1 AOMDV Based TRIUMF implementation and performance evaluation Ahmed M. Abd El-Haleem Assistant Lecture Faculty of Engineering Helwan University, Helwan, Egypt ahmed_abdelkhaliq@h- eng.helwan.edu.eg Ihab A. Ali Associate Professor Faculty Engineering Helwan University, Helwan, Egypt ehab_ali02@h-eng.helwan.edu.eg Ibrahim I. Ibrahim Professor Faculty of Engineering Helwan University, Helwan, Egypt ibrahim_ibrahim02@h- eng.helwan.edu.eg Abstract -- In Mobile ad-hoc networks, nodes must cooperate to achieve the routing functions. Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding the most efficient path. A Trust-Based Routing Protocol with controlled degree of Selfishness for Securing MANET against Packet Dropping Attack (TRIUMF) protocol has been proposed in [1]. The protocol uses an incentive mechanism for selfish node to declare its selfishness behavior and also use two node-disjoint routes to reduce the malicious searching time. In this paper, we discuss the real implementation of TRIUMF protocol based on the Ad hoc On demand Multipath Distance Vector (AOMDV) routing protocol. Also we study the performance of the proposed TRIUMF protocol compares with the AODV protocol based on simulation. We study those protocols under varying metrics such as node mobility, number of misbehaving node, number of selfish nodes, and with varying traffic rates. We have found that, in a network where up to 40% of the nodes may be misbehaving, the TRIUMF scheme results in 45% improvement in packet delivery ratio, with a reasonable additional routing overhead and end-to-end delay. Due to the successful separation between selfish and malicious nodes, and if some of the misbehaving nodes are selfish, the TRIUMF scheme results in increasing the packet delivery ratio improvement to 75%, with decreasing the additional routing overhead by 34% and with no change in end-to-end delay. Keyword-- MANET simulation, Trust-Based routing Performance evaluation, Ad Hoc Network, Secure Routing Protocol, network security. I. INTRODUCTION A wireless Ad Hoc network is a multi-hop self-organized mobile network where nodes exchange data without the need for an underlying infrastructure. Each node of this network has the function of terminal and router. Some packets can be delivered from a source node to a destination node by way of various intermediate nodes, thereby maintaining network connectivity and applicability of MANET depends heavily on cooperation between nodes in such a dynamic environment. Due to openness of MANET and using of wireless channel a misbehaving (selfish/malicious) nodes are more likely to appear. Selfish nodes are characterized by their reluctance to spending resources to cooperate on its behalf. Malicious nodes always attack the network's availability through common techniques such as flooding, black hole and denial of service (DoS) [2]. Because of the difficulties in MANET such as dynamic network topology and constraint battery resources, security solutions that have been deployed for wired networks are not directly portable to ad hoc networks. Various techniques have been proposed to prevent misbehavior in MANETs. As described in [3], [4], these schemes can be broadly classified into security-based schemes [5], [6], [7], [8] uses cryptographic tools to protect the core routing protocol signaling packets which in turn protecting the data that flows, and reputation-based schemes [9], [10] where nodes detect, and then declare another node to be misbehaving to being avoided in all future routes. Trust based routing protocols consist of two parts: a routing part and a trust model, for a survey see [11]. Routing decisions are made according to the trust model. The trust routing protocols have to be able to identify trustworthy nodes and find a reliable and trustworthy route from sender to destination node. Packet Dropping Attack or denial of service attacks has greatest impact on Ad hoc network [12], [13]. In DoS attack the malicious node tends to threaten network throughput through the use of packet dropping attack. This kind of attack could be even worse when supported by the malicious node sending link–layer acknowledgements to neighbor nodes to delay the detection of the attack and hence further decrease the throughput. We propose a protocol called a Trust-based RoutIng protocol with controlled degree of selFishness for secUring MANET against packet dropping attack (TRIUMF) [1], this protocol allows monitoring, detecting, and isolating of malicious node, with allowing a controlled degree of node selfishness behavior to give an