Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32586
Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks

Authors: N. Bhalaji, A. R. Sivaramkrishnan, Sinchan Banerjee, V. Sundar, A. Shanmugam


Nodes in mobile Ad Hoc Network (MANET) do not rely on a central infrastructure but relay packets originated by other nodes. Mobile ad hoc networks can work properly only if the participating nodes collaborate in routing and forwarding. For individual nodes it might be advantageous not to collaborate, though. In this conceptual paper we propose a new approach based on relationship among the nodes which makes them to cooperate in an Adhoc environment. The trust unit is used to calculate the trust values of each node in the network. The calculated trust values are being used by the relationship estimator to determine the relationship status of nodes. The proposed enhanced protocol was compared with the standard DSR protocol and the results are analyzed using the network simulator-2.

Keywords: Reliable Routing, DSR, Grudger, Adhoc network.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2418


[1] C. Siva Ram Murthy and B. S. Manoj, "Ad Hoc Wireless Networks: Architectures and Protocols" Prentice Hall, 2004.
[2] D. Johnson, D. Maltz, Y. Hu, and J. Jetcheva. The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, Internet Engineering Task Force, Mar. 2001. draft-ietf.
[3] C.E.Perkins and E.M.Royer "Ad hoc on demand distance vector routing", Proceedings of IEEE Workshop on Mobile computing systems and Applications 1999, pp. 90-100, February 1999.
[4] Richard Dawkins. The selfish Gene. Oxford University press, 1980 edition, 1976..
[5] Yi-Chun Hu, Adrian Perrig, "A Survey of Secure Wireless Ad Hoc Routing", IEEE Security and Privacy May/June 2004.
[6] S. Murphy, "Routing Protocol Threat Analysis," Internet Draft, draftmurphy- threat-00.txt, October 2002.
[7] Adam Burg, "Ad hoc network specific attacks ", Seminar on Ad hoc networking: concepts, applications, and Security, Technische Universität München, 2003.
[8] P. Papadimitratos, and Z.J. Haas, "Securing the Internet Routing Infrastructure," IEEE Communications, vol. 10, no. 40, October 2002, pp. 60-68. Digital Object Identifier 10.1109/MCOM.2002.1039858
[9] Ernesto Jiménez Caballero, "Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem" TKK T- 110.5290 Seminar on Networksecurity2006-12-11/12.
[10] Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad hoc Networks," Proc. 22nd Annual Joint Conf. IEEE Computer and Communications Societies (Infocom-03), San Francisco, CA, April 2003, ISSN: 0743-166X, INSPEC Accession Number: 7853884.
[11] Sonja Buchegger and Jean-Yves Le Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness and robustness in Mobile ad hoc networks. In proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based processing, Pages 403 - 410. Canary Islands, Spain. January 2002. IEEE Computer Society
[12] Sergio Marti.T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehaviour in Mobile ad hoc networks. In Proceedings of MOBICOM 2000. Pages 255-265, 2000.
[13] Sonja Buchegger and Jean-Yves Le Boudec: "Performance analysis of the CONFIDANT protocol" Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing-02. p.p:226 - 236.
[14] John Keane, "Trust-based Dynamic Source Routing in Mobile Ad Hoc Networks", MS thesis, Department of Computer Science, Trinity College Dublin, September 2002.
[15] Kevin Fall, Kannan Varadhan: The ns manual, doc/index.html