You are on page 1of 6

2016 International Conference on Computational Science and Computational Intelligence

A Comparative Performance Analysis of MANETs


Routing Protocols in Trust-based models
Raihana Ferdous, Vallipuram Muthukkumarasamy
School of Information and Communication Technology
Griffith University
Queensland, Australia
e-mail: ferdousraihana@gmail.com, v.muthu@griffith.edu.au

Abstract—Mobile ad hoc Network (MANET) consists of au- quickly and to have a good response time between the trusted
tonomous mobile nodes without any centralized control. These nodes. In trust-based models central trust authority of the
mobile nodes move arbitrarily within the self-configurable Cluster Heads is a superfluous requirement.
MANET environment. Each of these mobile nodes can act as
a router while receiving and forwarding information. Secure In this paper we have analyzed and compared the performance
routing is an important issue in MANET as mobile nodes of three routing protocols - AODV, DSR and OLSR in two
are prone to attacks from malicious nodes and the overall trust-based frameworks - NTM and TLEACH. In the Node-
performance of the network depends on it. In this setting, three based Trust Management (NTM) framework, the trust of every
routing protocols have been analyzed and compared: OLSR, DSR node is calculated by the interaction history and Cluster Head
and AODV. The metrics are being used are Packet Delivery Ratio,
Delay and Throughput. Network Simulator (NS2) has been used (CH) recommendation [8]. In trust-based LEACH (low energy
as tool for the experiments. The performance analysis of these adaptive clustering hierarchy) or TLEACH (Trusted-LEACH)
protocols also compared for power usage using two trust-based protocol provides secure routing, while preserving the essential
models: Node based Trust Management (NTM) Scheme and functionality of the original protocol [1]. These frameworks
TLEACH. Simulation results show that OLSR protocol performs provide feasible approach to meet the trust requirements of
well compared to AODV and DSR.
data packets.
This paper is organized as follows: Section II introduces the
I. I NTRODUCTION
relevant literature survey. Section III discusses the routing
Mobile ad hoc Networks (MANETs) are self-configuring protocols used for this research. Section IV presents the trust
systems where mobiles nodes are connected through wireless models that we used to compare the performance of the routing
interfaces. Nodes in MANETs have features like dynamic protocols. Section V describes the performance metrics and
topologies, limited battery life and low physical security. The section VI provides the performance analysis on the basis
dynamic topology makes complex routing protocol design. of metrics mentioned in above section. Finally section VII
There are three types of routing protocols: Proactive Protocols, concludes the paper.
Reactive Protocols and Hybrid Protocols. Proactive protocols
are table-driven that constantly update lists of destinations II. R ELATED W ORKS
and routes. Reactive protocols respond on demand where as Many researchers have proposed different methods to secure
Hybrid protocols combine the features of both Reactive and the routing protocols [2] [4] [5]. At this setting, we focus on
Proactive protocols. The main goal of routing protocols is securing AODV, DSR and OLSR routing protocols for this
to minimize delay, maximize network throughput, maximize survey.
network lifetime and energy efficiency and to discover a A performance evaluation of reactive (AODV, DSR) and
secured path from source to the destination. proactive (OLSR, DSDV, TORA) routing protocols was con-
Data packets which are routed via intermediate nodes, can be ducted based on the performance criteria i.e. packet delivery
dropped by malicious nodes without being forwarded to the ratio (PDR), average end to end delay (Delay), routing over-
destination. This introduces not only a much bigger end-to-end head and throughput under various mobility model (RPGM,
delay, but also rapid energy deplete of the nodes. The energy CMM, RWP) using the network simulator NS-2 in Nitiket et al
constraint of the nodes and the attacks of malicious nodes [11]. The authors here concluded that mobility pattern of node
are the prominent reasons for path failure. This path failure has significant impact on routing and the reactive protocols
causes frequent route discovery which affects the performance performed well with respect to PDR, Delay, Normalized
of overall routing protocol. Nodes have to share routing routing load (NRL) and throughput. The delay is greater in
information with their neighboring nodes to find the route to DSR as compare to AODV. In AODV throughput and PDR
the destination. This requires nodes to trust each other. In this are high when the number of nodes was increased.
setting we state that trust is a key concept in secure routing The performance of DSR and AODV on demand reactive
mechanisms. routing protocols for MANET are analyzed using varying
The rationale behind using trust models is to find a route time, packet delivery ratio, throughput and end-to-end delay

978-1-5090-5510-4/16 $31.00 © 2016 IEEE 876


880
DOI 10.1109/CSCI.2016.170
using NS-2 by Goyal et al [12] as well as [13]. They focused members of that Cluster or local nodes.
that jitter and end-to-end delay was low. They observed that
the overall performance for AODV degrades as node density III. ROUTING P ROTOCOLS
increases. MANET protocols are used to create routes between multi-
The performance of two prominent routing protocols in ple nodes in mobile ad hoc networks. The routing protocol is
MANET: OLSR and AODV are compared in the paper [17] required whenever the source needs to transmit and delivers
with Freeway Mobility model. According to this paper, the the packets to the destination.
AODV protocol will perform better in the networks with
static traffic. It uses fewer resources than OLSR, because the A. Ad hoc On Demand Distance Vector (AODV)
control message size is kept small requiring less bandwidth The AODV routing protocol is a reactive routing protocol;
for maintaining the routes and the route table is kept small therefore, routes are determined only when needed [18]. The
reducing the computational power. The AODV protocol can operation of AODV comprises of two main processes i.e. route
be used in resource critical environments. The OLSR protocol discovery and route maintenance. Each node in the network
is more efficient in networks with high density and highly maintains a routing table with the routing information entries.
sporadic traffic. But the best situation is when there are a large When a source has data to transmit to an unknown destination,
number of hosts. OLSR requires that it continuously has some it broadcasts a Route Request (RREQ) for that destination. At
bandwidth in order to receive the topology update messages. each intermediate node, when a RREQ is received, a route
Low-Energy Adaptive Clustering Hierarchy (LEACH) has to the source is then created. If the receiving node has not
motivated the design of several other protocols which try to received this RREQ before, or is not the destination or does not
improve upon the cluster head selection process by considering have a current route to the destination, it will then rebroadcasts
the residual energy of the nodes [6]. Although LEACH is able the RREQ. If the receiving node is the destination or has a
to increase the network lifetime, there are still a number of current route to the destination, it generates a Route Reply
issues about the assumptions used in this protocol. LEACH (RREP). The RREP is unicast in a hop-by-hop fashion to
assumes that all nodes can transmit with enough power to the source. As the RREP propagates, each intermediate node
reach the Base Station if needed and that each node has creates a route to the destination. When the source receives
computational power to support different MAC protocols. the RREP, it records the route to the destination and can begin
Therefore, it is not applicable to networks deployed in large sending data.
regions. It also assumes that nodes always have data to send If additional copies of the same RREQ are later received, these
and nodes located close to each other have correlated data. It packets are discarded. The reply is sent using the reverse
is not obvious how the number of predetermined cluster heads path. For route maintenance, when a source node moves, it
is going to be uniformly distributed throughout the network. can re-initiate a route discovery process. If any intermediate
Therefore, there is a possibility that the elected cluster heads node moves within a particular route, the neighbor of the
may be concentrated in one part of the network. This may lead drifted node can detect the link failure and sends a link failure
to some nodes not having any Cluster head in their vicinity. notification to its upstream neighbor. Route maintenance is
Trusted-LEACH or TLEACH [9] is a trust-based version of the based on the periodic transmission of HELLO messages [3].
data-centric routing protocol LEACH [7]. Trust management AODV can handle low, moderate, and relatively high mobility
in TLEACH uses both direct and indirect trust. TLEACH rates of the nodes in MANET, as well as a variety of data
works in tight intervals, dividing the operation of the network traffic levels. AODV is designed for use in networks where
to a well-orchestrated and synchronized beat of data retrieval the nodes can all trust each other, either by use of pre-
and monitoring. TLEACH selects about 5% of the nodes configured keys, or because it is assumed that there are no
as cluster-heads, who are responsible for forwarding data malicious intruder nodes. AODV has been designed to reduce
from the nodes in the cluster towards a sink. Cluster-heads the dissemination of control traffic and eliminate overhead on
are elected based on trust. Nodes in the cluster monitor the data traffic, in order to improve scalability and performance.
transmissions of each other as well as the transmissions of Each forwarding node keeps track of its interaction history to
the cluster-head (depending on how much the node trusts the its next hops as well as the list of neighboring nodes that have
cluster-head). This monitoring provides the nodes with direct transmitted Hello messages during the last interaction.
trust information. Indirect trust about other nodes is provided
only by the cluster-heads to the nodes in its cluster. B. Dynamic Source Routing (DSR)
Ferdous et al. [8], presented a cluster head selection algorithm Dynamic Source Routing (DSR) protocol is also a reactive
based on an efficient trust model. After deployment, the nodes routing protocol designed specifically for use in multi-hop mo-
broadcast their ID and trust value to their neighbors along bile wireless ad hoc networks [10]. DSR allows the network to
with the REQ/REPLY flag. When the participating nodes be completely self-organizing and self-configuring, without the
have discovered their neighbors, they exchange information need for any existing network infrastructure or administration.
about the number of one hop neighbors. The node which The protocol allows multiple routes to any destination and
has maximum neighbors from the trust interaction table is allows each sender to select and control the routes used in
selected as the Trusted Authority(TA) and other nodes become routing its packets, for example for use in load balancing

881
877
or for increased robustness. Other advantages of the DSR are only allowed to carry the information.
protocol include easily guaranteed loop-free routing, support Advantages of OLSR protocol are it does not need central
for use in networks containing unidirectional links and very administrative system to handle its routing process, the link is
rapid recovery when routes in the network change. The DSR reliable for the control messages, since the messages are sent
protocol is designed mainly for mobile ad hoc networks of periodically and the delivery does not have to be sequential
up to about two hundred nodes, and is designed to work well and OLSR is suitable for high density networks. Whereas the
with even very high rates of mobility. main disadvantages are OLSR protocol periodically sends the
Unlike AODV, in DSR the intermediate nodes do not maintain updated topology information throughout the entire network
routing information in order to route the pockets they receive. and It allows high protocol bandwidth usage.
This protocol comprises of three components namely routing,
route discovery and route maintenance. Routing of packets is IV. T RUST M ODEL A NALYSIS
performed as follows. The node which has a data to send will Security is not taken into consideration in the initial design
dynamically discover a source route. Each packet will carry of OLSR, neither is in AODV nor in DSR. These routing
in its header the complete list of nodes through which the protocols do not protect the routing packets in networks, so
data must pass to reach the destination. There is no periodic an attacker can easily modify them without being detected. In
transmission of router advertisements, link status, updating of this paper our motivation is to secure the overall MANET en-
routing information etc. But in the packet header, the complete vironment by using the trust models like NTM and TLEACH.
source route from a source node to a desired destination is
available. This source route can be cached by the intermediate A. Node-based Trust Management System(NTM)
nodes for future use. The Node-based Trust Management (NTM) Framework is
If the source route is not available, the node will initiate a route based on a Clustered mobile sensor network with backbone
discovery process. The source node will broadcast a route [8]; it introduces a trust of a node within local management
request message to all of its neighbors. Each route request strategy with help from the mobile agents running on each
is identified with a unique id number generated by source node. That is, a node‘s trust-based information is stored as a
node. It contains the details of source and destination. Also history on the node itself and managed by the local mobile
it contains a record of addresses of each intermediate nodes agent of the node. The goal is to provide nodes with a
through which the data has been forwarded. At the source mechanism to evaluate the trust level of its direct neighbors
node, the route record is empty. as shown in Figure-1.
It should be noted that when a node encounters a fatal
transmission problem at its data link layer, it generates a Route
Error packet. When a node receives a route error packet, it
removes the hop in error from it’s route cache. All routes that
contain the hop in error are truncated at that point. Acknowl-
edgment packets are used to verify the correct operation of
the route links. This also includes passive acknowledgments
in which a node hears the next hop forwarding the packet
along the route.

C. Optimized Link State Routing Protocol(OLSR)


Figure 1. NTM node in MANET
OLSR is a proactive routing protocol for mobile ad hoc
networks [14] [16]. The protocol inherits the stability of a
link state algorithm and has the advantage of having routes A trust network graph G is formed where nodes are
immediately available when needed due to its proactiveness. connected if they are one hop away in terms of physical
OLSR is an optimization over the classical link state protocol, transmissions. It is considered that every node has a trust
tailored for mobile ad hoc networks. OLSR minimizes the value between the range [0, 1] where 1 for full trust and 0
overhead from flooding of control traffic by using only selected for no trust with the trust rating, T nij [0, 1] on every other
nodes, called MPRs, to retransmit control messages. This node. In this voting scheme T nij = 1 represents completely
technique significantly reduces the number of retransmissions positive trust rating node i has on node j, T nij = 0
required to flood a message to all nodes in the network. represents completely negative trust rating. Trust relations
Secondly, OLSR requires only partial link state to be flooded are asymmetric, i.e T nij = T nji . In the voting rule suppose
in order to provide shortest path routes. The minimal set of link node i is the target of trust evaluation, all the opinion values
state information required is that all nodes, selected as MPRs, on i from neighbors will be aggregated to form a trust value.
MUST declare the links to their MPR selectors. Additional Since the recommender itself may be a misbehaving node,
topological information, if present, MAY be utilized e.g., for instead of just using summation as aggregation, the main
redundancy purposes. Each node selects a set of its neighbors purpose of this research is to provide an effective voting
as multipoint relay (MPR). OLSR only selected as MPR nodes scheme on the basis of dynamic Trust rating.

882
878
In NTM scheme, Trust Evaluators (TEs) can be computed by source node. PDR =(Packet received/Packet sent) The
grasping the TRUST-VALUE from equation 4. This scheme more accurate the results, the better performance
draws ideas from the Watchdog and Pathrater schemes [15], • Average end to end delay: This is the time taken for a
which has been utilized for cooperation of nodes in ad-hoc packet to be transmitted across a network from source to
destination. The delay experienced by the packet from it
networks. Therefore, a node ni ’s trust on another node nj was sent by the source to destination till it was received
can be defined as: at the destination. This whole process depends on packet
size, the interval and the route length as well. This
T nij = α1ni Tsnj + α2ni T nj o (1) includes all possible delays caused by buffering during
route discovery latency, queuing at the interface queue,
In the above equation, T nij is evaluated as a function of retransmission delays at the MAC, and propagation.
two parameters: Delayend−end = Links[Delaytransition + Delaypropagation
nj
• ni Ts : Node ni ’s self evaluated trust on nj ; ni computes +Delayprocess ]
this by directly monitoring nj . (2)
n
• ni T j o: Weighted sum of every other nodes’ trust on nj • Throughput: It is the average rate of successful packet delivery.
The throughput is usually measured in bits per seconds or
evaluated by ni .
packets per time slot.
• Constant Bit Rate (CBR) traffic has been used. Time intervals
B. Trusted-LEACH(TLEACH) between packets are exchanged between nodes with varied
Trust-based Low Energy Adaptive Clustering Hierar- number of nodes i.e. 50 and 100 nodes. It should be noted
that different transmit data rates can be achieved by varying
chy(TLEACH) is a Wireless Sensor Networks(WSNs) trust CBR parameters. CBR has been used as it limits the maximum
protocol [1]. TLEACH contains two main components, the number of packets that need to be sent from source to sink.
Monitoring Module and the Trust Evaluation Module. Each • Loss Monitor has been used to measure the throughput at the
node also maintains a Neighbor Situational Trust Table sink, over a given time window.
(NSTT) filled with trust value entries for each pair of node • Battery Power:Battery power, P ower can be expressed as-
ids and situational operations. Situational operations, such U plink Downlink
P ower = 1 − − (3)
as data sensing and routing, each have an individual trust U ploadvolume Downloadvolume
value because nodes may not behave maliciously for all VI. A NALYZING S IMULATION
operations. Whenever a monitoring node detects misbehavior,
the Monitoring Module les a misbehavior report tallying the The performance measures of three protocols i.e. DSR,
number of misbehavior and good behaviors. The trust update AODV and OLSR have been conducted in the NS2. The
slot allows the Cluster head to share its trust values with simulation has been spanned for 300 seconds for each test.
its cluster members. TLEACH losses less data than LEACH The initial and final 30 seconds (60 seconds in total) of
because half of all data sent by cluster members is received by simulation has been excluded from throughput measurement.
the gateway. TLEACH is, however, unable to stop the constant This is to ensure that the system was in steady state. The
loss of data because of the lack of monitoring on the cluster network dimensions are 500m × 500m with transmission
head. range of 250m for each node. In low density network we
deploy 50 nodes whereas in high density network it is 100
V. M ETRICS FOR P ERFORMANCE C OMPARISON nodes.
From the above analysis of routing protocols, the OLSR
MANET has number of qualitative and quantitative metrics outperforms the both AODV and DSR protocols in terms of
that can be used to compare ad hoc routing protocols. This End-to-end Delay, Packet Delivery and Throughput for 50 as
paper has considered the following metrics to evaluate the well as 100 mobile nodes as shown in Figures 2 - 6.
performance of ad hoc network routing protocols. The trust- In Figure-6, it is evident from the results that the delay is
based models ensure authentication and integrity of the routing higher in AODV and less in OLSR among the proactive
messages that satisfy the following conditions as no interaction protocols and in reactive protocols delay is less in DSR.
can be made unless the node‘s current trust information is But in increase in density of nodes from 50 to 100, when
revealed by the recommendation and a trusted node can be compared, OLSR has got the higher efficiency in delay.
selected as a Cluster Head by its battery life and good repu- In Figure-7 we have performed a power consumption
tation. The fairness of node‘s energy usage is measured using comparison for DSR, AODV and OLSR Protocols in NTM
the standard deviation of the energy consumed per node. This and TLEACH for 50 and 100 Nodes in MANET. It shows
is calculated by the square root of difference between energy that there is no significant impact on using different trust
consumed at each node and the average energy consumed per models for the routing protocols. We model power use based
node. on the experimental results for power consumption using
All the tests are done on the basis of the following Perfor- 802.11g link assuming a mobile node has full battery power
mance metrics: at the start of the simulation. It should be noted that uplink
• Packet Delivery Ratio (PDR): It is the ratio of the packets uses more power than the downlink.
successfully received by the destination node from the In this simulation, energy consumption for nodes varies from

883
879
5mA in idle mode, up-to 200mA in receiving mode and up-to
300mA in transmitting mode. Initial energy of each node is
1000 Joules. We have evaluated the following performance
indexes-

• Overall energy consumed in NTM and TLEACH mod-


els(in Joules)
• the routing protocols(packet types)

Figure 5. Threshold comparison Protocols for 100 Nodes in MANET

Figure 2. Comparison for Packet Loss for 50 Nodes in MANET

Figure 6. End to end delay comparison Protocols for 100 Nodes in MANET

Figure 3. Comparison for Protocols Packet Delivery for 100 Nodes in


MANET

Figure 7. Power consumption comparison Protocols in NTM and TLEACH


for 50 and 100 Nodes in MANET

VII. C ONCLUSION
The OLSR outperforms both AODV and DSR protocols in
terms of packet delivery and throughput in 50 mobile nodes.
The AODV puts low load than OLSR and DSR respectively.
Figure 4. Threshold comparison Protocols for 50 Nodes in MANET In 100 mobile nodes OLSR is again showing good results
in data loss, packet delivery and throughput than AODV and
DSR respectively. AODV offer good results in offering low

884
880
load on the network than OLSR and DSR respectively. High [14] T. Clausen and P. Jaqcquet, Optimized Link State Routing (OLSR)
Protocol, RFC 3626, IETF Networking Group, October 2003.
network load affects the MANET routing control packets. [15] S. Marti, T.J. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbe-
Therefore in terms of analyzing routing protocols, the OLSR havior in Mobile Ad Hoc Networks. Mobicom 2000, August 2000, pp.
outperforms the both AODV and DSR protocols in terms 255-265.
[16] D. Kaur, N. Kumar, Comparative Analysis of AODV, OLSR, TORA, DSR
of Delay, Packet Delivery and Throughput for both 50 and and DSDV Routing Protocols in Mobile Ad Hoc Networks, in International
100 mobile nodes respectively. Results also show that the Journal of Computer Network and Information Security(IJCNIS), vol. 5,
NTM trust model can induce more secure routing environment no.3, pp.39,2013
[17] S. Gowrishankar, T. G. Basavaraju, M Singh and Subir Kumar Sarkar,
than the TLEACH approach. We conclude that the type of Scenario based Performance Analysis of AODV and OLSR in Mobile
traffic affects the performance of the routing protocols whereas Ad hoc Networks, In Proceeding of the 24th South East Asia Regional
mobility pattern does not have any impact on the performance Computer Conference, 2007.
[18] C. E. Perkins, E. M. Belding-Royer, and S. Das. Ad hoc On Demand
of the routing protocols. Trust models also have less impact on Distance Vector (AODV) Routing, RFC 3561, July 2003.
the performance of the routing protocols. Future work should
include efforts to improve the robustness of security issues for
improving the overall performance of the system like the way
that the message authentication between intermediate Cluster
heads are treated, where there can be a delay in identifying a
malicious neighboring node.

R EFERENCES
[1] F. Song and B. Zhao. Trust-Based LEACH Protocol for Wireless Sensor
Networks, In Proceedings of the 2008 Second international Conference
on Future Generation Communication and Networking - Volume 01
(December 13 - 15, 2008). FGCN. IEEE Computer Society, Washington,
DC, pp-202-207.
[2] A.Mishra. Security and Quality of Service in Ad Hoc Wireless Networks,
Cambridge University Press, New York, 2008.
[3] S.Misra, I.Woungang, and S.Misra, Guide to Wireless Ad Hoc Networks,
Springer Science + Business Media, London, 2009.
[4] E.Cayirci and C.Rong. Security in Wireless Ad Hoc and Sensor Networks,
John Wiley and Sons, Ltd, Publication,2009.
[5] R.Gupta. Mobile Ad hoc Network (MANETS): Proposed solution to Secu-
rity Related Issues. Indian Journal of Computer Science and Engineering
(IJCSE), Vol - 2, Issue - 5, pp. 738-746, 2011.
[6] M. J. Handy, M. Haase, and D. Timmermann. Low energy adaptive
clustering hierarchy with deterministic cluster-head selection, In Proc. 4th
IEEE International Workshop on Mobile and Wireless Communications
Network (MWCN 2002), Stockholm, Sweden, September 2002, pp. 368-
372.
[7] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy-
efficient communication protocol for wireless microsensor networks, Pro-
ceedings of the 33rd Annual Hawaii International Conference on System
Sciences, pp. 1-10 vol. 2, Jan. 2000.
[8] R. Ferdous, V. Muthukkumarasamy, E. Sithirasenan, Determining Similar
Recommenders using Improved Collaborative Filtering in MANETs, In
the 12th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom-13). Melbourne,
Australia, 16-18 July, 2013, pp. 110-117
[9] F. Song and B. Zhao. Trust-Based LEACH Protocol for Wireless Sensor
Networks, In Proceedings of the 2008 Second international Conference
on Future Generation Communication and Networking - Volume 01
(December 13 - 15, 2008). FGCN. IEEE Computer Society, Washington,
DC, pp-202-207.
[10] D. B. Johnson, D. A Maltz, The Dynamic Source Routing Protocol for
Mobile Ad Hoc Networks, Internet Draft, draft-ietf-manet-dsr-07.txt, Feb.
2002
[11] N. M. Nitiket And P. B. Nilesh, Performance Evaluation of AODV
and DSR On-Demand Routing Protocols with Varying MANET Size,
International Journal of Wireless Mobile Networks (IJWMN) Vol. 4,
No. 1, February 2012, pp. 183-196.
[12] N. Goyal, N. Hemrajani, Comparative Study of AODV and DSR Routing
Protocols for MANET: Performance Analysis, International Journal of
Communication and Computer Technologies Volume 01 No.57 Issue:
06, Aug 2013, pp 198-202.
[13] C. Singh, V. Sharma, Comparative Performance Analysis of Study of
Routing Protocols for Adhoc Networks, International Journal of Advanced
Research in Computer Engineering and Technology (IJARCET) Volume
4 Issue 9, September 2015, pp 3494-3498.

885
881

You might also like