Design an Improved Trust-based Quality of Service AwareRouting in Cognitive Mobile Ad-Hoc Network
DOI:
https://doi.org/10.31185/wjcms.218Abstract
Mobile ad hoc networks (MANETs) are wireless networks that can be configured at will. It has no infrastructure and centralized control, so it is only suitable for provisional communications. In a dynamically topological and resource-constrained network, ensuring QoS and security is challenging. MANETs are dynamic networks, so navigating them can be challenging and more susceptible to attacks. MANET requires significant memory, speed, and transmission bandwidth for conventional security measures like cryptographic techniques. Consequently, these methods are unsuitable for identifying malicious behaviour or self-centered nodes. Nodes that are malicious, selfish, or malfunctioning can be identified based on the trust method, which calculates how much trust exists between them. A trust-based QOS-aware routing protocol is proposed in this paper to calculate trust in MANET (I-TQAR). The tree important performance metrics are considered for result validation such as delay, throughput and packet delivery ratio (PDR). I-TQAR offers significantly improved performance in all areas compared to the existing TQR and TQOR protocols.
References
M. S. Corson, J. P. Macker, and G. H. Cirincione, “Internet-based mobile ad hoc networking,” IEEE Internet Comput, vol. 3, no. 4, pp. 63–70, 1999.
A. Attar, H. Tang, A. V. Vasilakos, F. R. Yu, and V. C. Leung, “A survey of security challenges in cognitive radio networks: Solutions and future research directions,” Proc. IEEE, vol. 100, pp. 3172–3186, 2012.
N. Kumar, P. Rani, V. Kumar, S. V. Athawale, and D. Koundal, “THWSN: Enhanced energy-efficient clustering approach for three-tier heterogeneous wireless sensor networks,” IEEE Sens. J, vol. 22, no. 20, 2022.
W. Li and J. Anupam, Security Issues in Mobile Ad Hoc Networks-A Survey. 2008.
B. Bhola, “Quality-enabled decentralized dynamic IoT platform with scalable resources integration,” IET Commun, 2022.
M. K. Gulati and K. Kumar, “QoS routing protocols for mobile ad hoc networks: a survey,” Int. J. Wirel. Mob. Comput, vol. 5, no. 2, pp. 107–118, 2012. 45 Chauhan and Henrietta , Wasit Journal of Computer and Mathematics Science, Vol. 2 No. 4 (2023) p. 38-46
N. Hussain, P. Rani, N. Kumar, and M. G. Chaudhary, “A deep comprehensive research architecture, characteristics, challenges, issues, and benefits of routing protocol for vehicular ad-hoc networks,” Int. J. Distrib. Syst. Technol. IJDST, vol. 13, no. 8, pp. 1–23, 2022.
N. Hussain and P. Rani, “Comparative studied based on attack resilient and efficient protocol with intrusion detection system based on deep neural network for vehicular system security,” Distributed Artificial Intelligence, pp. 217–236, 2020.
P. Rani and R. Sharma, “An Experimental Study of IEEE 802.11n Devices for Vehicular Networks with Various Propagation Loss Models,” in Advanced IoT Sensors, Networks and Systems (A. K. Dubey, V. Sugumaran, , and P. H. J. Chong, eds.), vol. 1027, pp. 125–135, Springer Nature, 2023.
J. Raju and J. J. Garcia-Luna-Aceves, “A comparison of on-demand and table driven routing for ad-hoc wireless networks,” 2000 IEEE
International Conference on Communications. ICC 2000. Global Convergence Through Communications, pp. 1702–1706, 2000.
J. W. De, G. Stênico, and L. L. Ling, “Topology Control for Ad-Hoc Networks: A comprehensive review for table driven and on-demand routing protocols,” Commun. Netw, vol. 5, no. 03, pp. 239–246, 2013.
Y. C. Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing, Security and Privacy Magazine,” IEEE, vol. 2, pp. 28–39, 2004.
Y. C. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” Ad Hoc Netw, vol. 1, no. 1, pp. 175–192, 2003.
Y. C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” Proceedings of the 8th annual international conference on Mobile computing and networking, pp. 12–23, 2002.
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “The TESLA broadcast authentication protocol,” CryptoBytes, vol. 5, no. 2, pp. 2–13, 2002.
P. G. Argyroudis and D. O’mahony, “Secure routing for mobile ad hoc networks,” IEEE Commun Surv Tutor, vol. 7, no. 1-4, pp. 2–21, 2005.
R. M. Chintalapalli and V. R. Ananthula, “M-LionWhale: multi-objective optimisation model for secure routing in mobile ad-hoc network,” IET Commun, vol. 12, no. 12, pp. 1406–1415, 2018.
M. K. Garg, N. Singh, and P. Verma, “Fuzzy rule-based approach for design and analysis of a Trust-based Secure Routing Protocol for MANETs,” Procedia Comput. Sci, vol. 132, pp. 653–658, 2018.
J. Sathiamoorthy and B. Ramakrishnan, “Design of a proficient hybrid protocol for efficient route discovery and secure data transmission in CEAACK MANETs,” J. Inf. Secur. Appl, vol. 36, pp. 43–58, 2017.
N. Hussain, P. Rani, H. Chouhan, and U. S. Gaur, “Cyber Security and Privacy of Connected and Automated Vehicles (CAVs)-Based Federated Learning: Challenges, Opportunities, and Open Issues,” in EAI/Springer Innovations in Communication and Computing (F. L. for IoT Applications, S. P. Yadav, B. S. Bhati, D. P. Mahato, , and S. Kumar, eds.), pp. 169–183, Springer International Publishing, 2022.
M. Gunes, U. Sorges, and I. Bouazizi, “ARA-the ant-colony based routing algorithm for MANETs,” Proceedings. International Conference on Parallel Processing Workshop, pp. 79–85, 2002.
G. D. Caro, F. Ducatelle, and L. M. Gambardella, “AntHocNet: an adaptive nature-inspired algorithm for routing in mobile ad hoc networks,” Eur. Trans. Telecommun, vol. 16, no. 5, pp. 443–455, 2005.
A. M. Okazaki and A. A. Fröhlich, “Ant-based dynamic hop optimization protocol: A routing algorithm for mobile wireless sensor networks,” 2011 IEEE GLOBECOM Workshops (GC Wkshps), pp. 1139–1143, 2011.
D. Cañas, A. L. Orozco, L. J. García, P. S. Villalba, and Hong, “Hybrid ACO routing protocol for mobile ad hoc networks,” Int. J. Distrib. Sens. Netw, vol. 9, no. 5, pp. 265485–265485, 2013.
G. S. Pavani and R. I. Tinini, “Distributed meta-scheduling in lambda grids by means of Ant Colony Optimization,” Future Gener. Comput. Syst, vol. 63, pp. 15–24, 2016.
S. Corson and J. Macker Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations, 1999.
C. Perkins, E. Belding-Royer, and S. Das Ad hoc on-demand distance vector (AODV) routing, 2003.
I. D. Chakeres and E. M. Belding-Royer, “AODV routing protocol implementation design,” 24th International Conference on Distributed Computing Systems Workshops, pp. 698–703, 2004.
T. Clausen and P. Jacquet Optimized link state routing protocol (OLSR), 2003.
P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, “Optimized link state routing protocol for ad hoc networks,” Proceedings. IEEE International Multi Topic Conference, pp. 62–68, 2001.
K. Paul and D. Westhoff, “Context aware detection of selfish nodes in DSR based ad-hoc networks,” Proceedings IEEE 56th Vehicular Technology Conference, pp. 2424–2429, 2002.
P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” in Advanced Communications and Multimedia Security: IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, pp. 107– 121, Springer, 2002.
Q. He, D. Wu, and P. Khosla, “SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks,” 2004 IEEE Wireless Communications and Networking Conference, pp. 825–830, 2004.
R. K. Nekkanti and C. Lee, “Trust based adaptive on demand ad hoc routing protocol,” Proceedings of the 42nd annual Southeast regional conference, pp. 88–93, 2004.
H. V. Seijen, H. V. Hasselt, S. Whiteson, and M. Wiering, “A theoretical and empirical analysis of Expected Sarsa,” 2009 IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning, pp. 177–184, 2009.
R. S. Sutton and A. G. Barto Reinforcement learning: An introduction, 2018.
B. Wang, X. Chen, and W. Chang, “A light-weight trust-based QoS routing algorithm for ad hoc networks,” Pervasive Mob. Comput, vol. 13, pp. 164–180, 2014.
D. S. D. Couto, D. Aguayo, J. Bicket, and R. Morris, “A high-throughput path metric for multi-hop wireless routing,” Proceedings of the 9th annual international conference on Mobile computing and networking, pp. 134–146, 2003.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Dr. Alok Singh Chauhan, H Mary Henrietta

This work is licensed under a Creative Commons Attribution 4.0 International License.