{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:56:57Z","timestamp":1760241417589,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T00:00:00Z","timestamp":1517788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Due to the dynamism of topology, sharing of bandwidth and constraint of resources in wireless nodes, the provision of quality of service (QoS) for routing in mobile ad hoc networks (MANETs) presents a great challenge. Security is another crucial aspect of providing QoS since the existence of malicious nodes present all kinds of threats to MANETs. Although a number of mechanisms have been proposed for protecting MANETs, most of the solutions are only effective for a particular kind of attacks or provide security at the cost of sacrificing QoS. In this paper, we propose a trust-based secure QoS routing scheme by combining social and QoS trust. The primary approach of the proposed scheme relies on mitigating nodes that exhibit various packet forwarding misbehavior and on discovering the path that ensures reliable communication through the trust mechanism. The scheme would select the best forwarding node based on packet forwarding behavior as well as capability in terms of QoS parameters, such as residual energy, channel quality, link quality, etc. We will present an adversary model for packet dropping attack against which we evaluate the proposed scheme. Simulation experiment using Network Simulator-2 (NS2) and under various network conditions show that mixing social and QoS trust parameters can greatly improve security and quality of service routing in terms of overhead, packet delivery ratio and energy consumption.<\/jats:p>","DOI":"10.3390\/fi10020016","type":"journal-article","created":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T04:29:42Z","timestamp":1517804982000},"page":"16","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0210-3121","authenticated-orcid":false,"given":"Muhammad","family":"Pathan","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Nafei","family":"Zhu","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Jingsha","family":"He","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Zulfiqar","family":"Zardari","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Muhammad","family":"Memon","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Muhammad","family":"Hussain","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,2,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.procs.2015.03.230","article-title":"Energy Optimization in MANETs Using On-demand Routing Protocol","volume":"47","author":"Sumathi","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"928","DOI":"10.1109\/ACCESS.2016.2538269","article-title":"Energy Efficiency Optimization for Mobile Ad Hoc Networks","volume":"4","author":"Kuo","year":"2016","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Hinge, R., and Dubey, J. (2016, January 4\u20135). Opinion based trusted AODV routing protocol for MANET. Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (ICTCS), Udaipur, India.","DOI":"10.1145\/2905055.2905342"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1007\/s11277-014-2165-5","article-title":"Cooperative Routing for MANET Based on Distributed Trust and Energy Management","volume":"81","author":"Venkanna","year":"2015","journal-title":"Wirel. Pers. Commun."},{"key":"ref_5","unstructured":"Malathi, M., and Jayashri, S. (2016). Robust against route failure using power proficient reliable routing in MANET. AEJ J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.procs.2015.05.068","article-title":"Emergent Intelligence Based QoS Routing in MANET","volume":"52","author":"Chavhan","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_7","unstructured":"Gite, P., Kanellopoulos, D., and Choukse, D. An extended AODV routing protocol for secure MANETs based on node trust values. Int. J. Int. Tech. Secur. Trans., in press."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Koul, A., and Kaur, H. (2017, January 25\u201327). Quality of Service Oriented Secure Routing Model for Mobile Ad hoc Networks. Proceedings of the International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence, Hong Kong, China.","DOI":"10.1145\/3059336.3059338"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Zafar, S., and Soni, M.K. (2014, January 6\u20138). Trust based QOS protocol (TBQP) using meta-heuristic genetic algorithm for optimizing and securing MANET. Proceedings of the International Conference on Reliability Optimization and Information Technology, Faridabad, India.","DOI":"10.1109\/ICROIT.2014.6798315"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Shah, S.N., and Jhaveri, R.H. (2016, January 21\u201323). A trust-based scheme against Packet dropping attacks in MANETs. Proceedings of the 2nd International Conference on Applied and Theoretical Computing and Communication Technology, Banglore, India.","DOI":"10.1109\/ICATCCT.2016.7911967"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Ortiz, J.H., and de la Cruz, A.P. (2017). A Composite Trust Model for Secure Routing in Mobile Ad-Hoc Networks. Ad Hoc Netw., InTech.","DOI":"10.5772\/62746"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.adhoc.2017.05.007","article-title":"Multi-constraints link stable multicast routing protocol in MANETs","volume":"63","author":"Singal","year":"2017","journal-title":"Ad Hoc Netw."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Jhaveri, R.H., and Patel, N.M. (2017). Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. IJCS, 30.","DOI":"10.1002\/dac.3148"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.adhoc.2015.08.020","article-title":"A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks","volume":"37","author":"Sarkar","year":"2016","journal-title":"Ad Hoc Netw."},{"key":"ref_15","first-page":"116","article-title":"A Novel QoS Trust Computation in MANETs Using Fuzzy Petri Nets","volume":"10","author":"Sirisala","year":"2016","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Khamayseh, Y.M., Aljawarneh, S.A., and Asaad, A.E. (2017). Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustain. Comput. Inform. Syst., in press.","DOI":"10.1016\/j.suscom.2017.07.001"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1007\/s11276-016-1284-1","article-title":"Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET","volume":"23","author":"Sethuraman","year":"2017","journal-title":"Wirel. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.jksuci.2016.03.004","article-title":"Flooding Factor based Trust Management Framework for secure data transmission in MANETs","volume":"29","author":"Ahmed","year":"2017","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"243985","DOI":"10.1155\/2010\/243985","article-title":"Efficient Certification Path Discovery for MANET","volume":"2010","author":"Kambourakis","year":"2010","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.procs.2016.07.334","article-title":"Trust Based Certificate Revocation for Secure Routing in MANET","volume":"92","author":"Rajkumar","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.adhoc.2016.02.014","article-title":"Trust threshold based public key management in mobile ad hoc networks","volume":"44","author":"Cho","year":"2016","journal-title":"Ad Hoc Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2781","DOI":"10.1007\/s11276-015-0945-9","article-title":"A Sequence Number Based Bait Detection Scheme to Thwart Grayhole Attack in Mobile Ad Hoc Networks","volume":"21","author":"Jhaveri","year":"2015","journal-title":"Wirel. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2096","DOI":"10.1016\/j.adhoc.2012.02.009","article-title":"Trust prediction and trust-based source routing in mobile ad hoc networks","volume":"11","author":"Xia","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1611","DOI":"10.1007\/s11277-015-3010-1","article-title":"A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET","volume":"86","author":"Mylsamy","year":"2016","journal-title":"Wirel. Pers. Commun."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/2\/16\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:53:47Z","timestamp":1760194427000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/2\/16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,5]]},"references-count":24,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,2]]}},"alternative-id":["fi10020016"],"URL":"https:\/\/doi.org\/10.3390\/fi10020016","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2018,2,5]]}}}