Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 452362, 9 pages
http://dx.doi.org/10.1155/2014/452362
Research Article

Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

1Dayananda Sagar College of Engineering, Bangalore 560078, India
2Sona College of Technology, Salem 636005, India

Received 14 March 2014; Revised 7 July 2014; Accepted 9 July 2014; Published 28 August 2014

Academic Editor: Fei Yu

Copyright © 2014 Anitha Vijaya Kumar and Akilandeswari Jeyapal. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Papadimitratos and Z. J. Haas, “Secure data communication in mobile ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 343–356, 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. D. B. Johnson, D. A. Maltz, Y. Chu, and J. G. Jetcheva, “The dynamic source routing protocol for mobile ad hoc networks (DSR),” InternetDraft, February 2002. View at Google Scholar
  3. F. A. M. Masoud, S. A. Shaar, A. Murad, and G. Kanaan, “Enhanced routing re-construction method for the associativity based routing protocol for mobile AD Hoc network (MANET),” The American Journal of Computer Science, vol. 2, no. 12, pp. 853–858, 2006. View at Publisher · View at Google Scholar
  4. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An on-demand secure routing protocol resilient to byzantine failures,” in Proceedings of the ACM Workshop on Wireless Security, pp. 21–30, September 2002. View at Scopus
  5. Z. J. Haas and M. R. Pearlman, “The performance of query control schemes for the zone routing protocol,” IEEE/ACM Transactions on Networking, vol. 9, no. 4, pp. 427–438, 2001. View at Publisher · View at Google Scholar · View at Scopus
  6. A. V. Kumar, A. Jeyapal, and R. Gowda, “FPGA implementation of enhanced ABR protocol with auto defense towards malicious node in MANETs,” Internal Security, pp. 137–154, 2012. View at Google Scholar
  7. J.-H. Cho, A. Swami, and I.-R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Communications Surveys and Tutorials, vol. 13, no. 4, pp. 562–583, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Cheng, C. Huang, and W. Shi, “Trusted dynamic source routing protocol,” in Proceedings of the IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '07), pp. 1632–1636, Athens, Greece, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. M. G. Zapata and N. Asokan, “Secure Ad hoc on-demand distance vector routing,” ACM Mobile Computing and Communications Review, vol. 3, no. 6, pp. 106–107, July 2002. View at Google Scholar
  10. Q. Zeng and Z. Yang, “An approach integrating simulation and Q-learning algorithm for operation scheduling in container terminals,” Journal of the Eastern Asia Society for Transportation Studies, vol. 8, pp. 2225–2239, 2010. View at Google Scholar
  11. D. Kim and S. Park, “Reinforcement learning-based dynamic adaptation planning method for architecture-based self-managed software,” in Proceedings of the ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS '09), pp. 76–85, Vancouver, Canada, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. C. K. Toh, “Associativity-based routing for Ad-Hoc mobile networks,” Wireless Personal Communications, vol. 4, no. 2, pp. 103–139, 1997. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Choi and D. Park, “Associativity based clustering and query stride for on-demand routing protocols in ad hoc networks,” Journal of Communications and Networks, vol. 4, no. 1, pp. 4–13, 2002. View at Google Scholar · View at Scopus
  14. D. Kim, Y. Choi, and C.-K. Toh, “Location-aware long-lived route selection in wireless ad hoc network,” in Proceedings of the 52nd Vehicular Technology Conference on IEEE-VTS Fall (VTC '00), vol. 4, pp. 1914–1919, 2000.
  15. K. Govindan and P. Mohapatra, “Trust computations and trust dynamics in mobile adhoc networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 279–298, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. O. Mistry, A. Gürsel, and S. Sen, “Comparing trust mechanisms for monitoring aggregator nodes in sensor networks,” in Proceedings of the 8th International Conference on Autonomous Agents and multiagent Systems, 2009.
  17. T. Haniotakis, S. Tragoudas, and C. Kalapodas, “Security enhancement through multiple path transmission in ad hoc networks,” in Proceedings of the IEEE International Conference on Communications, pp. 4187–4191, June 2004. View at Scopus
  18. K. A. Yau, P. Komisarczuk, and P. D. Teal, “Reinforcement learning for context awareness and intelligence in wireless networks: review, new features and open issues,” Journal of Network and Computer Applications, vol. 35, no. 1, pp. 253–267, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. D. Kumar, D. B. Ojha, and A. Kumar, “Securing MANETs by Q routing protocol,” International Journal of Engineering Research and Applications, vol. 2, no. 6, pp. 884–889, 2012. View at Google Scholar
  20. J. Dowling, E. Curran, R. Cunningham, and V. Cahill, “Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing,” IEEE Transactions on Systems, Man, and Cybernetics A:Systems and Humans., vol. 35, no. 3, pp. 360–372, 2005. View at Publisher · View at Google Scholar · View at Scopus
  21. K. Doya, K. Samejima, K. Katagiri, and M. Kawato, “Multiple model-based reinforcement learning,” Neural Computation, vol. 14, no. 6, pp. 1347–1369, 2002. View at Publisher · View at Google Scholar · View at Scopus
  22. A. Montresor, H. Meling, and O. Babaoglu, “Toward self-organizing, self-repairing, and resilient distributed systems,” in Future Directions in Distributed Computing, vol. 2584 of Lecture Notes in Computer Science, pp. 119–123, 2003. View at Publisher · View at Google Scholar
  23. S. Chettibi and S. Chikhi, “Adaptive maximum-lifetime routing in mobile ad-hoc networks using temporal difference reinforcement learning,” Evolving Systems, vol. 5, no. 2, pp. 89–108, 2014. View at Publisher · View at Google Scholar
  24. P. Rama Kishore, “Multiple trust in trust-based on-demand routing in mobile ad hoc networks,” International Journal on Advanced Computer Engineering and Communication Technology, vol. 1, no. 2, 2012. View at Google Scholar
  25. P. Gera, K. Garg, and M. Misra, “Trust-based multi-path routing for enhancing data security in MANETs,” International Journal of Network Security, vol. 16, no. 2, pp. 102–111, 2014. View at Google Scholar
  26. D. Marconett, M. Lee, X. Ye, R. Vemuri, and S. J. B. Yoo, “Self-adapting protocol tuning for multi-hop wireless networks using Q-learning,” International Journal of Network Management, vol. 23, no. 2, pp. 119–136, 2013. View at Publisher · View at Google Scholar · View at Scopus