Skip to main content

Advertisement

Log in

Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

A Correction to this article was published on 29 November 2022

This article has been updated

Abstract

The openness nature of the Ad-hoc sensor networks emerged as a security threat in this network environment that leads to packets drop, network overhead, high range energy consumption, and transmission delay. Previous methods such as Trust-Based Malicious Nodes Detection in AD-hoc (TBMND) and Security based Data-Aware Routing Protocol (SDARP) found that this happens due to malicious nodes in the network. A malicious node in a network degrades its efficiency that also affects the routing decision making and also makes error decisions in route selection. Trust vector model and Trust-based Secure Routing (TBSR) have made attempts to evaluate trust nodes via various techniques, but unfortunately, the accuracy level has not been reached to the required range. In this paper, a trust-based energy-aware routing using GEOSR protocol for Ad-hoc sensor networks is presented for providing an energy-efficient and secured routing. In this trust-based energy-aware routing, initially the sensor nodes are deployed in the ad-hoc network. The clustering is performed based on the estimation of distance among the each nodes and the cluster head (CH) is selected based on the threshold value. After CH selection, the trust evaluation is performed for identify the trust and untrusted nodes present in the network. The untrusted node is considered as malicious node which is detected and blocked. The trusted nodes are forwarded to select the optimal routing path for secured transmission. Golden Eagle Optimized Secure Routing (GEOSR) is introduced for selecting the optimal routing path based on the parameters such as distance delay and energy objective function. Thus, energy-efficient and secured routing were done using the GEOSR protocol. GEOSR protocol was then implemented in the NS-2 simulation tool and then compared with existing techniques. GEOSR protocol shows 95% of residual energy for the prediction of two malicious nodes. Thus GEOSR was suitable for real-time applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Data availability

There is no availability of data or materials available or report for the manuscript.

Code availability

No code is available for this manuscript.

Change history

References

  1. Thiagarajan, R., Babu, M. R., & Moorthi, M. (2021). Quality of service based Ad hoc on-demand multipath distance vector routing protocol in mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(5), 4957–4965.

    Article  Google Scholar 

  2. Hassan, M. H., Mostafa, S. A., Mahdin, H., Mustapha, A., & Ramli, A. A. (2021). Hassan MH and Jubair MA Mobile ad-hoc network routing protocols of time-critical events for search and rescue missions. Bulletin of Electrical Engineering and Informatics, 10(1), 192–199.

    Article  Google Scholar 

  3. Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile Ad-Hoc network (MANET). IEEE Access, 9, 11872–11883.

    Article  Google Scholar 

  4. Akhter, A. F. M., Ahmed, M., Shah, A. F. M., Anwar, A., Kayes, A. S. M., & Zengin, A. (2021). A blockchain-based authentication protocol for cooperative vehicular ad hoc network. Sensors, 21(4), 1273.

    Article  Google Scholar 

  5. Rana, K. K., Tripathi, S., & Raw, R. S. (2021). Fuzzy logic-based directional location routing in vehicular ad hoc network. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 91(1), 135–146.

    Article  Google Scholar 

  6. Sridevi, N., & Nagarajan, V. (2021). Efficient traffic control and lifetime maximization in mobile ad hoc network by using PSO–BAT optimization. Wireless Networks, 27(2), 861–870.

    Article  Google Scholar 

  7. Zhang, X., Li, R., Hou, W., & Shi, J. (2021). Research on Manhattan distance based trust management in vehicular Ad hoc network. Security and Communication Networks, 2021.

  8. Anand, M., Balaji, N., Bharathiraja, N., & Antonidoss, A. (2021). A controlled framework for reliable multicast routing protocol in mobile ad hoc network. Materials Today: Proceedings

  9. Hanin, M. H., Amani, M., & Fakhri, Y. (2021). Improved TCP prediction congestion in mobile Ad hoc network based on cross-layer and fuzzy logic. International Journal of Interactive Mobile Technologies, 15(14), 125.

    Article  Google Scholar 

  10. Mohammed, A., Abdullah, N. F., Alani, S., Alheety, O. S., Shaker, M. M., Saad, M. A., & Mahmood, S. N. (2021). Weighted round robin scheduling algorithms in mobile AD HOC network. In: 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), IEEE, 1–5.

  11. Maakar, S. K., Khurana, M., Chakraborty, C., Sinwar. D., & Srivastava, D. (2021). Performance evaluation of AODV and DSR routing protocols for flying Ad hoc network using highway mobility model. Journal of Circuits, Systems and Computers, 2250008.

  12. Reddy, M. V. K. & PremKumar, S. (2021) Predicting the malfunctioning node in mobile Ad Hoc network. Design Engineering 8337–8346.

  13. Papadimitratos, P., & Haas, Z. J. (2006). Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 343–356.

    Article  Google Scholar 

  14. Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., & Lam, K. Y. (2010). Trust based routing for misbehavior detection in ad hoc networks. Journal of Networks, 5(5), 551.

    Article  Google Scholar 

  15. Bertino, E. (2014). Data trustworthiness—approaches and research challenges. In: Data privacy management, autonomous spontaneous security, and security assurance, Springer, Cham, 17–25.

  16. Malar, A., Kowsigan, M., Krishnamoorthy, N., Karthick, S., Prabhu, E., & Venkatachalam, K. (2021). Multi constraints applied energy efficient routing technique based on ant colony optimization used for disaster resilient location detection in mobile ad-hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(3), 4007–4017.

    Article  Google Scholar 

  17. Poongodi, M., Hamdi, M., Sharma, A., Ma, M., & Singh, P. K. (2019). DDoS detection mechanism using trust-based evaluation system in VANET. IEEE Access, 7, 183532–183544.

    Article  Google Scholar 

  18. Gunasekaran, M., & Periakaruppan, S. (2017). A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks. International Journal of Electronics, 104(6), 993–1007.

    Article  Google Scholar 

  19. Kim, B., & Song, J. (2019). Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2019(1), 1–16.

    Article  Google Scholar 

  20. Jhaveri, R. H., & Patel, N. M. (2017). Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. International Journal of Communication Systems, 30(7), e3148.

    Article  Google Scholar 

  21. Jhaveri, R. H. & Patel, N. M. (2016). Evaluating energy efficiency of secure routing schemes for mobile Ad-Hoc networks. International Journal of Next-Generation Computing7(2).

  22. Salam, A., Javaid, Q., & Ahmad, M. (2020). Bioinspired mobility-aware clustering optimization in flying ad hoc sensor network for internet of things: BIMAC-FASNET. Complexity.

  23. Kumar, K. V., Jayasankar, T., Eswaramoorthy, V., & Nivedhitha, V. (2020). SDARP: Security based data aware routing protocol for ad hoc sensor networks. International Journal of Intelligent Networks, 1, 36–42.

    Article  Google Scholar 

  24. Sajan, R. I., & Jasper, J. (2020). Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network. International Journal of Communication Systems, 33(8), e4341.

    Article  Google Scholar 

  25. Ahmed, A., Kamalrulnizam, A. B., Muhammad, I. C., Khalid, H., & Abdul, W. K. (2015). TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal, 15(12), 6962–6972.

    Article  Google Scholar 

  26. Haseeb, K., Naveed, I., Ahmad, A., Ikram, U. D., Almajed, H. N., & Nadra, G. (2019). Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access, 7, 79980–79988.

    Article  Google Scholar 

  27. Selvi, M., Thangaramya, K., Sannasi, G., Kanagasabai, K., Khannah Nehemiah, H., & Arputharaj, K. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks.". Wireless Personal Communications, 105(4), 1475–1490.

    Article  Google Scholar 

  28. Zahedi, A., & Parma, F. (2019). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 12(1), 167–176.

    Article  Google Scholar 

  29. Kavidha, V., & Ananthakumaran, S. (2019). Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink. Peer-to-Peer Networking and Applications, 12(4), 881–892.

    Article  Google Scholar 

  30. Vinitha, A. & Rukmini, M. S. S. (2019). Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. Journal of King Saud University-Computer and Information Sciences.

Download references

Funding

There is no funding provided to prepare the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ranjit Kumar.

Ethics declarations

Conflict of interest

There is no conflict of Interest between the authors regarding the manuscript preparation and submission.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, R., Tripathi, S. & Agrawal, R. Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks. Wireless Netw 28, 2913–2936 (2022). https://doi.org/10.1007/s11276-022-02991-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-02991-1

Keywords

Navigation