ELRP: A Trust and IDS-Integrated Opportunistic Routing Protocol for MANETs with NS2-Based Evaluation

Abstract

Mobile Ad Hoc Networks (MANETs) are widely used in diverse situations where secure communication and reliability are necessary. MANETs without a centralized infrastructure are prone to various security threats. This paper presents an Enhanced Lightweight Trusted Routing Protocol (ELRP) to ensure secure connectivity and reliability in MANETs. The primary goal of ELRP is to prevent the inclusion of malicious hosts in the route and reliably convey data. Trust metrics provide secure communication by leveraging quality of service parameters to optimize trust computation. Opportunistic routing enhances data reliability and consistency. It allows each node to choose an intermediate node dynamically based on trust levels. Depending on the trust factor, ELRP enables nodes to select the forwarder at runtime. ELRP features an Intrusion Detection System (IDS) designed to recognize and mitigate black and grey hole attacks. ELRP is scalable as it uses local information and does not consume computational resources. Simulations conducted in NS2 demonstrate that ELRP improves throughput by approximately 22%, increases packet delivery ratio by 14.4%, and reduces end-to-end delay by 37.1% compared to standard AODV under malicious attack scenarios.

Author Biography

Jidong Zhang, School of Information Engineering, Zhengzhou College of Finance and Economics, Zhengzhou 450053, China

Jidong ZHANG obtained a master's degree in 2008. He is an associate professor at the School of Information Engineering, Zhengzhou University of Finance and Economics. His main research interest is computer science and technology.

Authors

  • Jidong Zhang School of Information Engineering, Zhengzhou College of Finance and Economics, Zhengzhou 450053, China

DOI:

https://doi.org/10.31449/inf.v49i37.12267

Downloads

Published

12/25/2025

How to Cite

Zhang, J. (2025). ELRP: A Trust and IDS-Integrated Opportunistic Routing Protocol for MANETs with NS2-Based Evaluation. Informatica, 49(37). https://doi.org/10.31449/inf.v49i37.12267