Skip to main content
Log in

An Integrated Z-Number and DEMATEL-Based Cooperation Enforcement Scheme for Thwarting Malicious Nodes in MANETs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile ad hoc Networks (MANETs) represent a group of mobile nodes that constitutes the network deprived of any pre-established infrastructure. In MANETs, the mobile nodes play an anchor role of a host and a router, thereby they possess the capability of sending and receiving the packet amid source and destination based on the cooperation rendered by the intermediary nodes of the routing path. However, existence of malicious as well as selfish nodes severally crumbles the performance of the network. The reputation-based cooperation approaches are essential for identifying malevolent and selfish nodes and segregate them from the network. At this juncture, multiple attribute decision making is confirmed to the ideal candidate for determining the reputation rank associated with the nodes during data dissemination. In this paper, An Integrated Z-number, and DEMATEL-based Cooperation Enforcement (IZ-DEMATELCE) scheme is contributed for finding the reputation of the mobile nodes for thwarting the impact of malevolent as well as selfish nodes in the network. This IZ-DEMATELCE-based reputation approach completely concentrates on identifying the weights and mutual influential relationships existing among the attributes that are used for confirming the malicious behaviour of mobile nodes. It adopts the merits of Z number-based reference ideal method for estimating the resilience potential of mobile nodes to incorporate appropriate decision-making strategies essential for isolating malicious nodes. It also uses the benefits of Trapezoidal Fuzzy Numbers to determine the information uncertainty and assesses the reliability/confidence of neighbouring nodes towards the nodes in the routing path that is monitored.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23

Similar content being viewed by others

Data Availability

Not applicable.

Code Availability

Not applicable.

References

  1. Sengathir, J., & Manoharan, R. (2017). Co-operation enforcing reputation-based detection techniques and frameworks for handling selfish node behaviour in MANETs: A review. Wireless Personal Communications, 97(3), 3427–3447.

    Article  Google Scholar 

  2. Arora, D., Gupta, S., & Anpalagan, A. (2022). Evolution and adoption of next generation IoT-driven health care 4.0 systems. Wireless Personal Communications, 127, 1–81. https://doi.org/10.1007/s11277-022-09932-3

    Article  Google Scholar 

  3. Sudhakar, T., Natarajan, V., Gopinath, M., & Saranyadevi, J. (2020). An enhanced authentication protocol for multi-server environment using password and smart card. Wireless Personal Communications, 115(4), 2779–2803. https://doi.org/10.1007/s11277-020-07462-4

    Article  Google Scholar 

  4. Pamarthi, S., & Narmadha, R. (2022). Adaptive key management-based cryptographic algorithm for privacy preservation in wireless mobile adhoc networks for IoT applications. Wireless Personal Communications, 124(1), 349–376. https://doi.org/10.1007/s11277-021-09360-9

    Article  Google Scholar 

  5. Hammamouche, A., Omar, M., Djebari, N., & Tari, A. (2018). Lightweight reputation-based approach against simple and cooperative Black-hole attacks for MANET. Journal of Information Security and Applications, 43(4), 12–20.

    Article  Google Scholar 

  6. Janakiraman, S., & Jayasingh, B. B. (2019). A hyper-exponential factor-based Semi-Markov prediction mechanism for selfish rendezvous nodes in MANETs. Wireless Personal Communications, 108(3), 1493–1511.

    Article  Google Scholar 

  7. Ourouss, K., Naja, N., & Jamali, A. (2020). Defending against smart Grayhole attack within MANETs: A reputation-based ant colony optimization approach for secure route discovery in DSR protocol. Wireless Personal Communications, 116(1), 207–226.

    Article  Google Scholar 

  8. Sudhakar, T., Ramalingam, P., & Jagatheswari, S. (2022). An improved proxy-vehicle based authentication scheme for vehicular ad-hoc networks. International Journal of Information Technology, 14, 2441–2449. https://doi.org/10.1007/s41870-022-00938-5

    Article  Google Scholar 

  9. Ramasamy, V., Srirangan, J., & Ramalingam, P. (2021). Fuzzy and position particle swarm optimized routing in VANET. International Journal of Electrical and Computer Engineering Systems, 12(4), 199–206.

    Article  Google Scholar 

  10. Chatterjee, P., Ghosh, U., Sengupta, I., & Ghosh, S. K. (2014). A trust enhanced secure clustering framework for wireless ad hoc networks. Wireless Networks, 20(7), 1669–1684.

    Article  Google Scholar 

  11. Ghosh, U., & Datta, R. (2015). A secure addressing scheme for large-scale managed MANETs. IEEE Transactions on Network and Service Management, 12(3), 483–495.

    Article  Google Scholar 

  12. Manoranjini, J., Chandrasekar, A., & Jothi, S. (2019). Improved QoS and avoidance of black hole attacks in MANET using trust detection framework. Automatika, 60(3), 274–284.

    Article  Google Scholar 

  13. Gopala Krishnan, C., Gomathi, S., Aravind Swaminathan, G., Robinson, Y. H., & AnushaBamini, A. M. (2022). Trust management framework and high energy efficient lifetime management system for MANET using self-configurable cluster mechanism. Wireless Personal Communications. https://doi.org/10.1007/s11277-022-10048-x

    Article  Google Scholar 

  14. Marathe, N. R., & Shinde, S. K. (2021). Multidimensional multi-attribute approach to counter the routing attacks on MANET. Wireless Personal Communications, 119(3), 1993–2016. https://doi.org/10.1007/s11277-021-08315-4

    Article  Google Scholar 

  15. Janakiraman, S., Priya, M. D., & Jebamalar, A. C. (2021). Integrated context-based mitigation framework for enforcing security against rendezvous point attack in MANETs. Wireless Personal Communications, 119(3), 2147–2163.

    Article  Google Scholar 

  16. Roles, A., & ElAarag, H. (2017). Coexistence with malicious and selfish nodes in wireless ad hoc networks: A Bayesian game approach. Journal of Algorithms & Computational Technology, 11(4), 353–365.

    Article  MathSciNet  Google Scholar 

  17. Durga Devi, S., & Rukmani Devi, D. (2019). Malicious node and malicious observer node detection system in MANETs. Concurrency and Computation: Practice and Experience, 33(3), e5241.

    Google Scholar 

  18. Gopala Krishnan, C., Nishan, A. H., Gomathi, S., & Aravind Swaminathan, G. (2021). Energy and trust management framework for MANET using clustering algorithm. Wireless Personal Communications, 122(2), 1267–1281.

    Article  Google Scholar 

  19. Subburayalu, G., Duraivelu, H., Raveendran, A. P., Arunachalam, R., Kongara, D., & Thangavel, C. (2021). Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier. Journal of Applied Security Research, 9(5), 1–19.

    Article  Google Scholar 

  20. Farahani, G. (2021). Black hole attack detection using k-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks. Security and Communication Networks, 2021(4), 1–15.

    Article  Google Scholar 

  21. Rani, P., Verma, S., Kaur, N., Wozniak, M., Shafi, J., & Ijaz, M. F. (2021). Robust and secure data transmission using artificial intelligence techniques in ad-hoc networks. Sensors, 22(1), 251.

    Article  Google Scholar 

  22. Bounouni, M., Bouallouche-Medjkoune, L., Beraza, A., & Daoud, A. (2021). Eliminating selective dropping attack in mobile ad hoc network. Wireless Personal Communications, 123(4), 3291–3308.

    Article  Google Scholar 

  23. Sirisala, S., & Rama Krishna, S. (2021). Fuzzy complex proportional assessment of alternatives-based node cooperation enforcing trust estimation scheme for enhancing quality of service during reliable data dissemination in mobile ad hoc networks. International Journal of Communication Systems, 34(7), 67–79.

    Article  Google Scholar 

  24. Jagatheswari, S., Ramalingam, P., & Chandra Priya, J. (2022). Improved grey relational analysis based TOPSIS method for cooperation enforcing scheme to guarantee quality of service in MANETs. International Journal of Information Technology, 14(2), 887–897.

    Article  Google Scholar 

  25. Fayaz, M., Mehmood, G., Khan, A., Abbas, S., Fayaz, M., & Gwak, J. (2022). Counteracting selfish nodes using reputation-based system in mobile ad hoc networks. Electronics, 11(2), 185.

    Article  Google Scholar 

  26. Yamini, K. A., Stephy, J., Suthendran, K., & Ravi, V. (2022). Improving routing disruption attack detection in MANETs using efficient trust establishment. Transactions on Emerging Telecommunications Technologies, 33(5), 1–13.

    Article  Google Scholar 

  27. Mylsamy, R., & Jayaprakash, K. (2022). Fuzzy preference ranking organization method for enrichment evaluation-based node cooperation technique for improving QoS in MANETs. International Journal of Communication Systems, 35(10), 12–24.

    Article  Google Scholar 

  28. Chatzidakis, M., & Hadjiefthymiades, S. (2022). A trust change detection mechanism in mobile ad-hoc networks. Computer Communications, 187(4), 155–163.

    Article  Google Scholar 

  29. Chiejina, E., Xiao, H., Christianson, B., Mylonas, A., & Chiejina, C. (2022). A robust Dirichlet reputation and trust evaluation of nodes in mobile ad hoc networks. Sensors, 22(2), 571.

    Article  Google Scholar 

  30. Gopala Krishnan, C., Nishan, A. H., & Prasanna Venkatesh, T. (2022). K-means clustering based energy and trust management routing algorithm for mobile ad-hoc networks. International Journal of Communication Systems, 35(9), 12–24.

    Google Scholar 

  31. Kavitha, N. S., & Malathi, P. (2017). Analysis of congestion control based on Engset loss formula-inspired queue model in wireless networks. Computers & Electrical Engineering, 64(5), 567–579.

    Google Scholar 

  32. Madhavi, S., Udhaya Sankar S. M., Praveen R., & Jagadish Kumar, N. A fuzzy COPRAS-based decision-making framework for mitigating the impact of vampire sensor nodes in wireless sensor nodes (WSNs) International Journal of Information Technology, https://doi.org/10.1007/s41870-023-01219-5

  33. Madhavi, S.,Santhosh, N.C., Rajkumar, S., & Praveen, R. (2023) Pythagorean Fuzzy Sets-based VIKOR and TOPSIS-based multi-criteria decision-making model for mitigating resource deletion attacks in WSNs Journal of Intelligent & Fuzzy Systems, 1–19 https://doi.org/10.3233/JIFS-224141

  34. Praveen, R., & Pabitha, P, (2023) A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications Journal of Intelligent & Fuzzy Systems, 1–20 https://doi.org/10.3233/JIFS-223617

  35. Ramalingam, Praveen Parameswaran, Pabitha Improved Gentry–Halevi's fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things Transactions on Emerging Telecommunications Technologies https://doi.org/10.1002/ett.4732

  36. Pabitha ,P., Chandra, J., Priya R., & Praveen S., Jagatheswari ModChain: a hybridized secure and scaling blockchain framework for IoT environment International Journal of Information Technology, https://doi.org/10.1007/s41870-023-01218-6

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. M. Udhaya Sankar.

Ethics declarations

Conflict of interest

The authors have not disclosed any competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Udhaya Sankar, S.M., Jagadish Kumar, N., Elangovan, G. et al. An Integrated Z-Number and DEMATEL-Based Cooperation Enforcement Scheme for Thwarting Malicious Nodes in MANETs. Wireless Pers Commun 130, 2531–2563 (2023). https://doi.org/10.1007/s11277-023-10391-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10391-7

Keywords

Navigation