Trust enhanced secure mobile ad-hoc network routing

Venkat Balakrishnan*, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

27 Citations (Scopus)
41 Downloads (Pure)


In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustworthiness within the limitations of the network, or introduce additional problems while capturing the evidence. In this paper, we propose a reputation-based trust model known as Secure MANET Routing with Trust Intrigue (SMRTI). In our model, the evidence of trustworthiness is captured in an efficient manner and from broader perspectives including direct interactions with neighbours, observing interactions of neighbours and through recommendations. SMRTI captures evidence from direct interactions with neighbours in order to identify their benign and malicious behaviours. It also captures evidence for misbehaviours by observing the interactions of neighbours. Lastly, the evidence captured from recommendations is used to summarize the benign behaviour of multi-hop nodes. Unlike other models, we adopt a novel approach to capture evidence from recommendations, which eliminates recommender's bias, free-riding, and honest-elicitation. SMRTI utilizes the captured evidence to predict whether a node is either benign or misbehaving. It then applies the prediction to enhance the security of communications depending on the decision policies, such as whether to send a packet to or forward a packet on behalf of other nodes. Finally, we demonstrate the performance of our model through simulation results.

Original languageEnglish
Title of host publicationProceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07
EditorsLisa O'Conner
Place of PublicationLos Alamitos, CA
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages7
ISBN (Print)0769528473, 9780769528472
Publication statusPublished - 2007
Event21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07 - Niagara Falls, ON, Canada
Duration: 21 May 200723 May 2007


Other21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07
CityNiagara Falls, ON

Bibliographical note

Copyright 2007 IEEE. Reprinted from Proceedings of the 21st international conference on advanced information networking and applications workshops/symposia (AINA2007). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.


  • Intrusion detection
  • Mobile ad-hoc networks
  • Reputation and trust
  • Secure routing
  • Security


Dive into the research topics of 'Trust enhanced secure mobile ad-hoc network routing'. Together they form a unique fingerprint.

Cite this