Implementation of a Regression-based Trust Model in a Wireless Ad hoc Testbed

  • Revathi Venkataraman SRM University, Kattankulathur
  • Pushpalatha M SRM University, Kattankulathur
  • T Rama Rao SRM University, Kattankulathur
Keywords: Ad hoc on demand distance vector, optimised link state routing, vector auto regression trust, econometric trust model


Wireless ad hoc networks are resource constraint and vulnerable to various security attacks. Trust based security modelling go hand in hand with cryptographic services to offer good security services. We have implemented a vector auto regression (VAR) based trust model over ad hoc on demand distance vector protocol and optimised link state routing protocol. The novelty in this model lies in  capturing individual functional behaviours of a neighbour in an ad hoc network and modeling them as regression parameters. The experimental results show the feasibility of implementing trust models over real ad hoc network deployments. The simulations results show that the proposed VAR trust model offers better performance compared to the existing trust models.

Defence Science Journal, 2012, 62(1), pp.167-173, DOI:

Author Biographies

Revathi Venkataraman, SRM University, Kattankulathur
Ms Revathi Venkataraman is pursuing her PhD. Currently working as Assistant Professor in the Department of Computer Science and Engineering, SRM University. Her other research interests are wireless ad hoc and sensor network testbed developments which are ongoing research activities funded by Indian Government. Her research interests include wireless networks and security, trust computing and routing in ad hoc networks.
T Rama Rao, SRM University, Kattankulathur
Dr T. Rama Rao received his PhD from Sri Venkateswara University, Tirupati, India in the year 2000. Currently, working as ‘Professor & Head’, Department of Telecommunication Engineering, Faculty of Engineering & Technology, SRM University, India. His research interests include: Radio channel measurements and modeling, broadband wireless communications/networks and wireless information networks.


Sivaram Murthy, C. & Manoj, B.S. Ad hoc wireless networks. Pearson Education, 2001. 20 p.

Butty´an, L. & Hubaux, J.P. Security and co-operation in wireless networks. Cambridge University Press, 2007. 30 p.

Pirzada, A.A.; Datta, A. & McDonald, C. Incorporating trust and reputation in DSR protocol for dependable routing. Computer Communications, 2006, 29(15), 2806-21.

Yu, M.; Zhou, M. & Su, W. A secure routing protocol against Byzantine Attacks for MANETs in adversarial environments. IEEE Trans. Veh. Technol., 2009, 58(1), 449-60.

Velloso, P.B.; Laufer, R.P.; Cunha, D.O.; Duarte, O.C.M.B. & Pujolle, G. Trust management in mobile ad hoc networks using a scalable maturity-based model. IEEE Trans. Netw. Serv. Management., 2010, 7(3), 172-85.

Theodorakopoulos, G. & Baras, J.S. On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun., 2006, 24(2), 318–28.

Zapata, M.G. Secure ad hoc on-demand distance vector routing. ACM Mobile Comput. Commun. Rev., 2002, 6(3), 106-07.

Papadimitratos, P. & Haas, Z.J. Secure link state routing for mobile ad hoc networks. In Proceedings of the IEEE CS Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, Jan 2003. pp. 379-83.

Papadimitratos, P. & Haas, Z.J. Secure data communication in mobile ad hoc networks. IEEE J. Sel. Areas Commun., 2006, 24(2), 343-56.

Conti, M. & Giordano, S. Multihop ad hoc networking: The reality. IEEE Commun. Mag., 2007, 45(4), 88-95.

Burbank, J.L.; Chimento, P.F.; Haberman, B.K. & Kasch, W.T. Key Challenges of military tactical networking and the elusive promise of MANET technology. IEEE Commun. Mag., 2006, 44(11), 39-45.

Chang, B.-J. & Kuo, S.-J. Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs. IEEE Trans. Veh. Technol., 2009, 58(4), 1846-863.

Perrig, A.; Szewczyk, R.; Wen, V.; Culler, D. & Tygar, J. SPINS: Security protocols for sensor networks. In Proceedings of ACM Mobile Computing and Networking (MobiCom), Rome, Italy, 2001. pp. 189-99.

Zhu, S.; Setia, S. & Jajodia, S. LEAP: Efficient security mechanisms for large scale distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security, New York, 2003. pp. 62-72.

Boukerch, A.; Xu, L. & El-Khatib, K. Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 2007, 30(11-12), 2413-427.

Bedi, P.; Sinha, A.K.; Agarwal, S.; Awasthi, A.; Prasad, G. & Saini, D. Influence of terrain on modern tactical combat: Trust-based recommender system. Def. Sci. J., 2010, 60(4), 405-11.

Wang, K. & Wu, M. Co-operative communications based on trust model for mobile ad hoc networks. IET Inf. Secur., 2010, 4(2), 68-79.

Biller, B. & Nelson, B.L. Modeling and Generating Multivariate Time-series input processes using a vector autoregressive technique. ACM Trans. on Model. Comput. Simul. 2003, 13(3), 211-37.

Gujarati, D.N. Basic econometrics, McGraw-Hill/Irvin, 2003. 302 p.

Uppsala University, [Accessed on 16 January 2012].

How to Cite
Venkataraman, R., M, P., & Rama Rao, T. (2012). Implementation of a Regression-based Trust Model in a Wireless Ad hoc Testbed. Defence Science Journal, 62(3), 167-173.
Computers & Systems Studies