Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

Trust based Routing using Dominating Set Approach (TRDSA) in Wireless Ad-Hoc Networks

IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012
© 2012 by IJCA Journal
CTNGC - Number 1
Year of Publication: 2012
Deepika Kukreja
B. V. R. Reddy

Deepika Kukreja, Umang and B V R Reddy. Article: Trust based Routing using Dominating Set Approach (TRDSA) in Wireless Ad-Hoc Networks. IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 CTNGC(1):16-24, November 2012. Full text available. BibTeX

	author = {Deepika Kukreja and Umang and B. V. R. Reddy},
	title = {Article: Trust based Routing using Dominating Set Approach (TRDSA) in Wireless Ad-Hoc Networks},
	journal = {IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012},
	year = {2012},
	volume = {CTNGC},
	number = {1},
	pages = {16-24},
	month = {November},
	note = {Full text available}


Secure routing protocols for Mobile Ad hoc Networks (MANETs) have been categorized based on the model used for enforcing security, methodology and information they use to make routing decisions. Some protocols are designed from scratch so as to incorporate security solutions and some are designed to provide security mechanisms into the existing routing protocols like DSDV[1], OLSR[2], AODV[3], DSR[4] etc. Several protocols for secure routing in ad-hoc networks have been proposed. But due to their limitations, there is a need to make them robust and more secure so that they can go well with the demanding requirements of ad hoc networks. We propose and design a new protocol - Trust based Routing using Dominating Set Approach (TRDSA) which overcomes the shortcomings of existing protocols.


  • C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," Comp. Commun. Rev. , pp. 234-44, Oct. 1994.
  • T. Clausen, G. Hansen, L. Christensen, and G. Behrmann, "The optimized link state routing protocol, evaluation through experiments and simulation," In IEEE Symposium on Wireless Personal Mobile Communications, Sept. 2001.
  • C. E. Perkins and E. M. Royer, "Ad-hoc On-Demand Distance Vector Routing," Proc. 2nd IEEE Wksp. Mobile Comp. Sys. and Apps. , pp. 90-100, Feb. 1999.
  • D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad-Hoc Wireless Networks," Mobile Computing, T. Imielinski and H. Korth, Eds. , Kluwer, pp. 153-181, 1996.
  • L. Zhou and Z. Haas, " Securing ad hoc networks," IEEE Netw. . , Vol. 13, Issue 6, pp. 24-30, 1999.
  • M. Zapata and N. Asokan, " Securing ad hoc routing protocols," in Proceedings of 3rd ACM workshop WiSE, pp. 1-10, Sep. 2002.
  • P. Papadimitratos and Z. Haas, "Secure data transmission in mobile ad hoc networks," in proceedings of ACM workshop WiSE, pp. 41-50, Sep. 2003.
  • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in the Proceedings of Sixth Ann. Int'l Conf. Mobile Computing and Networking (MobiCom), pp. 255-265, 2000.
  • S. Buchegger and J. Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes-Fairness in Distributed Ad Hoc NeTworks," in the Proceedings of IEEE/ACM Workshop Mobile Ad Hoc Networking and Computing (MobiHOC), pp. 226-236, 2002.
  • K. Sanzgiri, B. Dahill, B. N. Levine, E. M. Royer and C. Shields, "A secure routing protocol for ad hoc networks," In Proceedings of the International Conference on Network Protocols (ICNP), IEEE Press, pp. 78-87, 2002.
  • Y. C. Hu, D. B. Johnson and A. Perrig," 'SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks", Proc. 4th IEEE Workshop Mobile Comp. Sys. And Applications, pp. 3-13, Callicoon, NY, June 2002.
  • Y. C. Hu, A. Perrig and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," In Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom), ACM Press, pp. 12-23, 2002.
  • A. Perrig, R. Canetti, D. Tygar and D. Song," The TESLA broadcast authentication protocol," RSA CryptoBytes 5(2), 2002.
  • T. Ghosh, N. Pissinou, K. Makki. Collaborative Trust-based Secure Routing Against Colluding Malicious Nodes in Multi-hop Ad Hoc Networks. 29th Annual IEEE International Conference on Local Computer Networks, 2004, 224 - 231.
  • T. Ghosh, N. Pissinou and K. Makki. Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. Mobile Networks and Applications, Springer Science, 10, 2005, 985-995.
  • A. A. Pirzada, A. Datta, C. McDonald. TRUST-BASED ROUTING FOR AD-HOC WIRELESS NETWORKS. IEEE, 2004, 326-330.
  • A. A. Pirzada and C. McDonald. Deploying trust gateways to reinforce dynamic source routing. Proceedings of the 3rd International IEEE Conference on Industrial Informatics, IEEE Press, 2005, 779-784.
  • A. A. Pirzada and C. McDonald. Trust Establishment In Pure Ad-hoc Networks. Wireless Personal Communications, Springer, 37, 2006, 139-163.
  • Asad Amir Pirzada, Amitava Datta, Chris McDonald. Incorporating trust and reputation in the DSR protocol for dependable routing. Computer Communications, Vol. 29, Issue 15 (5 September 2006), 2806-282.
  • A. A. Pirzada and C. McDonald. Dependable Dynamic Source Routing without a Trusted Third Party. Journal of Research and Practice in Information Technology, Vol. 39, Issue 1 (February 2007).
  • Xiaoqi Li, M. R. Lyu, Jiangchuan Liu. A Trust Model Based Routing Protocol for Secure Ad Hoc Networks. Aerospace Conference, IEEE, Vol. 2, 2004, 1286 - 1295.
  • S. K. Dhurandher and V. Mehra. Multi-path and message trust-based secure routing in ad hoc networks. Proc. Int. Conf. Advances in Computing, Control and Telecommunication Technologies (ACT 2009), Trivandrum, India (Dec. 28-29, 2009), 189-194.
  • X. Li, Z. Jia, P. Zhang, R. Zhang, H. Wang. Trust-based on-demand multipath routing in mobile ad hoc networks. Information Security, IET, Vol. 4, Issue 4 (Dec. 2010), 212.
  • Jian Wang, Yanheng Liu, Yu Jiao. Building a trusted route in a mobile ad hoc network considering communication reliability and path length. Journal of Network and Computer Applications, Vol. 34, Issue 4 (July 2011), 1138-1149.
  • Hothefa Sh. Jassim, Salman Yussof, Tiong Sieh Kiong, S. P. Koh, Roslan Ismail. A Routing Protocol based on Trusted and shortest Path Selection for Mobile Ad hoc Network. Communications (MICC), 2009 IEEE 9th Malaysia International Conference on Communications (Dec. 2009), 547 - 554.
  • Imran Raza, S. A. Hussain. Identification of malicious nodes in an AODV pure ad hoc network through guard nodes. Computer Communications, Vol. 31, Issue 9 (Jun. 2008), 1796-1802.
  • E. Ayday, F. Fekri. A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, Vol. 8, Issue 2 (March 2010), 181-192.
  • Yamin Li, Shietung Peng, Wanming Chu. An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks. IEEE, 2006, 199-205.
  • H. Zafar, D. Harle, I. Andonovic, Y. Khawaja. Performance evaluation of shortest multipath source routing scheme. IET Commun, Vol. 3, Iss. 5, 2009, 700–713.
  • Umang Singh, B. V. R. Reddy, M. N. Hoda. Enhanced Intrusion Detection System for malicious node detection in adhoc routing protocol using minimal energy consumption. IEEE Journal Communications IET, ISSN- 1751-8628, DOI: 10. 1049/iet-com. 2009. 0616, Volume 4, Issue 17 (Nov. 2010), 2084-2094.
  • Umang Singh, B. V. R. Reddy, M. N. Hoda. GNDA: Detecting Good Neighbor nodes in adhoc routing protocol. IEEE Second International Conference on Emerging Applications of Information Technology, DOI 10. 1109/EAIT. 2011. 62, 235-238.