Neural Computing and Applications

, Volume 29, Issue 9, pp 597–607 | Cite as

Reputation-based mechanisms to avoid misbehaving nodes in ad hoc and wireless sensor networks

  • Abdulaziz S. Almazyad
Original Article


Securing mobile ad hoc networks (MANET) has been the interest of researchers recently because of its use in important security sectors such as police, rescue teams, and the military. One method to ensure a secure ad hoc network is to identify malicious nodes (hostile) from good nodes by their reputation based on the past experience of packet delivery. In this paper, we explore by applying reputation in various ways the effect to the throughput of a MANET ad hoc network. We simulate four different scenarios where the node reputation is evaluated to choose the most reliable route and eliminate the effect of malicious nodes performing gray-hole attack. One of the applied scenarios is a hybrid method where a sender node takes in consideration the reputation of all the nodes forming a route to choose the most reliable route. We find that by applying the hybrid method the performance of the network is the best and data packets are more likely to be delivered successfully to the intended destination in a very hostile environment.


Ad hoc MANET Reputation Malicious Gray hole 



This work is supported by the Research Center of College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia.


  1. 1.
    Deshmukh A (2015) Identifying misbehaving nodes in wireless sensor networks. Int J Eng Trends Technol 24(6):292–296CrossRefGoogle Scholar
  2. 2.
    Almazyad A, Seddiq Y, Alotaibi A, Al-Nasheri A, BenSaleh M, Obeid A, Qasim S (2014) A proposed scalable design and simulation of wireless sensor network-based long-distance water pipeline leakage monitoring system. Sensors 14(2):3557–3577Google Scholar
  3. 3.
    Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688Google Scholar
  4. 4.
    Alkalbani A, Tap A, Mantoro T (2014) Evaluated reputation-based trust for WSN security. J Theor Appl Inf Technol 70(3):434–442Google Scholar
  5. 5.
    Govindan K, Mohapatra P (2012) Trust computations and trust dynamics in mobile ad hoc networks: a survey. IEEE Commun Surveys Tutor. doi: 10.1109/SURV.2011.042711.00083
  6. 6.
    Papadimitratos P, Hass ZJ (2003) Securing mobile ad hoc networks. In: The handbook of ad hoc wireless networks, pp 551–567.
  7. 7.
    Royer EM, Toh C-K (1999) A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers Commun.
  8. 8.
    Inkinen K (2004) New secure routing in ad hoc networks: study and evaluation of proposed schemes. In: Proceedings of internetworking 2004, Sjökulla, Finland.
  9. 9.
    Papadimitratos P, Haas ZJ (2002) Secure routing for mobile ad hoc networks. In: Proceedings of the SCS communication networks and distributed systems, modeling and simulating conference (CNDS 2002), pp 27–31.
  10. 10.
    Srinivasan A, Teitelbaum J, Liang H, Wu J, Cardei M (2006) Reputation and trust-based systems for ad hoc and sensor networks. Florida Atlantic University, Department of Computer Science and Engineering.
  11. 11.
    Srinivasan A, Teitelbaum J, Wu J (2006) Distributed reputation-based beacon trust system. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computingGoogle Scholar
  12. 12.
    Hu J (2005) Cooperation in mobile ad hoc networks. Computer Science Department, Florida State University.
  13. 13.
    Xue Y, Nahrstedt K (2002) Bypassing misbehaving nodes in ad hoc routing. Tech. Department of Computer Science, University of Illinois at Urbana-Champaign.
  14. 14.
    Dewan P, Dagupta P (2003) Trusting routers and relays in ad hoc networks. In: First international workshop on wireless security and privacy (WiSr 2003) in conjunction with IEEE 2003 international conference on parallel processing workshops (ICPP), Arizona State University.
  15. 15.
    Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: Tenth international conference on proceedings ICPADS 2004, vol 7, No 9, pp 665–672.

Copyright information

© The Natural Computing Applications Forum 2016

Authors and Affiliations

  1. 1.College of Computer and Information SciencesKing Saud UniversityRiyadhSaudi Arabia
  2. 2.College of Computer and Information SystemsAl-Yamamah UniversityRiyadhSaudi Arabia

Personalised recommendations