Performance Comparison of Trust-Based Reactive Routing Protocols

Research output: Contribution to journalArticlepeer-review

140 Citations (Scopus)

Abstract

Ad hoc networks, due to their improvised nature, are frequently established in insecure environments and hence become susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. A number of secure routing protocols have recently been proposed, which make use of cryptographic algorithms to secure the routes. However, in doing so, these protocols entail a number of prerequisites during both the network establishment and operation phases. In contrast, trust-based routing protocols locate trusted rather than secure routes in the network by observing the sincerity in participation by other nodes. These protocols thus permit rapid deployment along with a dynamically adaptive operation, which conforms with the current network situation. In this paper, we evaluate the performance of three trust-based reactive routing protocols in a network with varying number of malicious nodes. With the help of exhaustive simulations, we demonstrate that the performance of the three protocols varies significantly even under similar attack, traffic, and mobility conditions. However, each trust-based routing protocol has its own peculiar advantage making it suitable for application in a particular extemporized environment.
Original languageEnglish
Pages (from-to)695-710
JournalIEEE Transactions on Mobile Computing
Volume5
Issue number6
DOIs
Publication statusPublished - 2006

Fingerprint

Dive into the research topics of 'Performance Comparison of Trust-Based Reactive Routing Protocols'. Together they form a unique fingerprint.

Cite this