1. Introduction
Along with the widespread use of cheaper, smaller and more powerful wireless nodes over the past few years, mobile ad hoc networks (MANETs) have received much attention, making it one of the most promising areas of wireless network development [
1,
2]. MANET is a self-organizing, dynamic, infrastructure-less network consisting of a set of wireless nodes that communicate with one another over one or more connections or hops without the need of a central authority [
3]. In a MANET, each and every node can function both as a terminal node and as a router, meaning that each node could generate its own traffic while receiving data packets from other nodes and forwarding them to the neighboring nodes. MANETs can be deployed quickly and easily, making them very suitable for applications such as environmental monitoring, military surveillance, disaster rescue, etc. [
4,
5].
Quality of Service (QoS) routing is a necessary function in MANETs. In addition to finding the routes from a source to a destination, QoS routing also needs to ensure end-to-end quality, usually in terms of bandwidth or delay [
6]. A major challenge for MANETs is the design of a secure and efficient routing protocol that can also ensure the overall quality of service during the routing process as MANET nodes communicate with each other only when they are located within the communication range of each other. When the receiver is far away from the transmitter, i.e., the destination is out of the transmission range of the transmitter, the dynamic nature of MANETs makes it difficult to ensure QoS since the node-to-node channel and link quality changes dynamically which may result infrequent link failures and cause nodes to make connections with other nodes [
7,
8]. Another important issue in MANETs is security since malicious nodes can deliberately misbehave so that packet contents can be altered and packet routing to the desired destinations can be disrupted, lowering packet delivery ratio as well as reliability [
9].
Security and trust are correlated with each other. In trust-based security, when trust level increases, so do the access privilege for security protection. In MANETs, trust can be defined based on “the closeness of the relationships between entities that participate in a protocol interaction”. There are generally two types of trust: social trust and QoS trust with social trust being obtained based on social relationships, e.g., friendship, honesty, privacy and intimacy while QoS trust being obtained based on competency, reliability, experience, number of packets forwarded, etc. [
10]. There have already been some proposals for securing the process of routing in MANETs. Although cryptographic techniques have been widely used in routing to protect routing information from being tinkered by the adversary, such an approach may not be practical for real MANETs due to heavy computational overhead and lack of capability of spotting attacking nodes given the high mobility of MANETs where nodes continuously join and leave the networks [
11]. Introducing “trust” into such a hostile environment can help nodes observe and predict the behavior of neighboring nodes in an efficient manner. The notion of trust is very useful in a highly dynamic environment where nodes need to depend upon each other to accomplish their common goals [
12,
13,
14]. Trust-based routing has been considered as an effective measure to deal with security threats caused by malicious nodes through detecting and isolating untrusted nodes in MANETs [
15,
16].
In this paper, we propose a new and efficient trust-based secure QoS routing scheme (TSQRS) which combines social trust and QoS trust. The proposed scheme would selecta forwarding node by considering channel quality, link quality and residual energy in order to establish an optimal path in a very dynamic environment and detect intrusions by using the trust of neighboring nodes to mitigate threats by nodes misbehave in packet forwarding during the routing process. The proposed solution relies on the trust mechanism to provide reliable performance and secure links for data transmission and energy efficiency.
The remainder of this paper is organized as follows.
Section 2 contains the review of some related work.
Section 3 presents the proposed secure and QoS routing scheme after an adversary model is described and
Section 4 contains some evaluation results to show the advantage of the proposed scheme over two other comparable schemes in terms of some important matrices. Finally, Section concludes this paper.
2. Related Work
Gite et al. proposed a new routing protocol by extending the conventional Ad Hoc On-Demand Distance Vector (AODV)called (TRUST_AODV) [
7], incorporating a trust algorithm that detects misbehaving nodes within. An objective trust management framework is used in this approach for solving problems such as handling high node mobility, energy drain, and limited processing capabilities of network devices by establishing a network of nodes with an acceptable level of trust relationships among themselves. The weighted trust is computed for each node, by the proposed algorithm considering the packet delivery ratio, energy consumption rate and buffer length into account. The Overall performance of TRUST_AODV routing protocol indicates that it secures the MANET against potential packet drop attacks and denial-of-service (DoS) attacks.
Hinge et al. proposed an opinion based trust model which works on the basis of network properties [
3]. In this solution, intermediate nodes’ opinion trust is computed and based on suchan opinion trust value, the decision can be made regarding the use of a particular route for communication. Communication in MANETs has to be carried out through using intermediate nodes due to limited radio range. As a result, malicious nodes can join the network and harm the routing process. Thus, trust evaluation can yield two values at the minimum: negative and positive, in the process of finding a trustworthy node. After deriving the trust values for all the nodes along a path, route discovery can be performed by taking the opinion of the neighboring nodes.
Koul et al. proposed a model that deploys security in MANETs while taking into consideration of QoS issues to some extent [
8]. The proposed model is multilayered and composed of a set of modules, i.e., packet receiver, packet forwarder, QoS routing module (RM), system security module (SSM) and data security module (DSM). All the modules are needed in order to identify QoS parameters and to detect selfish and malicious nodes. Efficient and reliable communication is ensured by selecting an appropriate router between a source and a destination through trusted nodes in the place of eliminated nodes. Performance evaluation was done in an established secure environment to show the improvement over AODV for different QoS parameters for both single and multi-path environments.
Jhaveri et al. proposed a composite trust model which utilized both social and QoS trust components [
11] to estimate the trust degree of nodes in which the ditch ratio was used as a social trust component. This ditch ratio parameter is valuable for knowing the behavior of nodes and to identify malicious nodes. In the paper, energy consumption was defined as an aspect of QoS by considering the ratio of packet drop of a specific node. Nodes with the lowest level of energy are considered as un-trusted nodes. The proposed scheme showed some enhancement in packet delivery ratio when compared to some other methods.
Sirisala et al. proposed a method to evaluate the trust value of a node based on its quality of service (QoS) parameters [
15] where fuzzy rules were inferred based on network conditions. The proposed method used an algorithm based on Dynamic Adaptive Fuzzy Petri Net (DAFPN) with concurrent reasoning. DAFPN is an expert system to represent, capture and store fuzzy knowledge with the help of parameters such as threshold value, certainty factor and weight. The concurrent reasoning algorithm (CRA) is a matrix operation based algorithm, which can automate the procedure of DAFPN in which a MANET topology was modeled as a DAFPN to which FPN rules were applied. Route identification and recovery mechanisms with CRA used unicast and multicast methods and the proposed method included all the trustable intermediate nodes for routing.
Sethuraman et al. proposed an algorithm that used a management strategy for trust in a way in which packets can be sent securely through the network with a lower level of energy consumption [
17]. The idea behind this approach is to assign a trust value to each node dynamically. Due to high mobility, there should be an integration of trust and energy consumption of every node. A new trust management model was thus proposed to enhance the routing security in the network in which both direct and indirect trust values were employed in trust calculation. Final trust value is derived based on direct trust value and indirect trust value. The Bayesian probability was also used as a technique for trust management to refine the calculation of trust. The algorithm forwards packets from a source to a destination through a reliable route that also consumes less energy.
Ahmed et al. presented an algorithm in which calculated trust values are used to identify malicious nodes [
18]. True flooding approach was utilized to identify attacking nodes based on trust values. This work relied on identification and avoidance of malicious nodes as well as denial-of-service attacks on the network layer based on interaction history. A route discovery algorithm was developed to discover an efficient and secure path for data forwarding by using experimental grey wolf algorithm to validate network nodes. Enhanced multi-swarm optimization was also used to optimize the identified forwarding path. It was concluded that the proposed scheme was useful in terms of secure data dissemination in scalable MANET environments.
Kambourakis et al. proposed a public key management scheme using the trust graph model in this work [
19]. Because of the frequent mobility of nodes, dynamic network topology, an absence of centralized administration and wireless connections, the traditional security solutions are not easily deployable in MANETs, and also the establishment of a Public Key Infrastructure (PKI) in such a dynamic network environment is a difficult task. In this regard, the authors designed a binary tree formation of the network’s nodes, in order to build certificate chains between communicating nodes that are multi-hops away to avoid the clumsy problem of certificate chain discovery. Simulations of the proposed scheme under different network scenarios demonstrate that it is very effective in terms of tree formation, certificate chain establishment between nodes and join and leave occurrences to make a balance between security and performance.
Rajkumar et al. proposed a Certificate distribution and a Trust based threshold revocation method. In this work, the authors developed a trust-based solution using an efficient mechanism for certificate revocation and validation by combining public key certificates [
20], in order to enhance the security of the network by reducing the hazards from malicious nodes. Initially, the trust values were derived from the direct and indirect trust values and the secret key to all the nodes were distributed by a certificate authority. Followed by this, a trust based threshold revocation method is computed. Here the misbehaving nodes are eliminated.
Cho et al. proposed a composite trust-based public key management (CTPKM) approach with an idea of maximizing the performance of network while mitigating the vulnerabilities [
21]. Based on the concept of trust, the proposed approach adopts fully distributed trust-based public key management based policy for MANETs using an easy security mechanism. This work aims to maximize performance by using trust-based approach, instead of using hard security parameters to remove security vulnerabilities. During the routing process, the nodes determine the trust of another node using a trust threshold. The results depict that CTPKM minimizes the risk at a large margin using an optimal trust threshold and maximizes the service availability with acceptable communication overhead acquired by trust and key management operations.
Going through all the previous work listed, we observed that integration of QoS trust and social trust could improve the performance of routing in MANETs. Considering these notes, we combine both the types of trust components in our work. We believe that the success rate of any security scheme largely depends upon the mode of operations of the adversaries, but it is to be noted that most of these schemes do not precisely describe the mode of operation for adversary models during route discovery phase and data transmission phase, to identify patterns followed by malicious nodes, while selecting trusted route for data transmission. We address this issue by introducing an efficient trust-based scheme which integrates attack pattern discovery to the trust mechanism by observing the packet forwarding behavior of nodes continuously. The scheme attempts to find attack patterns before a node launches packet dropping attack. The scheme identifies a distrusted neighbor during the trust update procedure and discovers an alternate route after discarding the untrustworthy route from the routing table which contains that malevolent node as next hop in a hostile setting.
5. Conclusions
As a part of the literature survey, we observed that integration of QoS trust and social trust could improve the performance of routing in MANETs as both quality and security are very important aspects of such networks. Considering these notes, we developed a trust-based scheme, called TSQRS, in which both components are incorporated. To facilitate reliable communication in the highly dynamic environment of MANETs, TSQRS considers three important parameters during the discovery of on-demand routes, i.e., channel quality, link residual life and residual energy, to reduce route failures and to increase the overall system performance. In addition, the use of CFR, DFR and intimacy level during trust update plays an important role in removing malicious nodes during the routing process. Performance comparison of TSQRS to ETRS-PD and AODV under the same adversary model shows that TSQRS can improve consistently packet delivery ratio, routing overhead and energy consumption due to the enhancement to the routing process and due to the inclusion of new trust components for improving and securing the routing process. Many future works are possible in this area. It is possible to use intelligent rules to make effective decisions in routing. Adaptation of intelligent prediction functions such as software agents for evaluating nodes capability and reliability are suitable where the environment is unreliable, unpredictable and much dynamic. Intelligent Agents can be deployed at each sensor node to accurately predict the resource availability and reliability in order to perform organized allocation of the resource before the data routing.