Skip to main content
Log in

Enhancing Data Security in Mobile Ad-hoc Network (MANETs) Using Trust-Based Approach with RSSI and Fuzzy Logic

  • Research
  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In Mobile Ad-hoc Network (MANET), a source node relies on other nodes to multipath packets to the destination. In Ad-hoc NN-TC Model (Neighbour Node-based Trust Calculation) protocol, malicious nodes make data security between source and destination difficult in cyber security system. Due to movement and signal intensity, nodes rapidly lose connection or die off. Reduce packet dropouts using RSSI. AOMDV, a revolutionary MANET protocol with trust-based Bayesian statistical model improves packet transmission and reduces packet losses. Route discovery using the proposed Improved Winnow Trust based Multipath Route Discovery (IWT-MRD) technique protocol finds many loop-free pathways. Two methods—packet forwarding ratio, incentive, and penalty—measure a node's trustworthiness. RSSI calculates distance and dynamically sets signal intensity transmission. The routing table uses trust and RSSI values to choose trustworthy nodes with strong signals. So, other trustworthy nodes are less stable. Fuzzy logic input preserves the reliable route in the routing database. Neighbour Node-Based Trust Calculation (NN-TC) Model uses each node's trust and RSSI values to calculate dependability. NS-2 network simulator was used to test protocol efficiency under variable node speeds and malicious node numbers. Compare Ad-hoc On-demand Multipath Distance Vector routing (AOMDV), Trust based Bayesian Statistical Model in AOMDV protocol TB-AOMDV1, and Fuzzy Trust with RSSI in AOMDV (FT-AOMDV) utilising Routing Packet Overhead, End-To-End Latency, Delivery Ratio, And Throughput. The highest Packet Delivery Ratio (PDR) is applied by presented method is 99.21%, AOMDV as 83.8%, TB-AOMDV1 as the 92.2% and FT-AOMDV as 97.6%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

Data will be available from the corresponding author on request due to privacy and ethical restrictions.

References

  1. Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secure 4(4):212–232. https://doi.org/10.1049/IET-IFS.2009.0140/CITE/REFWORKS

    Article  Google Scholar 

  2. Chen S, Wu M (2010) Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks. 2010 Int Conf Meas Technol Mechatronics Autom ICMTMA 2010 1:582–585. https://doi.org/10.1109/ICMTMA.2010.602

    Article  Google Scholar 

  3. Yi J, Adnane A, David S, Parrein B (2011) Multipath optimized link state routing for mobile ad hoc networks. Ad Hoc Netw 9(1):28–47. https://doi.org/10.1016/J.AD-HOC.2010.04.007

    Article  Google Scholar 

  4. Venkata Krishna P, Saritha V, Vedha G, Bhiwal A, Chawla AS (2012) Quality-of-service-enabled ant colony-based multipath routing for mobile ad hoc networks. Undefined 6(1):76–83. https://doi.org/10.1049/IET-COM.2010.0763

  5. Nasehi H, Taheri Javan N, Aghababa AB, Ghanbari Birgani Y (2013) Improving Energy Efficiency in MANETs by Multi-Path Routing. Undefined 5(1):163–176. https://doi.org/10.5121/IJWMN.2013.5113

  6. Gera DP “Trust-based Multi-Path Routing for Enhancing Data Security in MANETs.” Jan. 01, 2014, Accessed: Oct. 07, 2022. [Online]. Available: https://www.academia.edu/81952459/Trust_based_Multi_Path_Routing_for_Enhancing_Data_Security_in_MANETs

  7. Aluvala S, Raja Sekhar K, Vodnala D (2016) A novel technique for node authentication in mobile ad hoc networks. Perspect Sci 8:680–682. https://doi.org/10.1016/J.PISC.2016.06.057

    Article  Google Scholar 

  8. Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw 37:209–227. https://doi.org/10.1016/J.AD-HOC.2015.08.020

    Article  Google Scholar 

  9. Ahmed MN, Abdullah AH, Chizari H, Kaiwartya O (2017) “F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs. J King Saud Univ - Comput Inf Sci 29(3):269–280. https://doi.org/10.1016/J.JKSUCI.2016.03.004

    Article  Google Scholar 

  10. Benakappa SM, Kiran M (2022) Energy Aware Stable Multipath Disjoint Routing Based on Accumulated Trust Value in MANETs. Int J Comput Netw Inf Secur 14(4):14–26. https://doi.org/10.5815/IJCNIS.2022.04.02

    Article  Google Scholar 

  11. Taha A, Alsaqour R, Uddin M, Abdelhaq M, Saba T (2017) Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function. undefined 5:10369–10381. https://doi.org/10.1109/ACCESS.2017.2707537

  12. Sahu RK, Chaudhari NS (2018) Energy reduction multipath routing protocol for MANET using recoil technique. Electron 7(5):56. https://doi.org/10.3390/ELECTRONICS7050056

    Article  Google Scholar 

  13. Gourisetti SNG, Mylrea M, Patangia H (2020) Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis. Futur Gener Comput Syst 105:410–431

    Article  Google Scholar 

  14. Buzdugan A, Căpățână G (2023) The Trends in Cybersecurity Maturity Models. In Education, Research and Business Technologies: Proceedings of 21st International Conference on Informatics in Economy (IE 2022) (pp. 217–228). Singapore: Springer Nature Singapore

  15. Rawindaran N, Jayal A, Prakash E (2021) Machine learning cybersecurity adoption in small and medium enterprises in developed countries. Computers 10(11):150

    Article  Google Scholar 

  16. Macas M, Wu C, Fuertes W (2022) A survey on deep learning for cybersecurity: Progress, challenges, and opportunities. Comput Netw 212:109032

    Article  Google Scholar 

  17. Mylrea M, Gourisetti SNG (2017) Cybersecurity and optimization in smart “autonomous” buildings. Autonomy and Artificial Intelligence: A Threat or Savior? pp 263–294

  18. Gao B, Maekawa T, Amagata D, Hara T (2018) Environment-adaptive malicious node detection in MANETs with ensemble learning. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (pp. 556–566). IEEE

  19. Gopalakrishnan S (2016) Performance analysis of malicious node detection and elimination using clustering approach on MANET. Circuits and Systems 7(06):748

    Article  Google Scholar 

  20. Kumaravel A, Chandrasekaran M (2019) Performance analysis of malicious node detection in MANET using ANFIS classification approach. Clust Comput 22:13445–13452

    Article  Google Scholar 

  21. Patel M, Sharma S (2013) Detection of malicious attack in MANET a behavioral approach. In 2013 3rd IEEE International Advance Computing Conference (IACC) (pp. 388–393). IEEE

  22. Ahmed A, Abu Bakar K, Channa MI, Haseeb K, Khan AW (2015) A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Front Comp Sci 9:280–296

    Article  MathSciNet  Google Scholar 

  23. Mayadunna H, De Silva SL, Wedage I, Pabasara S, Rupasinghe L, Liyanapathirana C, Kesavan K, Nawarathna C, Sampath KK (2017) Improving trusted routing by identifying malicious nodes in a MANET using reinforcement learning. In 2017 Seventeenth International Conference on Advances in ICT for Emerging Regions (ICTer) (pp. 1–8). IEEE

  24. Gomathy V, Padhy N, Samanta D, Sivaram M, Jain V, Amiri IS (2020) Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless ad-hoc sensor networks. J Ambient Intell Humaniz Comput 11:4995–5001

    Article  Google Scholar 

  25. Chethana, C, Pareek PK, de Albuquerque VHC, Khanna A, Gupta D (2022) Deep learning technique based intrusion detection in cyber-security networks. In 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon) (pp. 1–7). IEEE

  26. Sedrati M, Benyahia A (2017) “Multipath Routing to Improve Quality of Service for Video Streaming Over Mobile Ad Hoc Networks. Wirel Pers Commun 99(2):999–1013. https://doi.org/10.1007/S11277-017-5163-6

    Article  Google Scholar 

  27. Robinson YH, Julie EG, Saravanan K, Kumar R, Son LH (2019) FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. J Ambient Intell Humaniz Comput 10:4455–4472. https://doi.org/10.1007/s12652-018-1126-3

    Article  Google Scholar 

  28. Banerjee A, Chowdhury S (2019) Expected residual lifetime based ad hoc on-demand multipath routing protocol (ERL-AOMDV) in mobile ad hoc networks. Int J Inf Technol 11(4):727–733. https://doi.org/10.1007/S41870-018-0107-2

    Article  Google Scholar 

  29. Kasthuribai PT, Sundararajan M (2018) Secured and QoS based energy-aware multipath routing in MANET. Wirel Pers Commun 101:2349–2364. https://doi.org/10.1007/S11277-018-5820-4

    Article  Google Scholar 

  30. Khan IU et al (2020) Reinforce based optimization in wireless communication technologies and routing techniques using internet of flying vehicles. ACM Int Conf Proceeding Ser. https://doi.org/10.1145/3440749.3442621

    Article  Google Scholar 

  31. Khan IU, Shah SBH, Wang L, Aziz MA, Stephan T, Kumar N (2021) Routing protocols & unmanned aerial vehicles autonomous localization in flying networks. Int J Commun Syst e4885. https://doi.org/10.1002/DAC.4885

  32. Khan IU, Hassan MA, Fayaz M, Gwak J, Aziz MA (2021) Improved Sequencing Heuristic DSDV Protocol Using Nomadic Mobility Model for FANETS. Comput Mater Contin 70(2):3653–3666. https://doi.org/10.32604/CMC.2022.020697

    Article  Google Scholar 

  33. Koohathongsumrit N, Meethom W (2021) An integrated approach of fuzzy risk assessment model and data envelopment analysis for route selection in multimodal transportation networks. Expert Syst Appl 171:114342. https://doi.org/10.1016/j.eswa.2020.114342

  34. Han CH, Han C (2021) Semi-quantitative cybersecurity risk assessment by blockade and defense level analysis. Process Saf Environ Prot 155:306–316. https://doi.org/10.1016/j.psep.2021.09.028

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

Adel A. Alyoubi done all the work.

Corresponding author

Correspondence to Adel A. Alyoubi.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alyoubi, A.A. Enhancing Data Security in Mobile Ad-hoc Network (MANETs) Using Trust-Based Approach with RSSI and Fuzzy Logic. Mobile Netw Appl (2024). https://doi.org/10.1007/s11036-024-02336-6

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11036-024-02336-6

Keywords

Navigation