Skip to main content

Advertisement

Log in

Defending against false data attacks in 3D grid-based MANET using soft computing approaches

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Quality of service (QoS) is one of the major factors for current applications in mobile ad hoc networks (MANET). Due to the limited wireless link capabilities, a path with heavy load will lost battery within short period of time and maximizes the possibility of path disconnection and packet drops. Hence, optimal path is necessary to increase residual energy of the node. Dual CHs are selected by mobile node energy level, distance and expected relative mobility. The dual CH selection considers the residual energy of nodes, average distance to neighbors and number of neighbor nodes. Previously proposed multipath routing techniques reduce network traffic among multiple routes paths instead of sending packets via only one path. There are two research issues are still arisen in multipath routing that are packet redundancy and quality. We address these issues in the proposed optimal routing paradigm where the best path is selected instead of routing among all available paths. We propose hybrid routing scheme that combines type 2 fuzzy logic system to find available paths from source to the destination node and particle swarm optimization to identify a best path among the selected paths. Due to the lack of central monitoring system in MANET, security breach called false data injection attack may occur. To reveal this task, false data predicted on the source digital signature by upcoming cluster member. We implement our proposed approach in 3D grid-based MANET environment using NS3.26. We also compare our proposed approach performance with the conventional 2D routing schemes. Finally, the proposed approach shows higher QoS than others.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Abbreviations

\( T_{\text{MN}} \) :

Sum of mobile nodes in network

R :

Population of PSO algorithm

\( k_{\text{opt}} \) :

The number of optimal clusters in each round

\( T_{\text{L - I}}^{n} ,T_{\text{L - II}}^{n} \) :

Energy threshold for selecting CHs

\( p \) :

Random prime value

\( a,b \) :

Integers

\( {\mathcal{F}} \) :

Finite field

\( H_{\text{f}} \) :

Hash function

\( D_{m} \) :

Euclidean distance

\( {\text{rm}}_{i,j}^{t} \) :

The relative mobility of the node \( n_{j} \) at instant t

\( \varepsilon \left( t \right) \) :

Remaining energy

\( \beta_{1} \), \( \beta_{2} \) :

Weighting coefficients

\( \alpha_{1} ,\alpha_{2} ,\alpha_{3} \) :

Random integers

\( F_{1} ,F_{2} \) :

Learning factors

\( \mu ,\tau \) :

Random numbers between 0 and 1

V, X :

Particle velocity and position, respectively

\( P_{\text{ID}} \) :

Best particle position

\( P_{\text{GD}} \) :

Global best particle position

\( \omega \) :

Inertia weight

\( f\left( i \right) \) :

Fitness function

TA:

Trusted authority

\( {\text{Pu}}_{k} \) :

Public key

\( {\text{Pi}}_{k} \) :

Private key

DS:

Digital signature

References

  • Abarghouei BE, Farokhtala A, Alizadeh M (2015) DNACK: false data detection based on negative acknowledgement and digital signature on mobile ad hoc network. Wirel Pers Commun 83:1–15

    Article  Google Scholar 

  • Aluvala S, Sekhar KR, Vodnala D (2016) A novel technique for node authentication in mobile ad hoc networks. Perspect Sci 8:680–682

    Article  Google Scholar 

  • Bhanumathi V, Dhanasekaran R (2015) Efficient data transfer in mobile ad hoc network using OPSM for disaster response applications. J Appl Res Technol 13:392–401

    Article  Google Scholar 

  • Bisen D, Sharma S (2018a) An enhanced performance through agent-based secure approach for mobile ad hoc networks. Int J Electron 105(1):1–22

    Article  Google Scholar 

  • Bisen D, Sharma S (2018b) Fuzzy based detection of malicious activity for security assessment of MANET. Natl Acad Sci Lett 41(1):23–28

    Article  Google Scholar 

  • Brindha V, Karthikeyan T, Manimegalai P (2017) Fuzzy enhanced secure multicast routing for improving authentication in MANET. Clust Comput. https://doi.org/10.1007/s10586-017-1282-9

    Google Scholar 

  • Chaudhry R, Tapaswi S, Kumar N (2018) Forwarding zone enabled PSO routing with network lifetime maximization in MANET. Appl Intell 48(9):3053–3080

    Article  Google Scholar 

  • Deep J, Sutha J (2018) A new energy based power aware routing method for MANETs. Clust Comput. https://doi.org/10.1007/s10586-018-1868-x

    Google Scholar 

  • Devi VS, Hegde NP (2018) Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer. Wirel Pers Commun 100:923–940

    Article  Google Scholar 

  • Gambhir S, Tomar P (2012) Optimal path selection routing protocol in MANETs. Int J Sci Eng Res 3(7):1

    Google Scholar 

  • Gurumoorthy KB, Nirmal Kumar A (2017) Mutual constraint based GA suggested routing algorithm for improving QoS in clustered in MANETs. Wirel Pers Commun 98(3):2975–2991

    Article  Google Scholar 

  • Irin Dorathy PE, Chnadrasekaran M (2015) Distance based dual path ad hoc on demand distance vector routing protocols for mobile ad hoc networks. In: International conference on advanced computing and communication systems, Coimbatore, India

  • Jain HR, Sharma SK (2014) Improved energy efficient secure multipath AODV routing protocol for MANET. In: IEEE international conference on advances in engineering and technology research (ICAETR-2014)

  • Khatoon N, Amritanjali (2017) Mobility aware energy efficient clustering for MANET: a bio-inspired approach with particle swarm optimization. Wirel Commun Mob Comput 2017:1–12

    Article  Google Scholar 

  • Kokilamani M, Karthikeyan E (2017) An optimal path selection criterion in multipath routing using energy. CSIT 5:235–246

    Article  Google Scholar 

  • Kondaiah R, Sathyanarayana B (2018) Trust factor and fuzzy firefly integrated particle swarm optimization based intrusion detection and prevention for secure routing of MANET. Int J Comput Netw Commun 10(1):13–33

    Article  Google Scholar 

  • Kumar S, Mehfuz S (2016a) Intelligent probabilistic broadcasting in mobile ad hoc network: a PSO approach. J Reliab Intell Environ 2:107–115

    Article  Google Scholar 

  • Kumar S, Mehfuz S (2016b) Intelligent probabilistic broadcasting in mobile ad hoc network: a PSO approach. J Reliab Intell Environ 2:107–115

    Article  Google Scholar 

  • Mafirabadza C, Khatri P (2017) Efficient power aware AODV routing protocol for MANET. Wirel Pers Commun 97(4):5707–5717

    Article  Google Scholar 

  • Maragatham T, Karthik S, Bhavadharini RM (2018) TCACWCA: transmission and collusion aware clustering with enhanced weight clustering algorithm for mobile ad hoc networks. Clust Comput. https://doi.org/10.1007/s10586-017-1574-0

    Google Scholar 

  • Moudni H, Er-rouidi M, Mouncif H, El Hadadi B (2016) Secure routing protocols for mobile ad hoc networks. In: IEEE international conference on information technology for organizations development (IT4OD)

  • Nagaratna M, Manasa C (2013) Optimized path selection based on multi criteria in MANET. Int J Adv Trends Comput Sci Eng 2(6):38–41

    Google Scholar 

  • Saravanan N, Subramani A, Balamurugan P (2017) Optimal route selection in MANET based on particle swarm optimization utilizing expected transmission count. Clust Comput. https://doi.org/10.1007/s10586-017-1445-8

    Google Scholar 

  • Singh G, Kumar N, Verma AK (2014) OANTALG: an orientation based ant colony algorithm for mobile ad hoc networks. Wirel Pers Commun 77(3):1859–1884

    Article  Google Scholar 

  • Vamsi R, Kant K (2017) Generalized trust model for cooperative routing in MANETs. Wirel Pers Commun 97:4385–4412

    Article  Google Scholar 

  • Venkata Swaroop G, Murugaboopathi G (2017) Secure and reliable communication scheme for MANET using ECMS CH based certificate revocation. Clust Comput. https://doi.org/10.1007/s10586-017-1415-1

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Muneeswari.

Ethics declarations

Conflict of interests

The authors have no disclosure or conflicts to report.

Additional information

Communicated by Sahul Smys.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muneeswari, B., Manikandan, M.S.K. Defending against false data attacks in 3D grid-based MANET using soft computing approaches. Soft Comput 23, 8579–8595 (2019). https://doi.org/10.1007/s00500-019-03899-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-019-03899-3

Keywords

Navigation