=Paper=
{{Paper
|id=Vol-2786/Paper52
|storemode=property
|title=Trust Sensitive Dual Cluster Head Based Routing Scheme to Isolate Misbehaving Nodes in MANET
|pdfUrl=https://ceur-ws.org/Vol-2786/Paper52.pdf
|volume=Vol-2786
|authors=Aruna Subramanian,Subramani Appavupillai
|dblpUrl=https://dblp.org/rec/conf/isic2/SubramanianA21
}}
==Trust Sensitive Dual Cluster Head Based Routing Scheme to Isolate Misbehaving Nodes in MANET==
436 Trust Sensitive Dual Cluster Head Based Routing Scheme to Isolate Misbehaving Nodes in MANET Aruna Subramaniana, Subramani Appavupillaib a Sona College of Technology, bM.V.Muthiah Government Arts College for Women Abstract Routing protocols function as the obligatory force in MANETs to transfer data outside the physical wireless ranges of the nodes. In hierarchical cluster based routing; cluster head nodes and gateway nodes alone participate in routing decisions. Those nodes may fail to cooperate during route discovery due to selfish or malicious grounds. Hence, imposing cooperation among nodes in MANET to employ a secure route becomes an extremely significant issue. Cryptographic mechanisms can be used, but it acquires a high computational cost and may not categorize the nodes with malicious intention. Therefore, we proposed a dual cluster head based trust aware mechanism as an alternative to cryptographic technique to protect forwarded packets from malicious nodes. Our proposed protocol TWCBRP classifies the network into one hop overlapping clusters with primary and secondary cluster heads, which are accountable for conducting all the routing activities. It constantly assurances the trustworthiness of cluster heads by replacing primary with secondary cluster head, as soon as the former becomes malicious. Cluster members send routing packets only through trusted cluster heads and gateway nodes thus guaranteeing a secure path. The performance of TWCBRP is evaluated with Network Simulator2 and illustrates better performance in terms of packet delivery ratio, throughput, delay, and control overhead when compared to a distributed weighted cluster based protocol (CBPMD). Keywords MANET, malicious node, selfish node, trust, security. 1. INTRODUCTION MANET is a self-configuring, decentralized type of unmanaged (ie., infrastructure less) wireless network Therefore, there is an inducement for a node to with dynamic topology. It does not rely on fixed routers misbehave in a malicious and selfish manner without or access points as in the case of infrastructure wireless cooperating with other nodes. The intention of networks. Instead, each node performs as a host as well malicious node is to attack and damage the network. as a router and participates in routing process by Similarly, the intention of selfish node is to save its forwarding data for other nodes. Nodes in MANET use power, memory and CPU time [2]. A selfish node is not flooding as the basic mechanism for forwarding data malicious and it does not intend to damage the network and control packets. So, the data is forwarded through [3]. But, it normally restrains itself from other nodes intermediate nodes dynamically based on the network which do not bring any benefit to the network. That is, connectivity. There are number of characteristics in they do not participate in routing process, intentionally MANET such as mobility, dynamic topology, energy delay RREQ, and drops data packets. Hence, imposing constrained operation, limited bandwidth, and security cooperation among nodes in MANET to employ a secure threats make it used in a number of applications for route becomes an extremely significant issue. MANET. That is, they are appropriate for disaster Therefore, an unpredictable node can wreak situations like natural or human induced disasters, substantial damage and undesirably affect the quality military battle-fields, and emergency medical and reliability of data [4]. Cryptographic mechanisms situations, group communications, civil and business can be applied in MANET routing schemes to secure data operations [21]. The nature of the mobile nodes in packets during the transmission of data packets in the MANET brands them extremely susceptible to a variety network. But cryptographic techniques incur a high of security threats because they usually own low computational cost and cannot identify malicious nodes computational resource as well as short radio [5]. So, employing cryptographic techniques in MANET transmission range due to the limited battery power are quite impractical as MANETs have limited resource they carry, and they might be moving constantly [1]. and vulnerable to several security attacks. Trust mechanism can be used as an alternative to ISIC’21: International Semantic Intelligence Conference, February cryptographic technique [5]. Trust mechanism 25-27, 2021, Delhi, India computes trust value on nodes which helps to detect EMAIL: sarunasnivoss@gmail.com (A. 1); and isolate malicious and selfish nodes to provide subramani.appavu@gmail.com (A. 2) secure data transmission. ORCID: 0000-0001-7791-6955 (A. 1) ©️ 2021 Copyright for this paper by its authors. Use permitted under Creative 2. PROBLEM IDENTIFICATION AND Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) NETWORK MODEL 437 The concept of trust originally derived from social By electing single cluster head, it is very difficult to sciences field and is defined as the degree of subjective address the issue of cluster stability [6]. Furthermore, belief about the behaviors of a particular entity [9]. the elected cluster head may or may not cooperate Trust has also received its attention in several during routing. Therefore, imposing cooperation among literatures: psychology, sociology, economics, political nodes in MANET becomes a significant issue in order to science, anthropology and recently in wireless networks provide a secure route. Hence, we proposed a new trust [7, 9, 22]. Blaze et al. [4] instigated the term” Trust aware weighted dual cluster head based routing Management” and acknowledged it as a separate protocol to provide a secure and stable route in MANET. component of security services in networks and dual cluster heads namely primary and secondary clarified that” Trust management offers a unified cluster heads are elected to sustain cluster stability. approach for specifying and interpreting security Hybrid trust mechanism is imposed on nodes in the policies, credentials, and relationships” [4]. It consists clusters to detect and isolate malicious and selfish of three components: experience, recommendation and nodes and to provide a secure route. Supposedly, we knowledge [4]. The ‘experience’ factor of trust for each can describe a MANET as an undirected graph G= (V, E), node is directly measured by their immediate neighbors where V represents a set of nodes vi and E represents a and kept updated at regular intervals in the trust table. set of links ei. [7,8]. Therefore, building some sort of The existing trust table is propagated to all other nodes backbone structure for a network can enrich the as ‘recommendation’ part of the trust. At a regular performance of the whole network when the network interval, the previously evaluated trust is included in becomes dense. The cluster structure is an efficient the current ‘knowledge’ factor of total trust. Now backbone infrastructure for MANETs [7, 21]. The either these three factors individually or a combination network is partitioned into group of clusters. We define of them can be used in computing the trust. Trust a cluster to be a subset of V and our proposed protocol management in MANETs is preferred when participating elects two cluster heads namely primary and secondary nodes, without any earlier interactions, desire to cluster heads to maintain the stability of cluster establish a network with an acceptable level of trust structure. The nodes in a cluster are said to be relationships among themselves. Trust management has geographically close to each other. The range of a different applicability in many decision making cluster is measured by the number of hops from the situations including intrusion detection, cluster head to the extreme member node in its cluster. authentication, access control, key management, In our proposed work, we define the cluster radius to isolating misbehaving nodes for effective routing, and be 1 hop. That is, every cluster member node will be other purposes [10,20]. The term trust management is directly connected to its cluster head. Gateways are interchangeably used with the term reputation the non-cluster head nodes which lie on more than one management [11]. However, there is a minor difference cluster head’s transmission range. Cluster heads and between trust and reputation. Trust is active, while gateways form a backbone of the original network [8]. reputation is passive [11]. The cluster size is well-defined to be the number of nodes in the cluster, including cluster head and cluster 3.2 Classifications of trust management members. schemes The effort on trust computations can be largely classified into the following categories: 3. LITERATURE REVIEW Direct trust computation method – In this method, every node computes the trust value of its neighbors by itself. Broadcasting is a fundamental operation of MANET. This could be productive only if all nodes operate in a Indirect trust computation method- In this trustworthy manner. Therefore, establishing and method, central agent manages (ie., helps) the quantifying behavior of nodes in the form of trust is node to compute the trust value of its neighbor essential for ensuring proper operation of MANET [4]. nodes. This is primarily important in case of tactical networks. Due to the dynamic nature of mobile nodes, trust computation of nodes in MANET becomes a relatively a) Distributed trust computation schemes challenging task when compared to static networks. This can be further classified as: [24] Also, the nodes in MANET are more vulnerable to Neighbor sensing based trust computation attacks than nodes in wired network and thus scheme (ie., Direct trust) performance degrades. So security is an important issue Recommendations based trust computation in MANET to provide secure communication between scheme (ie., InDirect trust) mobile nodes. (i) Neighbor sensing method: Here, every single node observes its neighbors for their event reports and 3.1 Definition of Trust and Motivation towards stores them up in their “knowledge” cache. A trust management trustor node will compare its own observation report from the trustee node and also from other 438 neighbor nodes. Trust factor will be decided based Paramasivam. B et al [15] proposed a secure as well as on the amount of deviations between the a fair cluster head selection protocol for improving observation reports [14]. security in MANETs. This model integrates security (ii) Recommendation based scheme (ie., factors into the clustering approach for achieving Indirect trust): attacker identification and classification. Byzantine Here, trust relationships on nodes are established agreement based cooperative technique is used for based on recommendations alone [14]. attacker identification and classification to make the network more attack resistant. The nodes that are (iii) Hybrid schemes: totally surrounded by malicious neighbors fine-tune In hybrid schemes, the trust on a node is computed dynamically their belief and disbelief thresholds. based on direct trust experience and recommendations from other nodes [14]. Venkanna.U et al [17] proposed a methodology to elect a accommodating node as the cluster head node by using key decision parameters such as trust value, 3.3 Related Works remaining energy level, and time of availability values of nodes. Cluster stabilization is achieved by electing In recent times, there has been considerable effort on two cluster heads in which a secondary cluster head will various trust computing techniques with respect to take the role of the primary cluster head whenever the MANET [11]. Buchegger et al [12] proposed CONFIDANT primary moves out of the cluster. The first step in this (ie., Cooperation of Node’s Fairness In Dynamic Ad hoc model is to structure the problem as a hierarchy for NeTworks) protocol for detecting and isolating cluster formation. The second step is to calculate the misbehavior nodes in MANET. In this method, relative local weights of key decision parameters confirmation from direct experiences and namely TV, REL, and ToA towards the goal. The third recommendations are collected. That is trust step is to estimate relative local weight of each node in relationships and routing decisions are constructed on the cluster with respective to each decision factor. The experienced, observed and forwarding behavior of fourth step is to determine the overall weight value of other nodes. Dynamic Source Routing (DSR) is taken as each node in the cluster. a base routing protocol in this scheme. Rahul. A et al [18] proposed a cluster based indirect M. Tamer Refaei et al [13] suggested a reputation - trust mechanism to evaluate the trustworthiness of established mechanism as a means of building trust cluster heads. This model consists of three phases such among nodes. Here a node autonomously evaluates its as interaction phase, request phase and trust neighboring nodes based on completion of the evaluation phase. In interaction phase, the member requested services. The neighbors need not be nodes will generate feedback values in the range from monitored in promiscuous mode as in other reputation 1 to 10 depending on the number of successful based methods. There is no need of replacing of interactions between the cluster members and cluster reputation information among nodes, thus implicates head. In request phase, if any node wants to access a less overhead. This scheme provides a distributed secure connection with any of the service providers reputation evaluation methodology that is (CH), it requests the trust value of all its neighboring implemented autonomously at every node in an ad hoc CHs. In trust evaluation phase, all the CHs will collect network with the objective of identifying and isolating the recommendation values from its member nodes and selfish neighbor nodes. aggregate the recommended values and issues the final trust value to the requesting node. The requesting node will establish its connection with the CH which has a Haidar Safa et al [14] presented a cluster-based trust highest final trust value. aware routing protocol (CBTRP) and it is a kind of reactive on-demand source routing protocol. To make sure safe routing path, the proposed CBTRP scheme 4. PROPOSED APPROACH first establishes the origin for a trusted environment by providing a trust based mechanism to differentiate 4.1 Overview trusted nodes from malicious ones. The trust value is Our proposed protocol, which is named “TWCBRP”, is a computed based upon the information that one node trust aware dual cluster head based routing protocol to can gather about the other nodes. Then, it organizes provide a secure and stable routing in MANET. Two the network into one-hop disjoint clusters, whereby cluster heads namely primary and secondary cluster every node elects the most qualified and trustworthy heads are elected in order to maintain route stability. node of its 1-hop neighbors to be its cluster-head. The primary objective is to isolate malicious and selfish Cluster members in CBTRP forward packets only nodes through trust computations of nodes for through the trusted cluster heads. Packets from providing a secure routing. malicious nodes are not processed and no packets will also be forwarded to them. a) Trust Computation of nodes in clusters (i) Direct trust computation: 439 Each node computes the direct trust value by analyzing Periodically, each mobile node broadcasts a HELLO the behavior of its neighbor nodes. That is, the packet to other nodes that lies within its transmission information on the subject of other nodes can be range to notify its presence and to discover its gathered by analyzing the forwarded, received and neighbors. Initially, before cluster formation, all the overheard packets. In TWCBRP, trust between two nodes may be in un_decided state. During cluster entities is represented by a 3-dimensional metric formation, when all nodes have discovered its opinion [14] as follows: neighbors, they exchange their weight values through HELLO packet. Therefore, the state of the node 𝑊𝐵𝐴 = (𝑏𝐵𝐴 , 𝑑𝐵𝐴 , 𝑢𝐵𝐴 ) …….. (1), such that changes either as cluster_head or as cluster_member. 𝑏𝐵𝐴 + 𝑑𝐵𝐴 + 𝑢𝐵𝐴 =1 A member node which lies within the transmission range of more than one cluster heads becomes a Where, 𝑊𝐵𝐴 denotes node A’s opinion about node B’s gateway node. The HELLO packet format is given in trustworthiness, in which, 𝑏𝐵𝐴 denotes the belief that A table-1. holds for B, 𝑑𝑏𝑎 denotes the disbelief that A holds for B, and 𝑢𝐵𝐴 denotes the uncertainty that A holds for B. In Table-1 Hello packet format our proposed protocol, a node monitors other node’s behavior using watch dog mechanism [19] to collect & Status of the node (0-undecided state/1-cluster head/ 2-cluster record all positive (P) and negative (N) events about member) their trustworthiness. Therefore, the opinion metrics of Node ID 𝑊𝐵𝐴 can be expressed as a function of P and N as follows: Weight value 𝑃 𝑁 Cluster Head’s Neighbor Table 𝑏𝐵𝐴 = ……(2) 𝑑𝐵𝐴 = ……….(3) Cluster Head’s Cluster Adjacency Table 𝑃+𝑁+2 𝑃+𝑁+2 2 𝑢𝐵𝐴 = ………(4) 𝑃+𝑁+2 Where, each of the belief, disbelief and uncertainty In our proposed TWCBRP protocol, primary and values may range between 0 and 1 inclusively. The secondary cluster heads are elected by computing the direct trust value of node B by node A is computed as weight values of the nodes. Each node computes its follows: own weight using the following weighting function which is based on [WCA], [SWDCBRP]: 𝐷𝑇𝑉𝐵𝐴 = 𝑏𝐵𝐴 ………(5) Wt (V) = (W1*LQ + W2*RS + W3*BW + W4*MV) ………………… (8), Every time the number of positive or negative events where, LQ is the link quality, RS is the residual energy, changes, the corresponding opinion values will be BW is the available bandwidth and MV is the mobility recalculated using equations 2,3, and 4 respectively. of the mobile node. A node with highest weight among the other nodes in its transmission range is elected as a primary CH. Similarly; a node having a second (ii) Indirect trust computation (ie., recommended highest weight is elected as a secondary CH. The trust) following ICF algorithm is used for cluster formation The indirect trust value (ie., recommended trust value) in the network. of node B by all its one-hop neighbors is computed as Algorithm-1: Initial Cluster Formation follows: 𝐷𝑇𝑉𝑖 𝐴𝑖 (ICF) algorithm 𝐼𝐷𝑇𝑉𝐵𝐴 =∑𝑁𝑖=1 𝐵 ……………….(6), where, N is /*At system initiation, let us assume that, each node A 𝑁 the number of one-hop neighbor nodes of B, 𝐼𝐷𝑇𝑉𝐵𝐴 is in MANET holds undecided state and opinion values as, the recommended trust value on B by all its one hop 𝑏𝐵𝐴 =0; 𝑑𝐵𝐴 = 0; 𝑢𝐵𝐴 =1; 𝐷𝑇𝑉𝐵𝐴 =0; 𝐼𝐷𝑇𝑉𝐵𝐴 = 0; neighbors ‘Ai’ based on their belief factors. Each node A maintains the weights of its one-hop neighbors and assume node A is invoking the (iii) Final trust computation algorithm*/ The FTV of a node be governed by both the direct Input: Set of nodes in MANET trust value and the indirect trust value. The α part of Output: Set of clusters DTV and β part of IDTV are used to calculate the FTV ICF( ) of a node B. It is computed as, Begin 𝐹𝑇𝑉 𝐵𝐴 =α * 𝐷𝑇𝑉𝐵𝐴 + β * 𝐼𝐷𝑇𝑉 𝐵𝐴 such that α+β = 1 Do { ………… (7), Find a node B with highest weight in its CH set (ie., where say B[i] where i=1 to N) Case-1: when, 𝐷𝑇𝑉𝐵𝐴 < 0.5, α = 0.5 and If (B==A) β =0.5. { if (PCH does not exist in the cluster) { Case-2: when, 𝐷𝑇𝑉𝐵𝐴 >=0.5, α =1 and β Node A elects itself as PCH; } =0. elseif (SCH does not exist in the cluster) { b) Selection of primary and secondary cluster heads Node A elects itself as SCH; } } 440 elseif ( (𝑢𝐵𝐴 >0.5) or (𝑏𝐵𝐴 >=0.5) or (𝑏𝐵𝐴 == 𝑑𝐵𝐴 ) ) //A in this table. This table is used during route discovery checks the opinion value of B { and data forwarding. The following table-4 describes if (( B is a cluster member or undecided) && (PCH the format of cluster adjacency table (CAT): does not exist in this cluster)){ B changes its status to PCH and accepts A as its Table-4 member } Cluster Adjacency Table elseif ( (B is a cluster member or undecided) && Cluster ID Gateway ID Entry update time (in sec) (SCH does not exist in this cluster) ) { (CID) (GID) B changes its status to SCH; A becomes member of this cluster; } CAT table is used to keep information about its elseif (B is a PCH of this cluster) { adjacent clusters. That is, a node records the ID of each A sends induced Join_Cluster message to B; of its adjacent CHs and the corresponding gateway node B sends an Accept_Join message to A; A becomes to reach it. This table is used during route discovery and a member of this cluster; } } data forwarding. elseif (𝑑𝐵𝐴 >=0.5) { Remove B from CH set and continue the loop. } 4.2 Cluster maintenance phase } while ((PCH Not Exists) or (SCH Not Exists)); End; Since, our MANET is vulnerable to attacks, the elected primary CH and secondary CH would become malicious The initial cluster formation (ICF) algorithm is or selfish and affect the network connectivity. In our described as follows. Each node computes its own TWCBRP protocol, at system initiation, cluster weight value using eqn-8 and broadcasts to its 1-hop formation is done through Initial Cluster Formation neighbors through hello packet. Similarly each node (ICF) algorithm with two trust aware cluster heads receives the weights of its one-hop neighbors and namely primary and secondary cluster heads. The inserts them in its neighbor table and forms a CH set. If secondary cluster head after being elected keeps itself a node A, has no interactions with its neighbor nodes B, in promiscuous mode and overhear the transactions of initially its belief (𝑏𝐵𝐴 ), disbelief(𝑑𝐵𝐴 ) and undecided PCH node. If forwarding ratio of PCH becomes lesser opinion values ( 𝑢𝐵𝐴 ) would be computed as 0, 0, 1 than dropping ratio, SCH triggers PCH node with a respectively using the eqns-2, 3, and 4. Each node A LIFE_DOWN message, to carry out the pending then finds a node B with highest weight in its CH set transactions of PCH by invoking CH_Change algorithm. and checks its opinion values of it. If its 𝑢𝐵𝐴 > threshold Similarly, if forwarding ratio of SCH becomes lesser or its 𝑏𝐵𝐴 ≥ threshold or its belief value (𝑏𝐵𝐴 ) == disbelief than dropping ratio, it sends a LIFE_DOWN message to value (𝑑𝐵𝐴 ), then node B will either become primary CH all its one-hop neighbors and invokes the CH_Change or secondary CH based on the need. If its ( 𝑑𝐵𝐴 ) ≥ algorithm to elect a new SCH node. The significance of threshold, then node B will be removed from A’s CH set. CH_Change algorithm is that, it involves only the set of The following table-2 describes the format of one-hop nodes that are within the cluster for local cluster heads neighbor table (1NT): updating and does not involve the entire nodes in the network for re-election process. Therefore, it Table-2 minimizes updating overhead during topological one-hop neighbor table change. The CH_Change algorithm is given below: Node Node Cluster Direct InDirect Final Entry Algorithm-2: Cluster Head (CH) change ID Status ID Trust Trust Trust update algorithm (CID) value Value Value time (in (DTV) (IDTV) (FTV) sec) // Let us consider Node A as SCH and Node B as PCH // Let us assume Node A is invoking the algorithm Each entry in one-hop neighbor table contains Input: SCH node information about a 1-hop neighbor and also used to Output: Change of cluster head record the opinion about each 1-hop neighboring node. CH_Change ( ) This table is used for cluster formation and route Begin discovery. The following table-3 describes the format //F-Forwarding ratio and D-Dropping ratio of two-hop neighbor table (2NT): If (node weight value of B < Th) or (F(B) < D(B)) then //here Node B is PCH Table-3 { Two-hop neighbor table SCH sends a LIFE_DOWN message to PCH to relinquish the role of PCH and to process its Node Node Next Hop Entry update time ( in sec) pending transactions and invokes Elect ( ) function to ID Status Node elect a new SCH; PCH joins the cluster as a cluster member; By examining the HELLO packets received from its } else neighbors, a node gathers information about its 2-hop If (node weight value of A < Th) or (F(A) < D(A)) then neighbors (ie., 2-cluster away nodes) and stores them //here Node A is SCH 441 { table (NT). If D is found in its 2-hop neighbor table and SCH sends a LIFE_DOWN message to all its member can be reached through more than one-hop neighbors, nodes and invokes Elect ( ) function; it chooses the one with the most recent } } EntryUpdateTime as the intermediate node [18]. If D is End; not found in its 1-hop and 2-hop NTs, it checks its route function Elect ( ) { cache (RC). Route cache is the storage space in each Do //here Node B is cluster members mobile node for storing recently discovered routes. If a { route to D is made available in its route cache, S simply Find a node B with highest weight in its neighbor uses the route to send the data packet to destination table (ie., say B[i] where i=1 to N) D. Otherwise; it floods a route request (RREQ) packet If ((node B is a cluster member or undecided) && to its neighbor nodes. An intermediate node (IM) after (𝐹𝑇𝑉𝐵𝐴 >=0.5)) { receiving the RREQ will decide how to process it based Node B changes its status to SCH and sends a on its cluster status and the information available in the HELLO message to its one-hop RREQ packet header. It is expressed as follows: neighbors; } elseif (𝐹𝑇𝑉𝐵𝐴 <0.5) { 1. If IM is a cluster member or with undecided status, Remove B from CH set and continue the loop. } it simply drops the RREQ packet. } while (SCH Not Exists); 2. If IM is a cluster gateway (CGW), it checks whether } it is listed as an entry in RREQ packet header. If no, it simply drops the packet. If yes, it unicasts the RREQ to the corresponding neighboring CH as a) Route discovery recorded in RREQ. 3. If IM is a CH, it appends its CID in the traversed Route discovery is a mechanism whereby a source node cluster address list and increases the NUM2 counter S wishing to send a packet to destination node D, it is by 1. If D is found to be a 2-hop neighbor, IM unicasts done through intermediate nodes. Route discovery in the RREQ to D based on its 2-hop neighbor table. TWCBRP is done through flooding RREQ packets only 4. Otherwise, for each neighboring cluster which is not with cluster heads and gateway nodes. However, in listed in neighboring CH list, IM records the CID of order to isolate malicious nodes from participating in neighboring CH and the corresponding gateway the network, their 1-hop neighbors will ignore all address to reach that cluster in RREQ, increment packets received from them, and will attempt to find a NUM1 counter by 1, and broadcasts to them. route that does not include intermediary misbehaving 5. If no such neighboring cluster is found, it drops nodes. For that, each node will keep itself in RREQ. promiscuous mode to record the transaction of its next 6. Before recording any node’s ID in RREQ packet, each hop node [18]. For every successful and unsuccessful node checks that the recorded entry does not have transaction, it updates its direct trust value and final 𝐹𝑇𝑉𝐵𝐴 <0.5. trust value respectively. Intra-cluster routing takes place when source node S and destination node D are The following table-5 shows the format of RREQ located within the same cluster. This can be identified packet. by PCH’s 1-hop neighbor table. Inter-cluster routing takes place when the source node S and the destination node D are not located in the same cluster. Therefore, Table 5 primary CH needs to involve gateway node for data and Route Request (RREQ) packet control packet transmission. A gateway node is a node that lies within the transmission range of both the Packet Num1 Num2 Identification clusters, and would become members of both clusters. Type Number Therefore, a powerful node should be appointed as a Destination address gateway node for maintaining network connectivity. In Gateway node address [1] our proposed TWCBRP protocol, among the nodes that lies in the common region of more than one clusters, a Neighboring cluster head address [1] node with highest weight and highest trust value (FTV) ……. is elected as a gateway node in order to improve Gateway node address [Num1] network connectivity. The elected gateway node will Neighboring cluster head address [Num1] act as a “trust guarantor” for the cluster heads that lies List of traversed cluster addresses [Num2] within its transmission range. b) Data forwarding mechanism in TWCBRP protocol Here, in the above table, PT indicates whether the packet type is RREQ or RREP packet. List of When source node S attempts to send a data packet to gateway nodes are used by CHs to forward RREQ the destination node D, it first checks its 1-hop packets to its one-hop away CHs. List of neighbor table (NT). If D is found, it sends the data neighboring CHs are used by gateway nodes to packet directly. Otherwise, S checks its 2-hop neighbor 442 forward the RREQ, and each CH appends its 4.3 Simulation Results addresses in the traversed cluster address list field in the RREQ packet during route request a) Simulation Model and Parameters propagation. The identification field is used to The Network Simulator (NS-2) is used to simulate the match the route request packet with the proposed architecture. In the simulation, mobile nodes correspondent route reply packet. Num1 and Num2 are randomly deployed in 750 meter x 750 meter region indicates hop counts for neighbor cluster head and for 50 seconds of simulation time. All nodes have the gateway pairs and targeted cluster address list same transmission range of 250 meters. The simulated respectively. The following table-6 shows the traffic is Constant Bit Rate (CBR). The simulation format of RREP packet. settings and parameters are summarized below: Table 6 Number of Nodes: 100 to 500; Node Speed: 5 m/s to 25 Route Reply (RREP) packet m/s; Area Size: 750 X 750 m; Mac: IEEE 802.11; Packet Num1 Num2 Identification Transmission Range: 20m; Simulation Time: 50 Sec; Type Number Traffic Source: CBR; Number of CBR connections: 10; List of traversed cluster addresses [Num1] Packet Size: 512; Rate: 50 kb; Initial Energy: 20 Joules; List of CH addresses in calculated route Transmission Power: 0.660; Receiving Power: 0.395. [Num2] b) Performance Metrics In the above table, PT indicates whether the The proposed TWCBRP is compared with the CBPMD packet type is RREQ or RREP. List of addresses in protocol [16]. The performance is evaluated mainly, calculated route is used to reach the RREQ of according to the following metrics. Packet Delivery source node. The identification number is copied Ratio is the ratio between the number of packets from the RREQ packet in order to match with it. received and the number of packets sent. Packet Drop refers the average number of packets dropped during The actual routing is done like the way that the the transmission. Delay is the average end-to-end delay traditional on-demand source routing protocol such measured in seconds. Energy Consumption is the as AODV does. That is, each intermediate node in amount of energy consumed by the nodes to transmit the underlined data packet forwards it to the next the data packets to the receiver. Throughput is the specified address until the destination node is average number of packets received per second. reached. However, the significance of TWCBRP protocol is that it does not allows malicious and c) Results selfish nodes (𝐹𝑇𝑉𝐵𝐴 <0.5) to forward neither RREQ A. Based on Nodes: In our first experiment we nor RREP packets. vary the number of nodes as 100,200,300,400 and 500. c) Node movement Node movement in XYZ protocol is shown with Table 7 the following algorithm. Simulation Results Input: Node A in mobility Output: Node A joins/leaves the cluster Nodes Delay Delivery Ratio Energy Throughput Begin CBPMD TWCBRP CBPMD TWCBRP CBPMD TWCBRP CBPMD TWCBRP If(node A is a leaving node from cluster) { 100 7.558292 0.126717 0.72323 0.996462 12.57041 16.48706 5302 8730 Find the status of Node A; 200 10.11672 0.380857 0.777793 0.991782 15.30881 17.60048 5702 8689 If (moving node A is a PCH or SCH) { 300 16.45621 1.214569 0.549038 0.97466 14.53496 18.12165 4025 8539 Invoke CH_Change algorithm; } 400 13.61595 2.8902 0.141591 0.938591 11.88331 18.0135 1038 8223 Else if (moving node A is a cluster member) { 500 12.85457 0.788641 0.182547 0.983449 13.84155 17.81934 3008 8616 No change takes place in the cluster structure; and no need of re-election. } } Else if (Node A is a joining node into the cluster) { Node A sends a JOIN_REQUEST message to PCH node; Upon the receipt of ACCEPT_JOIN message from its PCH node, it joins the cluster as a member node. } End; Figure 1: Nodes Vs Delay 443 Figure 7 shows the delay of TWCBRP and CBPMD than the existing CBPMD technique, for nodes 400 the techniques for different nodes scenario. We can see residual energy of TWCBRP is 34.03% higher than the that, for nodes 100, the delay of TWCBRP is 98.32% existing CBPMD technique, for nodes 500 the residual lower than the existing CBPMD technique, for nodes 200 energy of TWCBRP is 22.32% higher than the existing the delay of TWCBRP is 96.23% lower than the existing CBPMD technique. In over all we can conclude that the CBPMD technique, for nodes 300 the delay of TWCBRP residual energy of CBPMD approach has 23% of higher is 92.61% lower than the existing CBPMD technique, for than CBPMD approach. nodes 400 the delay of TWCBRP is 78.77% lower than the existing CBPMD technique, for nodes 500 the delay of TWCBRP is 93.86% lower than the existing CBPMD technique. In over all we can conclude that the delay of our proposed CBPMD approach has 92% of lower than CBPMD approach. Figure 3: Nodes Vs Throughput Figure 10 shows the throughput of TWCBRP and CBPMD techniques for different nodes scenario. We can see that, for nodes 100, the throughput of TWCBRP is 39.26% higher than the existing CBPMD technique, for Figure 2: Nodes Vs Delivery Ratio nodes 200 the throughput of TWCBRP is 34.37% higher than the existing CBPMD technique, for nodes 300 the Figure 8 shows the delivery ratio of TWCBRP and CBPMD throughput of TWCBRP is 52.86% higher than the techniques for different nodes scenario. We can see existing CBPMD technique, for nodes 400 the that, for nodes 100, the delivery ratio of TWCBRP is throughput of TWCBRP is 87.37% higher than the 27.42% higher than the existing CBPMD technique, for existing CBPMD technique, for nodes 500 the nodes 200 the delivery ratio of TWCBRP is 21.57% higher throughput of TWCBRP is 65.08% higher than the than the existing CBPMD technique, for nodes 300 the existing CBPMD technique. In over all we can conclude delivery ratio of TWCBRP is 43.66% higher than the that the throughput of our proposed TWCBRP approach existing CBPMD technique, for nodes 400 the delivery has 56% of higher than CBPMD approach. ratio of TWCBRP is 84.91% higher than the existing CBPMD technique, for nodes 500 the delivery ratio of TWCBRP is 81.43% higher than the existing CBPMD technique. In over all we can conclude that the delivery 5. Conclusion ratio of CBPMD approach has 52% of higher than CBPMD In this paper, we have proposed a trust sensitive approach. weighted dual cluster head based routing protocol which ensures secured routing and enhances connectivity in MANET. Since malicious and selfish nodes are isolated from the routing path, this guarantees secured and trusted path from source to destination. Moreover, with primary and secondary cluster heads, the stability of the routing path as well as the stability of the cluster structure is also guaranteed. References Figure 4: Nodes Vs Residual Energy [1] Udhayavani, M., and M. Chandrasekaran. "Design of TAREEN (trust aware routing with energy efficient Figure 9 shows the residual energy of TWCBRP and network) and enactment of TARF: a trust-aware routing CBPMD techniques for different nodes scenario. We can framework for wireless sensor networks." Cluster see that, for nodes 100, the residual energy of TWCBRP Computing (Springer) 22.5 (2019): 11919-11927. is 23.75% higher than the existing CBPMD technique, for nodes 200 the residual energy of TWCBRP is 13.02% [2] Priya, I. Leela, S. Lalitha, and P. Victer Paul. higher than the existing CBPMD technique, for nodes "ENERGY EFFICIENT ROUTING MODELS IN WIRELESS 300 the residual energy of TWCBRP is 19.79% higher 444 SENSOR NETWORKS-A RECENT TREND SURVEY." International Journal of Pure and Applied Mathematics 118.16 (2018): 443-458. [3] Ahmed, Adnan, et al. "A trust aware routing protocol for energy constrained wireless sensor network." Telecommunication Systems 61.1 (2016): 123-140. [4] Revathi, S., and T. R. Rangaswamy. "Secure Route Discovery using Opinion Based Method in MANET." International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501, Vol.5, No.1, February 2015. [5] Aruna, S, and A. Subramani. "Weighted Double Cluster Head Based Approach for Enhancing Route Stability in MANETS." Asian Journal of Information Technology 13.11 (2014): 725-732. [6] Paramasivan, B., and M. Kaliappan. "Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks", The Scientific World Journal (2014). [7] Aruna, S, and Dr. A. Subramani. "Comparative Study of Weighted Clustering Algorithms for Mobile Ad Hoc Networks." International Journal of Emerging Technology and Advanced Engineering 4 (2014): 307- 311. [8] Jichkar, Mr Rahul A., and M. B. Chandak, "Application of Indirect Trust Computation in MANET", International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 3, March 2014. [9] Venkanna, U., and R. Leela Velusamy. "TEA-CBRP: Distributed cluster head election in MANET by using AHP." Peer-to-Peer Networking and Applications (2014): 1-12. [10] Maleknasab, Mehdi, Moazam Bidaki, and Ali Harounabadi. "Trust-based clustering in mobile ad hoc networks: Challenges and issues", International Journal of Security and Its Applications 7.5 (2013): 321-342.