Abstract
Quality of service (QoS) is one of the major factors for current applications in mobile ad hoc networks (MANET). Due to the limited wireless link capabilities, a path with heavy load will lost battery within short period of time and maximizes the possibility of path disconnection and packet drops. Hence, optimal path is necessary to increase residual energy of the node. Dual CHs are selected by mobile node energy level, distance and expected relative mobility. The dual CH selection considers the residual energy of nodes, average distance to neighbors and number of neighbor nodes. Previously proposed multipath routing techniques reduce network traffic among multiple routes paths instead of sending packets via only one path. There are two research issues are still arisen in multipath routing that are packet redundancy and quality. We address these issues in the proposed optimal routing paradigm where the best path is selected instead of routing among all available paths. We propose hybrid routing scheme that combines type 2 fuzzy logic system to find available paths from source to the destination node and particle swarm optimization to identify a best path among the selected paths. Due to the lack of central monitoring system in MANET, security breach called false data injection attack may occur. To reveal this task, false data predicted on the source digital signature by upcoming cluster member. We implement our proposed approach in 3D grid-based MANET environment using NS3.26. We also compare our proposed approach performance with the conventional 2D routing schemes. Finally, the proposed approach shows higher QoS than others.
Similar content being viewed by others
Abbreviations
- \( T_{\text{MN}} \) :
-
Sum of mobile nodes in network
- R :
-
Population of PSO algorithm
- \( k_{\text{opt}} \) :
-
The number of optimal clusters in each round
- \( T_{\text{L - I}}^{n} ,T_{\text{L - II}}^{n} \) :
-
Energy threshold for selecting CHs
- \( p \) :
-
Random prime value
- \( a,b \) :
-
Integers
- \( {\mathcal{F}} \) :
-
Finite field
- \( H_{\text{f}} \) :
-
Hash function
- \( D_{m} \) :
-
Euclidean distance
- \( {\text{rm}}_{i,j}^{t} \) :
-
The relative mobility of the node \( n_{j} \) at instant t
- \( \varepsilon \left( t \right) \) :
-
Remaining energy
- \( \beta_{1} \), \( \beta_{2} \) :
-
Weighting coefficients
- \( \alpha_{1} ,\alpha_{2} ,\alpha_{3} \) :
-
Random integers
- \( F_{1} ,F_{2} \) :
-
Learning factors
- \( \mu ,\tau \) :
-
Random numbers between 0 and 1
- V, X :
-
Particle velocity and position, respectively
- \( P_{\text{ID}} \) :
-
Best particle position
- \( P_{\text{GD}} \) :
-
Global best particle position
- \( \omega \) :
-
Inertia weight
- \( f\left( i \right) \) :
-
Fitness function
- TA:
-
Trusted authority
- \( {\text{Pu}}_{k} \) :
-
Public key
- \( {\text{Pi}}_{k} \) :
-
Private key
- DS:
-
Digital signature
References
Abarghouei BE, Farokhtala A, Alizadeh M (2015) DNACK: false data detection based on negative acknowledgement and digital signature on mobile ad hoc network. Wirel Pers Commun 83:1–15
Aluvala S, Sekhar KR, Vodnala D (2016) A novel technique for node authentication in mobile ad hoc networks. Perspect Sci 8:680–682
Bhanumathi V, Dhanasekaran R (2015) Efficient data transfer in mobile ad hoc network using OPSM for disaster response applications. J Appl Res Technol 13:392–401
Bisen D, Sharma S (2018a) An enhanced performance through agent-based secure approach for mobile ad hoc networks. Int J Electron 105(1):1–22
Bisen D, Sharma S (2018b) Fuzzy based detection of malicious activity for security assessment of MANET. Natl Acad Sci Lett 41(1):23–28
Brindha V, Karthikeyan T, Manimegalai P (2017) Fuzzy enhanced secure multicast routing for improving authentication in MANET. Clust Comput. https://doi.org/10.1007/s10586-017-1282-9
Chaudhry R, Tapaswi S, Kumar N (2018) Forwarding zone enabled PSO routing with network lifetime maximization in MANET. Appl Intell 48(9):3053–3080
Deep J, Sutha J (2018) A new energy based power aware routing method for MANETs. Clust Comput. https://doi.org/10.1007/s10586-018-1868-x
Devi VS, Hegde NP (2018) Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer. Wirel Pers Commun 100:923–940
Gambhir S, Tomar P (2012) Optimal path selection routing protocol in MANETs. Int J Sci Eng Res 3(7):1
Gurumoorthy KB, Nirmal Kumar A (2017) Mutual constraint based GA suggested routing algorithm for improving QoS in clustered in MANETs. Wirel Pers Commun 98(3):2975–2991
Irin Dorathy PE, Chnadrasekaran M (2015) Distance based dual path ad hoc on demand distance vector routing protocols for mobile ad hoc networks. In: International conference on advanced computing and communication systems, Coimbatore, India
Jain HR, Sharma SK (2014) Improved energy efficient secure multipath AODV routing protocol for MANET. In: IEEE international conference on advances in engineering and technology research (ICAETR-2014)
Khatoon N, Amritanjali (2017) Mobility aware energy efficient clustering for MANET: a bio-inspired approach with particle swarm optimization. Wirel Commun Mob Comput 2017:1–12
Kokilamani M, Karthikeyan E (2017) An optimal path selection criterion in multipath routing using energy. CSIT 5:235–246
Kondaiah R, Sathyanarayana B (2018) Trust factor and fuzzy firefly integrated particle swarm optimization based intrusion detection and prevention for secure routing of MANET. Int J Comput Netw Commun 10(1):13–33
Kumar S, Mehfuz S (2016a) Intelligent probabilistic broadcasting in mobile ad hoc network: a PSO approach. J Reliab Intell Environ 2:107–115
Kumar S, Mehfuz S (2016b) Intelligent probabilistic broadcasting in mobile ad hoc network: a PSO approach. J Reliab Intell Environ 2:107–115
Mafirabadza C, Khatri P (2017) Efficient power aware AODV routing protocol for MANET. Wirel Pers Commun 97(4):5707–5717
Maragatham T, Karthik S, Bhavadharini RM (2018) TCACWCA: transmission and collusion aware clustering with enhanced weight clustering algorithm for mobile ad hoc networks. Clust Comput. https://doi.org/10.1007/s10586-017-1574-0
Moudni H, Er-rouidi M, Mouncif H, El Hadadi B (2016) Secure routing protocols for mobile ad hoc networks. In: IEEE international conference on information technology for organizations development (IT4OD)
Nagaratna M, Manasa C (2013) Optimized path selection based on multi criteria in MANET. Int J Adv Trends Comput Sci Eng 2(6):38–41
Saravanan N, Subramani A, Balamurugan P (2017) Optimal route selection in MANET based on particle swarm optimization utilizing expected transmission count. Clust Comput. https://doi.org/10.1007/s10586-017-1445-8
Singh G, Kumar N, Verma AK (2014) OANTALG: an orientation based ant colony algorithm for mobile ad hoc networks. Wirel Pers Commun 77(3):1859–1884
Vamsi R, Kant K (2017) Generalized trust model for cooperative routing in MANETs. Wirel Pers Commun 97:4385–4412
Venkata Swaroop G, Murugaboopathi G (2017) Secure and reliable communication scheme for MANET using ECMS CH based certificate revocation. Clust Comput. https://doi.org/10.1007/s10586-017-1415-1
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
The authors have no disclosure or conflicts to report.
Additional information
Communicated by Sahul Smys.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Muneeswari, B., Manikandan, M.S.K. Defending against false data attacks in 3D grid-based MANET using soft computing approaches. Soft Comput 23, 8579–8595 (2019). https://doi.org/10.1007/s00500-019-03899-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-019-03899-3