7522,
author = { Saurin J. Choksi, Nikhil N. Gondaliya },
title = { A Light-Weight Trust based Mobility Aware Routing Algorithm for Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 14 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number14/17077-7522/ },
doi = { 10.5120/17077-7522 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:24:08.057472+05:30
%A Saurin J. Choksi
%A Nikhil N. Gondaliya
%T A Light-Weight Trust based Mobility Aware Routing Algorithm for Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 14
%P 26-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security and mobility is always a wide research area of the mobile ad hoc network. In this paper a new technique is proposed to apply secure as well as mobility aware routing in mobile ad hoc networks. For applying security the packet forwarding behaviour of the nodes is used and for mobility speed and the relative direction of the node is taken. The algorithm is implemented on AODV protocol and checked the final simulation results against the normal AODV and trust based AODV (that uses only forwarding behaviour of the nodes) using NS2. The simulations results show that proposed technique can prevents attacks from the malicious nodes and also improves the performance by using mobility aware routing.

References
  1. Haas J. D. Z. , Liang B. , P. Papadimitatos and S. Sajama, "Wireless ad hoc networks," in Encyclopedia of Telecommunications J. W. John Proakis, Ed. , 2002
  2. Carlos de Morais Cordeiro and Dharma P. Agrawal , " Mobile ad hoc networking", OBR Research Center for Distributed and Mobile Computing, ECECS
  3. Djmel djenouri and lyes khelladi, "A survey of security issues in mobile ad hoc and sensor networks", IEEE communications surveys & tutorials , fourth quarter 2005
  4. Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen, "A survey on trust management for mobile ad hoc networks", IEEE Communications Surveys and Tutorials 13 (4) (2011) 562–583. Fourth Quarter.
  5. Kannan Govindan, Prasant Mohapatra," Trust computations and trust dynamics in mobile ad hoc networks: a survey", IEEE Communications Surveys and Tutorials 14 (2) (2012) 279–298.
  6. Saurin Choksi, Nikhil Gondaliya, "Trust Based Routing Protocols For Mobile Ad hoc Networks : A Survey", International Journal of Research in Advent Technology,2014
  7. Bo Wang, Xunxun Chen, Weiling Chang,"A light-weight trust-based QoS routing algorithm for ad hoc networks" , Elsevier,2013
  8. N. Marchang, R. Datta,"Light-weight trust-based routing protocol for mobile ad hoc networks", IET Information Security 6 (2) (2012) 77–83.
  9. Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, et al. , "Trust management in mobile ad hoc networks using a scalable maturity-based model", IEEE Transactions on Network and Service Management 7 (3) (2010) 172–185.
  10. M. Pushpalatha, Revathi Venkataraman, and T. Ramarao, "Trust Based Energy Aware Reliable Reactive Protocol in Mobile Ad Hoc Networks"World Academy of Science, Engineering and Technology, Vol: 32 2009-08-27
  11. Hui Xia, Zhiping Jia , Xin Li, Lei Ju, Edwin H. -M. Sha,"Trust prediction and trust-based source routing in mobile ad hoc networks", Elsevier,2012
  12. Bo Wang, Chuanhe Huang, Layuan Li, et al. , "Trust-based minimum cost opportunistic routing for Ad hoc networks", Journal of Systems and Software 84 (12) (2011) 2107–2122
  13. Zhi Li, Xu Li, V. Narasimhan, "Autoregression models for trust management in wireless ad hoc networks", in: IEEE Globecom, 2011, Kathmandu, Nepal.
  14. D. Umuhoza, J. I. Agbinya, C. W. Omlin ,"Estimation of Trust Metrics for MANET Using QoS Parameter and Source Routing Algorithms", AusWireless 2007, IEEE
  15. Sajal Sarkar , Raja Datta , "A Mobility factor based path selection scheme for mobile ad hoc networks" , IEEE , 2012
  16. Teerawat Issariyakul, Ekram Hossain, "Introduction to Network Simulator NS2", Springer 2008.
  17. Nils Aschenbruk, Raphael Emst and et. al. , "BonnMotion: a mobility scenario generation and analysis tool", SIMUTools '10 Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, 2010
Index Terms

Computer Science
Information Sciences

Keywords

MANETs trust AODV QOS