Abstract
In Mobile Ad-hoc Network (MANET), a source node relies on other nodes to multipath packets to the destination. In Ad-hoc NN-TC Model (Neighbour Node-based Trust Calculation) protocol, malicious nodes make data security between source and destination difficult in cyber security system. Due to movement and signal intensity, nodes rapidly lose connection or die off. Reduce packet dropouts using RSSI. AOMDV, a revolutionary MANET protocol with trust-based Bayesian statistical model improves packet transmission and reduces packet losses. Route discovery using the proposed Improved Winnow Trust based Multipath Route Discovery (IWT-MRD) technique protocol finds many loop-free pathways. Two methods—packet forwarding ratio, incentive, and penalty—measure a node's trustworthiness. RSSI calculates distance and dynamically sets signal intensity transmission. The routing table uses trust and RSSI values to choose trustworthy nodes with strong signals. So, other trustworthy nodes are less stable. Fuzzy logic input preserves the reliable route in the routing database. Neighbour Node-Based Trust Calculation (NN-TC) Model uses each node's trust and RSSI values to calculate dependability. NS-2 network simulator was used to test protocol efficiency under variable node speeds and malicious node numbers. Compare Ad-hoc On-demand Multipath Distance Vector routing (AOMDV), Trust based Bayesian Statistical Model in AOMDV protocol TB-AOMDV1, and Fuzzy Trust with RSSI in AOMDV (FT-AOMDV) utilising Routing Packet Overhead, End-To-End Latency, Delivery Ratio, And Throughput. The highest Packet Delivery Ratio (PDR) is applied by presented method is 99.21%, AOMDV as 83.8%, TB-AOMDV1 as the 92.2% and FT-AOMDV as 97.6%.
Similar content being viewed by others
Data Availability
Data will be available from the corresponding author on request due to privacy and ethical restrictions.
References
Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secure 4(4):212–232. https://doi.org/10.1049/IET-IFS.2009.0140/CITE/REFWORKS
Chen S, Wu M (2010) Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks. 2010 Int Conf Meas Technol Mechatronics Autom ICMTMA 2010 1:582–585. https://doi.org/10.1109/ICMTMA.2010.602
Yi J, Adnane A, David S, Parrein B (2011) Multipath optimized link state routing for mobile ad hoc networks. Ad Hoc Netw 9(1):28–47. https://doi.org/10.1016/J.AD-HOC.2010.04.007
Venkata Krishna P, Saritha V, Vedha G, Bhiwal A, Chawla AS (2012) Quality-of-service-enabled ant colony-based multipath routing for mobile ad hoc networks. Undefined 6(1):76–83. https://doi.org/10.1049/IET-COM.2010.0763
Nasehi H, Taheri Javan N, Aghababa AB, Ghanbari Birgani Y (2013) Improving Energy Efficiency in MANETs by Multi-Path Routing. Undefined 5(1):163–176. https://doi.org/10.5121/IJWMN.2013.5113
Gera DP “Trust-based Multi-Path Routing for Enhancing Data Security in MANETs.” Jan. 01, 2014, Accessed: Oct. 07, 2022. [Online]. Available: https://www.academia.edu/81952459/Trust_based_Multi_Path_Routing_for_Enhancing_Data_Security_in_MANETs
Aluvala S, Raja Sekhar K, Vodnala D (2016) A novel technique for node authentication in mobile ad hoc networks. Perspect Sci 8:680–682. https://doi.org/10.1016/J.PISC.2016.06.057
Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw 37:209–227. https://doi.org/10.1016/J.AD-HOC.2015.08.020
Ahmed MN, Abdullah AH, Chizari H, Kaiwartya O (2017) “F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs. J King Saud Univ - Comput Inf Sci 29(3):269–280. https://doi.org/10.1016/J.JKSUCI.2016.03.004
Benakappa SM, Kiran M (2022) Energy Aware Stable Multipath Disjoint Routing Based on Accumulated Trust Value in MANETs. Int J Comput Netw Inf Secur 14(4):14–26. https://doi.org/10.5815/IJCNIS.2022.04.02
Taha A, Alsaqour R, Uddin M, Abdelhaq M, Saba T (2017) Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function. undefined 5:10369–10381. https://doi.org/10.1109/ACCESS.2017.2707537
Sahu RK, Chaudhari NS (2018) Energy reduction multipath routing protocol for MANET using recoil technique. Electron 7(5):56. https://doi.org/10.3390/ELECTRONICS7050056
Gourisetti SNG, Mylrea M, Patangia H (2020) Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis. Futur Gener Comput Syst 105:410–431
Buzdugan A, Căpățână G (2023) The Trends in Cybersecurity Maturity Models. In Education, Research and Business Technologies: Proceedings of 21st International Conference on Informatics in Economy (IE 2022) (pp. 217–228). Singapore: Springer Nature Singapore
Rawindaran N, Jayal A, Prakash E (2021) Machine learning cybersecurity adoption in small and medium enterprises in developed countries. Computers 10(11):150
Macas M, Wu C, Fuertes W (2022) A survey on deep learning for cybersecurity: Progress, challenges, and opportunities. Comput Netw 212:109032
Mylrea M, Gourisetti SNG (2017) Cybersecurity and optimization in smart “autonomous” buildings. Autonomy and Artificial Intelligence: A Threat or Savior? pp 263–294
Gao B, Maekawa T, Amagata D, Hara T (2018) Environment-adaptive malicious node detection in MANETs with ensemble learning. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (pp. 556–566). IEEE
Gopalakrishnan S (2016) Performance analysis of malicious node detection and elimination using clustering approach on MANET. Circuits and Systems 7(06):748
Kumaravel A, Chandrasekaran M (2019) Performance analysis of malicious node detection in MANET using ANFIS classification approach. Clust Comput 22:13445–13452
Patel M, Sharma S (2013) Detection of malicious attack in MANET a behavioral approach. In 2013 3rd IEEE International Advance Computing Conference (IACC) (pp. 388–393). IEEE
Ahmed A, Abu Bakar K, Channa MI, Haseeb K, Khan AW (2015) A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Front Comp Sci 9:280–296
Mayadunna H, De Silva SL, Wedage I, Pabasara S, Rupasinghe L, Liyanapathirana C, Kesavan K, Nawarathna C, Sampath KK (2017) Improving trusted routing by identifying malicious nodes in a MANET using reinforcement learning. In 2017 Seventeenth International Conference on Advances in ICT for Emerging Regions (ICTer) (pp. 1–8). IEEE
Gomathy V, Padhy N, Samanta D, Sivaram M, Jain V, Amiri IS (2020) Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless ad-hoc sensor networks. J Ambient Intell Humaniz Comput 11:4995–5001
Chethana, C, Pareek PK, de Albuquerque VHC, Khanna A, Gupta D (2022) Deep learning technique based intrusion detection in cyber-security networks. In 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon) (pp. 1–7). IEEE
Sedrati M, Benyahia A (2017) “Multipath Routing to Improve Quality of Service for Video Streaming Over Mobile Ad Hoc Networks. Wirel Pers Commun 99(2):999–1013. https://doi.org/10.1007/S11277-017-5163-6
Robinson YH, Julie EG, Saravanan K, Kumar R, Son LH (2019) FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. J Ambient Intell Humaniz Comput 10:4455–4472. https://doi.org/10.1007/s12652-018-1126-3
Banerjee A, Chowdhury S (2019) Expected residual lifetime based ad hoc on-demand multipath routing protocol (ERL-AOMDV) in mobile ad hoc networks. Int J Inf Technol 11(4):727–733. https://doi.org/10.1007/S41870-018-0107-2
Kasthuribai PT, Sundararajan M (2018) Secured and QoS based energy-aware multipath routing in MANET. Wirel Pers Commun 101:2349–2364. https://doi.org/10.1007/S11277-018-5820-4
Khan IU et al (2020) Reinforce based optimization in wireless communication technologies and routing techniques using internet of flying vehicles. ACM Int Conf Proceeding Ser. https://doi.org/10.1145/3440749.3442621
Khan IU, Shah SBH, Wang L, Aziz MA, Stephan T, Kumar N (2021) Routing protocols & unmanned aerial vehicles autonomous localization in flying networks. Int J Commun Syst e4885. https://doi.org/10.1002/DAC.4885
Khan IU, Hassan MA, Fayaz M, Gwak J, Aziz MA (2021) Improved Sequencing Heuristic DSDV Protocol Using Nomadic Mobility Model for FANETS. Comput Mater Contin 70(2):3653–3666. https://doi.org/10.32604/CMC.2022.020697
Koohathongsumrit N, Meethom W (2021) An integrated approach of fuzzy risk assessment model and data envelopment analysis for route selection in multimodal transportation networks. Expert Syst Appl 171:114342. https://doi.org/10.1016/j.eswa.2020.114342
Han CH, Han C (2021) Semi-quantitative cybersecurity risk assessment by blockade and defense level analysis. Process Saf Environ Prot 155:306–316. https://doi.org/10.1016/j.psep.2021.09.028
Author information
Authors and Affiliations
Contributions
Adel A. Alyoubi done all the work.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alyoubi, A.A. Enhancing Data Security in Mobile Ad-hoc Network (MANETs) Using Trust-Based Approach with RSSI and Fuzzy Logic. Mobile Netw Appl (2024). https://doi.org/10.1007/s11036-024-02336-6
Accepted:
Published:
DOI: https://doi.org/10.1007/s11036-024-02336-6