Research Article Improving ZRP Routing Protocol

Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
Accepted August 2014
Research Article
Improving ZRP Routing Protocol Against Black Hole
Attacks In Mobile Adhoc Networks(MANET)
Ali Gheibi Dehnashi1, Iman Attarzadeh1, Alireza Osareh2
1
Department of Computer, Dezful Branch, Islamic Azad university, Dezful, Iran
2
Department of Computer, Shahid Chamran University, Ahwaz, Iran
Abstract
Mobile adhoc network (MANET) is the network in which mobile devices are connected by wireless media
and there is no centralized management and fixed network infrastructure. Generally, routing protocols in
adhoc networks are classified into proactive, reactive and hybrid. One of the important challenges in hybrid
routing properties is the security of these protocols. As ZRP hybrid routing protocol has not appropriate
security features against black hole attacks, in this paper, we propose a security mechanism based on
estimated latency of the route reply packets reaching the source node and selecting the shortest secure route
and it is protected against black hole attacks and finally a new hybrid routing protocol is presented. After
simulating this protocol by simulation toolNS2, The simulation result shows that the proposed protocol
showed less failure compared to standard ZRP protocol in the presence of malicious nodes of black hole in
terms of some parameters as quality of service (QOS) such as the packets loss, packet delivery ratio, end to
end delay.
Keywords: Mobile adhoc networks, quality of service, quality of service-based routing, Black
hole attack, ZRP
I. Introduction
Mobile adhoc network (MANET) is used in shared spaces and it is one of the highly applied
types of wireless networks without any network structure and central station. Each node acts as a
router in these networks. In recent years, adhoc networks have been of great importance in public
non-military organizations, commercial and industrial regions. Normally, they are used in rescue
missions, industrial robots, traffic management and educational workshops in universities. The
55
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
routing protocols for MANET can be categorized into three types according to updating topology
as proactive, reactive and hybrid (Chlamtac et al., 2003).
Proactive routing protocols are called as table driven routing protocols, because the routs to all
destinations are stored in routing tables. Each node maintains one or more tables containing
routing information. The routing table should be updated periodically or they can do this in case
of network topology change or changing the condition of links. One of the examples of this
protocol group is DSDV (Alotaibi et al., 2012).
Another category of routing protocols in a MANET is reactive protocols or also called on
demand protocols. In this protocols routes are created whenever it is required. Source node first
checks its routing table for the available route from source to destination if the route is available
then it uses that path to transmit the data packet but if the route is not available then it initiates
route discovery process. Reactive protocols add latency to the network due to the route discovery
mechanism. Each intermediate node involved in the route discovery process adds latency. These
protocols decrease the routing overhead but at the cost of increased latency in the network.
Hence these protocols are suitable in the situations where low routing overhead is required. One
of the protocols of this group is AODV routing protocol (Perkins et al., 1999).
Route maintenance: Due to dynamic topology of the network cases of the route failure between
the nodes arises due to link breakage etc, so route maintenance is done. Reactive protocols have
acknowledgement mechanism due to which route maintenance is possible.
But in hybrid routing protocols, by combining the property of both proactive and reactive
protocols, the overhead of proactive routing protocols is reduced and route discovery delay of
reactive protocols is also reduced and ideal routing protocols are achieved. Thus, these protocols
have better research ground compared to two previous groups. For example ZRP is a hybrid
routing protocol (Alotaibi et al., 2012).
II. Related Works
In this section, some of the security mechanisms are investigated that were regarding the routing
protocols of mobile adhoc networks to resist against black hole attacks (Raj et al., 2009) alarmed
the nods by dynamic learning system and sending alarm packets against black holde attact in
ADOV based mangment(Selvavinayaki et al.,2010) aplied general key and digital signature to
issue digital certificates with basic DSR algorithm(VeUoso et al.,2010) study is based on trust
model as neighboring nodes are obtained by recommendation. The recommendations with high
56
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
relationship age are on priority based on time and they are used against black hole attack(Venkat
et al.,2007) presented a trust-based model composed of detection and reaction. The detection
component collectes nodes behavior by recommendations and reaction component enforces
decsion.
III. ZRP routing protocol
This protocol divides the network into various zones and each zone is included of local
neighbors, each node is overlapped in some zones. The size of each zone with the number of
Hop to the perimeter of the region is obtained and each node has its specific zone. Thus, ZRP
reduces the proactive routing method to the central zone of a node. In a limited zone, routing
information maintenance is easier. The size of zone is determined by radius ρ and ρ is the lowest
number of hop to the perimeter of the zone. In figure 1, routing zone radius of node s is ρ=2.
Node S is center of zone. Node S has some routes to node J. One, the routs with length equal 2
and another is routs with length above 2. The nodes with length less than 2 are called interior
nodes A,B,C,D,E,F and the nodes with the length equal 2 are called peripheral nodes like I,G,J,H
and the nodes with radius greater than 2 are outside the zone that are called exterior node as
example the node M is an exterior node(Haas et al, 2001a).
Fig. 1 The zone of ZRP protocol routing zone
One of the most important issues in ZRP protocol is preventing malicious nodes attack with its
great impact on the quality of service of this protocol. One of the attacks is called black hole
attack as getting the packets and discarding them or sending them to a nameless destination. The
present study aimed to present a new method to prevent this attack.
IV. ZRP routing protocol architecture
57
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
As shown in Figure.2 (Haas et al., 2002b), ZRP routing protocol is consists of three parts:
Generally, the zone routing protocol consists of several components, which only together
provide the full routing benefit to ZRP.
A. Intrazone Routing Protocol (IARP)
B.Interzone Routing Protocol (IERP)
C. Bordercast Resolution Protocol (BRP)
Fig. 2 Architecture of ZRP routing protocol
A) Intrazone Routing Protocol(IARP)
This protocol is implemented by a node to connect with interior nodes of routing zone. A node
was located in this zone as its distance from central node is smaller or equal to radius. The nodes
should update routing information continually to determine peripheral nodes and also keep a map
to reach as locally. This protocol by receiving an interrupt from NDP protocol update on-hop
neighbors of central node in case of movement and it can receive a packet form ip layer for
routing. There is a field called TTL in this protocol and it initialized to ρ-1 for path discovery
and is reduced after each packet of node reaches until it achieves ρ =0. This guarantees that
IARP path doesn’t go outside the routing zone (Haas et al., 2002a).
B) Interzone Routing Protocol (IERP)
It is considered as interzone routing component of ZRP. IERP uses the local known topology
benefits and by reactive method, activates the communication between nodes in various zones.
Path query is based on demand in IERP as a path demand is occurred. The delay of using route
discovery was reduced by Bordercasting method. In this method, the node can not send query to
58
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
all local nodes but they can sent them to their peripheral nodes. In addition, a node cannot return
back query to the nodes requesting even they are peripheral nodes. To use interzone routing
protocol in ZRP, it is required to inactive updates of proactive method for intrazoneroutes. This
active capability is provided by IARP. Flooding sending of a route request to all nodes should be
done by Bordercast method with BRP protocol and route request starts only by peripheral nodes.
In the next section, Bordercast operation is explained in details (Haas et al.,2001c).
C) Bordercast Resolution Protocol (BRP)
BRP protocol is used to direct route request as query to peripheral nodes. This is done by
Bordercasting. Bordercasting applies known zone routing structure for effective re-broadcasting
the messages to the uncovered parts of network. Bordercasting method is better than message
flooding applied in reactive protocols. Because this method has query control mechanism by
which repetitive queries are prevented and the packets reach the destination rapidly. As shown in
architecture of figure.2, BRP is used to direct route requests by IERP protocol, when the
interzone routing is done by IERP. Finally, after sending route reply packets from destination
node to source node, the shortest route in terms of number of hops is selected and the source
sends its main data via the route to the destination node (Haas et al.,2001b).
D) Black Hole Attack Mechanism
Black hole node is a malicious node advertising that it has the shortest route to destination node
by a routing protocol and as receiving the packet, it is dropped and doesn’t forward to the
neighbors. For example, node 1 is source node and node 7 is destination node. Node 3 shows
misbehavior and this node send a false reply to rout request packet sent from source node and it
advertises, it has the shortest route to destination or itself is destination. Thus, node 1 by a false
judgment about route discovery process sends data packets to node 3 and this node drops the
packets and this node is called black hole node. This attack is one of the attacks of third layer,
network disturbing routing process (Jhaveri et al., 2012).
59
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
Fig. 3 An example of black hole attack
E) Proposed Method
In routing protocol of standard ZRP, the source node sends a packet to destination node without
considering the route security, the route is not investigated in terms of black hole attacks and the
send data were dropped to destination node on the way by black hole node and the efficiency of
network was reduced in some parameters including packet delivery ratio, throughput, packet loss
and delay. The present study applies a security mechanism against black hole attacks to ZRP
routing protocol to prevent these attacks and lead to efficient routing.
The proposed mechanisms are based on two stages:
A. Detection of a malicious node
The source node performs the following evaluations for each Route Reply packet of destination node:
Step 1- By receiving route reply packets by source node, if the number of hops of each route less
or equal to 2is considered as suspicious node. As it was said, black hole attack is as malicious
node is located near the sender node requesting route or source node and it consumes all the
traffic towards itself and doesn’t forward to other nodes.
Step 2- To be sure of suspicious node as the attack of real black hole, a test packet is send to the
same destination node.
Step 3- If acknowledgment packet is not sent from destination node, it is considered as malicious
node. Black hole attack receives packet and drops it and never replies and then next phase is
applied.
60
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
B. Selecting shortest and secure route among the required routes
This mechanism is based on time and is used to identify the attackers or malicious nodes. As the
malicious node replies rapidly to the route request packet and source nodes have no accurate
information of the accuracy of their distance to destination and they are received about the early
reply of these nodes. Thus, to avoid this, round-trip time of all the routes between source and
destination nodes is calculated to determine the real time or the real distance between source and
destination node to take a true decision about sending the data to destination node.
Calculation of Round Trip Time (RTT):
Round Trip Time is measured as the time interval when the source node relay HELLO message
and when HELLO message reply is received in destination and vice versa.
Equations:
Sending time =value of receive timestamp (destination) – value of original timestamp (Source)(1)
Equation (1) defines the sending time and it is timestamp as received timestamp in destination
node minus transmit timestamp from source node.
Receiving time = time the packet returned (source) – value of transmit timestamp(destination)(2)
Equation (2) defines receiving time and it is timestamp as returning timestampto source node
minus transmitting time stamp from destination node.
By combining equation (1, 2), equation 3 is achieved:
Round-Trip Time = Sending time + Receiving time(3)
Equation 3 shows Round Trip Time (RTT). It is the sum of sending time and receiving time.
The node with data to be sent to destination should detect the required route to destination and
then sends data with the route. This is done only for detecting short and secure routes.
To do this, the data sending node or source node does the following calculations:
a. For each existing or detected route that in the first phase is found by reply packets, its RTT is
calculated from source to destination.
61
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
b. Then, the sum of RTT values of all detected routes is calculated.
c. The average of RTT all detected routes of above values is computed.
d. Among all the existing routes, the route its RTT has less difference from average RTT, selects
the route and with the secure route the data is send to destination.
As a Sample:
S node is source node
D node is destination node
M Node is malicious node
RTT(S-L-T-C-D)=4ms
value of route(1) sending time
RTT(D-C-T-L-S)=4ms
value of route(1) Receiving time
RTT(SLTCD)=8ms
value of route(1) sending time+Receiving time
RTT(S-N-R-H-P-K-D)=6ms value of route(2) sending time
RTT(D-K-P-H-R-N-S)=6ms value of route(2) Receiving time
RTT(SNRHPD)=12ms
value of route(2) sending time+Receiving time
AVG(RTT)=(8+12+2)/3=7.33
RTT (S-L-M)=2ms
route of malicious node
8-7.33=0.67 Route(1) is secure route and shortest path
12-7.33=4.67 Route(2)
2-7.33=-5.33 Route(3)
V. Results and Discussion
The simulation parameters in a scenario file are presented as followings. This parametersareshown
in table I.In this scenario, 50 nodes are defined moving in a space with area 1000*1000 m2.
62
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
Table I
The simulation space conditions
values
The features of simulation
environment
Simulation time
500 ms
Simulation space size
1000*1000m2
Number of nodes
50
Maximum length of queue
200 byte
Channel type
wireless
Queue type
Drop tail
MAC protocol
IEEE 802.11
Traffic type
FTP
Number of malicious nodes
1,2,3
The proposed protocol is named with red as SZRP and standard ZRP protocol is shown by blue.
The first parameter of packet delivery ratio is tested in Figure. 4,Figure. 5, Figure. 6, respectively
both protocol with 1, 2, 3 malicious nodes.
As shown in Figure. 4, the test is done by the presence of one malicious node by increasing
simulation time, packet delivery ratio was decreased in standard ZRP protocol. In the proposed
protocol, despite the increasing simulation time, packet delivery ratio is ascending because our
proposed method is a secure mechanism for preventing black hole attacks in ZRP routing
protocol.
63
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
Packet Delivery Ratio ( % )
1 Maliciuse Node
102
100
98
96
94
92
90
88
86
84
82
99.82
99.91
99.94
98.72
99.67
98.88
99.95
99.96
95.44
84.66
0
100
200
300
400
500
600
Time (sec)
ZRP under blackhole attack
sZRP(Proposed Method)
Fig. 4 Packet delivery ratio chart under one malicious node
In figure.5, figure.6, the simulation result is done with the presence of two and three malicious
nodes. It shows that as the simulation time increases, the packet delivery ratio is decreased in
standard protocol. In the proposed protocol, despite the increasing simulation time, packet
delivery ratio is ascending and increasing, because by increasing simulation time more packets
are sent to destination.
64
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
Packet Delivery Ratio ( % )
2 Maliciuse Node
102
100
98
96
94
92
90
88
86
84
82
99.82
99.9
99.92
98.51
99.3
98.79
99.93
99.95
93.71
83.9
0
100
200
300
400
500
600
Time ( sec )
ZRP under blackhole attack
sZRP(Proposed Method)
Fig. 5 Packet delivery ratio chart under two malicious nodes
Packet Delivery Ratio ( % )
3 Maliciuse Node
120
99.51
99.94
99.91
99.47
82.47
88.47
82.1
88.21
83.41
100
200
300
400
500
98.82
100
80
60
40
20
0
0
Time ( sec )
ZRP under blackhole attack
sZRP(Proposed Method)
Fig. 6 Packet delivery ratio chart under three malicious nodes
65
600
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
The next simulation parameter is end to end delay. As shown in Figure. 7, Figure. 8, Figure. 9
the chart of end-to end delay is shown under one and two and three black hole malicious node.
1 Maliciuse Node
End To End Delay (mili sec)
160
136.733
140
107.38
120
100
127.74
84.015
67.414
71.329
63.732
61.885
200
300
400
500
61.128
80
60
70.489
40
20
0
0
100
600
Time (sec)
ZRP under blackhole attack
sZRP(Proposed Method)
Fig. 7 End to end delay chart under one malicious nodes
End to end delay in the proposed protocol is less compared to standard protocol and the reason of
more delay of standard protocol is as black hole nodes receive data packets and absorb them
continually and generates much traffic in network.
Finally, the end to end delay chart with three malicious nodes is shown in Figure. 9. It means that
in three points of mobile adhoc network with random location, these three nodes are located and
drop the packets. As shown in Figure. 9., standard protocol is shown in blue chart due to the
disturbance in network and the lack of security mechanism against black hole attack; it has more
delay than proposed protocol.
66
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
End To End Delay (mili sec)
2 Maliciuse Node
166.667
180
160
140
120
100
80
60
40
20
0
125.869
122.163
120.645
105.854
55.598
0
100
57.657
57.657
200
300
65.277
58.599
400
500
600
Time (sec)
ZRP under blackhole attack
sZRP(Proposed Method)
Fig. 8 End to end delay chart under two malicious nodes
End To End Delay (mili sec)
3 Maliciuse Node
124.257
140
130.273
125.502
126.52
120
114.866
100
80
62.8465
60
40
55.6096
59.1953
70.5454
61.8945
20
0
0
100
200
300
400
500
Time (sec)
ZRP under blackhole attack
sZRP(Proposed Method)
Fig. 9 End to end delay chart under three malicious nodes
67
600
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
VI. Conclusion and Future Works
ZRP routing protocol is one of hybrid routing protocols in mobile adhoc networks without any
security mechanism against third layer attacks including black hole attack and is vulnerable to
this attack. Black hole attack starts by sending a false route and it deceives source node and send
data from source node are dropped. Thus, the source node is notsure of the accuracy of its
distance to source. The present study presented a proposed method based on round trip time
calculation of routes from source to destination to select the shortest and secure route. After
performing simulation by ns-2 simulator on both standard ZRP and proposed protocols with the
presence of malicious nodes of black hole, the simulation results showed that the proposed
protocol was improved in some parameters including packet delivery ratio, end to end delay ratio
compared to standard protocol. Finally, we achieve a secure ZRP protocol against black hole
attacks. As regardsin this paper we Proposed a secure method for ZRP routing protocol to
prevent against single blackhole attacks our method is not supported collaborative black hole
attacks, for this reason, For a future work, we intend to develop proposed method to a secure
mechanism to prevent against collaborative black hole.
REFERENCES
Alotaibi, E., & Mukherjee, B. (2012). A survey on routing algorithms for wireless Ad-Hoc and
mesh networks. Journal of Computer Networks,Elsevier, 56(2), pp.940–965.
Chlamtac, I., & Conti, M. (2003). Mobile ad hoc networking: imperatives and challenges.
Journal of Ad hoc Network,Elsevier, 1(1), pp.13-64.
Dhurandher, K., Obaidat, M., & Saroit, I. (2010). FACES: Friend-Based Adhoc Routing Using
Challenges to Establish Security in MANETs Systems. IEEE Journals & Magazines,
5(2), pp.176-188.
Haas, Z. J., & Pearlman, M. R. (2001a). The Performance of Query Control Schemes for the
Zone Routing Protocol. IEEE Transactions on Networking(TON), 9(4), pp.427-438.
Haas, Z. J., Pearlman, M. R., & Samar, P. (2001b). The Bordercast Resolution Protocol (BRP)
for AdHoc Networks. IETF Internet Draft,draft-ietf-manet-brp-01.txt.
Haas, Z. J., Pearlman, R., M., & Samar, P. (2001c). Interzone Routing Protocol (IERP). IETF
Internet Draft, draft-ietf-manet-ierp-01.txt.
68
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
Haas, Z. J., Pearlman, M., & Samar, p. (2002a). Intrazone Routing Protocol (IARP). Tech. Rep.
IETF Network Working Groups,Available in:http://tools.ietf.org/html/draft-ietf-manetzone-iarp-02, pp.1-11.
Haas, Z. J., Pearlman, M., & Samar, p. (2002b). The Zone Routing Protocol (ZRP) for Ad Hoc
Networks. Tech. Rep. IETF Internet Draft, Available in draft-ietf-manet-zone-ZRP-04,
pp.1-11.
Jhaveri, R. H., & Patel., S. J. (2012). DoS Attacks in Mobile Ad-hoc:A Survey. Second
International Conference on Advanced Computing & Communication Technologies.,
2(2), pp.535-540.
Perkins, Charls, E., & Royer, M. (1999). Ad-Hoc On Demand Distance Vector Routing Protocol.
In Proceedings of the 2th IEEE Workshop on Mobile Computing Systems and
Applications (WMCSA’99),CA, USA, pp.90-100.
Raj, P. N., & Swadas, P. B. (2009). Dpraodv: A Dyanamic Learning System Against Blackhole
Attack In Aodv Based Manet. International Journal of Computer Science Issues(IJCSI ),
2(2), pp.54-59.
Raj, S., Sanjay, K., & Ravi, P. (2011). Design Enhancements in ZRP for Detecting Multiple
Black Hole Nodes in Mobile Ad Hoc Networks. International Journal of Computer
Applications (0975 – 8887), 18(5), pp.6-10.
Rajdipsinh, & Vaghela. (2013). A Modified Hybrid Protocol(ZRP) Used For Detection And
Removal Of Black. Journal Of Information, Knowledge And Research In Computer
Engineering, 2(2), pp.326-329
Selvavinayaki, k., Shyam Shankar, k., & Karthikeyan, e. (2010). Security Enhanced DSR
Protocol to Prevent Black Hole Attacks in MANETs. International Journal of Computer
Applications(IJCA), 7(2), pp.15-19.
Tsou, P., Chang, J., Lin, Y., & Chao, H. (2011). Developing a bdsr scheme to avoid black hole
attack based on proactive and reactive architecture in manets. International Conference
on Advanced Communication Technology(ICACT), pp.755–760.
69
Journal of Academic and Applied Studies
(Special Issue on Applied Sciences)
Vol. 4(8) August 2014, pp. 55-70
Available online @www.academians.org
ISSN 1925-931X
Improving ZRP Routing Protocol … by A. Gheibi Dehnashi, I. Attarzadeh, A.R. Osareh
Venkat, B., Vijay, V., & Phillip, L. (2007). Trust Enhanced Secure Mobile Ad-hoc Network
Routing. 21 st IEEE International Conference on Advanced Information Networking and
Application Workshop(AINA'07),Niagara Falls,Ontario,Canada, pp.27-33.
VeUoso, P. B., Laufer, R. P., & Cunha, O. (2010). Trust Management in Mobile Ad Hoc
Networks Using a Scalable Maturity-Based Model. IEEE transactions on network and
service management, 7(3), pp.172 - 185.
70