Trust Formulization in Dynamic Source Routing Protocol Using SVM

Full Text (PDF, 560KB), PP.43-50

Views: 0 Downloads: 0


Priya Kautoo 1,* Piyush Kumar Shukla 1 Sanjay Silakari 1

1. Department of Computer Science and Engineering, UIT RGPV, Bhopal, India

* Corresponding author.


Received: 16 Oct. 2013 / Revised: 3 Feb. 2014 / Accepted: 17 Apr. 2014 / Published: 8 Jul. 2014

Index Terms

DSR, Malicious, Prediction, Reliability, Trust


In an advanced wireless network, trust is desirable for all routing protocols to secure data transmission. An enormous volume of important information communicates over the wireless network using trusted dynamic routing protocol, which is the enhancement of the DSR (Dynamic Source Routing) protocol to improve trust. Previously fuzzy logic, genetic algorithm, neural network has been used to modify DSR and good result has been obtained in few performance indicators and parameters. In this work an SVM based trusted DSR have been developed and better results have been presented. This new novel on demand trust based routing protocol for MANET is termed as Support vector machine based Trusted Dynamic Source Routing protocol, performance of STDSR has been improved in term of the detection ratio (%) at different mobility and no. of malicious node variation.

Cite This Paper

Priya Kautoo, Piyush Kumar Shukla, Sanjay Silakari, "Trust Formulization in Dynamic Source Routing Protocol Using SVM", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.8, pp.43-50, 2014. DOI:10.5815/ijitcs.2014.08.06


[1]CHENG Yong, HUANG Chuanhe, SHI Wenming: Trusted Dynamic Source Routing Protocol: Published by the IEEE Computer Society 2007, 1623-1636.

[2]H. Xia1 Z. Jia1 L. Ju1 Y. Zhu2: Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory: Published in IET Wireless Sensor Systems, Vol. 1, Iss. 4, pp. 248–266.

[3]DilpreetKaur and Naresh Kumar: Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks: Published Online March 2013 in MECS, pp.39-46.

[4]Zhaoyu Liu, AnthonyW. Joy, Robert A. Thompson: A Dynamic Trust Model for Mobile Ad Hoc Networks: Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS’04) IEEE 2004

[5]ELIZABETHM and ROYER, CHAI-KEONG TOH: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks: published in IEEE Personal Communications 1999, pp.46-55

[6]Mohammad Wazid, Rajesh Kumar Singh: A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques: Proceedings published by International Journal of Computer Applications (IJCA) International Conference on Computer Communication and Networks CSI- COMNET-2011, pp.44-49.

[7]N. Bhalaji, A. R. Sivaramkrishnan, Sinchan Banerjee, V. Sundar, and A. Shanmugam: Trust Enhanced Dynamic Source Routing ProtocolforAdhoc Network: World Academy of Science, Engineering and Technology 49 2009, pp- 1074-1079

[8]Asad Amir Pirzada, Chris McDonald, and AmitavaDatta: Performance Comparison of Trust-Based Reactive Routing Protocols: published in IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006, pp. 695-710

[9]Hui Xia a, ZhipingJia, Lei Ju, Xin Li, Edwin H.-M.Sha: Impact of trust model on on-demand multi-path routing in mobile ad hoc networks: published in science direct 2013, pp.1078–1093

[10]Wenjia Li, Anupam Joshi, Tim Finin: SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks: 2009.

[11]S. Marti, T.J. Giuli, K. Lai, M. Baker: Mitigating routing misbehavior in mobile ad-hoc networks: Mobile Computing and Networking (2000) 255–265

[12]YIH-CHUN HU∗ and ADRIAN PERRIG: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks: published springer 2005, pp. 21–38

[13]Sergio Pastrana, AikateriniMitrokotsa, Agustin Orfila, Pedro Peris-Lopez: Evaluation of classification algorithms for intrusion detection in MANETs: published in science direct 2012,pp-217–225

[14]Hui Xia, Zhipingjia, Xin Li, Lei ju: Trust Prediction and Trust-based source routing in mobile ad hoc networks: Computer Communications 2012, pp- 2096–2114

[15]S. Rajasegarar, C. Leckie, and M. Palaniswami: Detecting Data Anomalies in Wireless Sensor Networks: Security in Ad hoc and Sensor Network, Computer and Network Security , World Scientific Publishing Co, Vol. 3, pp.231-259, 2009.

[16]Meenakshi Patel, Sanjay Sharma: Detection of Malicious Attack in MANETA Behavioral Approach: published in 3rd IEEE International Advance Computing Conference (IACC), 2012, pp-388-392

[17]B. Scholkopf, and A. J. Smola: Learning with Kernels: The MIT Press, 2006, pp.204-205.

[18]NS-3 Network Simulator., July 2009.