This article was published online on 15 September 2013. An error was subsequently identified. This notice is included to indicate the article has been corrected 1 July 2014.
Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks†
Article first published online: 15 SEP 2013
Copyright © 2013 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 7, Issue 11, pages 1746–1763, November 2014
How to Cite
2014), Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks, Security Comm. Networks, 7, 1746–1763, doi: 10.1002/sec.872, and (
- Issue published online: 24 OCT 2014
- Article first published online: 15 SEP 2013
- Manuscript Accepted: 9 AUG 2013
- Manuscript Revised: 7 AUG 2013
- Manuscript Received: 20 OCT 2012
Quality of service (QoS) provisioning in mobile ad hoc networks (MANETs) is one of the fundamental concerns in this area. Autonomous mobility of nodes is one of the main factors affecting the network QoS. A lack of fixed infrastructure and central control on the nodes complicate guaranteeing the QoS in MANETs. Security is a major factor affecting the QoS in such networks. This paper proposes a new routing method based on trust among the nodes and applies a clustering approach to MANETs. This routing scheme can calculate the trustworthiness of the route and the shortest routes to the destination by avoiding identified malicious nodes. The effects of node mobility and number of malicious nodes on routing performances are investigated in the reported research. Simulation is used to show the effectiveness of the proposed approach in comparison with a categorized trust method, Ad hoc On-demand Distance Vector, trust vector-based Ad hoc On-demand Distance Vector, and trust vector-based dynamic source routing in terms of end-to-end delay, network throughput, and packet delivery ratio at the expense of a moderate increase in the routing overhead. The proposed trust-based routing method finds the trustworthy route by applying end-to-end trust calculation and finds the optimal route by performing clustering scheme from the source node to the destination node. In the extended proposed routing method, adding a nonce-based encryption scheme results in improved packet delivery ratio, network throughput, and malicious node detection rate. Copyright © 2013 John Wiley & Sons, Ltd.