Skip to main content

Advertisement

Log in

A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Mobile Ad-hoc Networks have distinct characteristics namely lack of centralized control and management, severe resource constraints in terms of energy level of nodes, computing power, frequent mobility and frequent change of topology. This dynamic nature of mobile adhoc networks lead to additional overhead in the provision of secured and stable routing. In order to address these issues, we propose a new integrated approach for secure routing approach in this paper which is made of two new algorithms called as the Trust based Next Forwarding Node Selection algorithm and Fuzzy Based Stable and Secure Routing algorithm that makes use of the trust based node selection procedure for providing efficient routing performance. The main contribution of this newly proposed node selection procedure is that this technique uses trust values to isolate the malicious nodes from the routing process in order to enhance the security. Hence, this proposed stable and secured routing technique performs reliable routing by selecting only trusted nodes with high residual energy and link stability. Another contribution of this work is the development of a Fuzzy Inference System which is used to handle uncertainty in the selection of trusted nodes and to identify the stable routes by performing qualitative analysis on trust values and link properties. From the implementation and testing carried out in this research work, it has been observed and proved that this proposed secured routing algorithm is capable of increasing the network performance in terms of improved packet delivery ratio, reduction in delay as well as false positive rate when compared with related secure routing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Chlamtac I, Conti M, Liu JJN (2003) Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw 1(1):13–64

    Article  Google Scholar 

  2. Murthy CSR, Manoj BS (2004) Ad hoc wireless networks: architectures and protocols. Prentice Hall

  3. Perkins CE (2001) Ad hoc networking: an introduction. Ad hoc networking, pp 20–22

    Google Scholar 

  4. Cho JH, Swami A, Chen IR (2011) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13(4):562–583

    Article  Google Scholar 

  5. Azzedin F, Ridha A, Rizvi A (2007) Fuzzy trust for peer-to-peer based systems. World academy of science. Eng Technol 21:123–127

    Google Scholar 

  6. Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Proceedings of second IEEE workshop on mobile computing systems and applications (WMCSA’99), New Orleans, pp 90–100

  7. Basu P, Khan N, Little TDC (2001) A mobility based metric for clustering in Mobile ad hoc networks. In IEEE Workshop on Wireless Networks and Mobile Computing, 413–418

  8. Su W, Lee SJ, Gerla M (2001) Mobility prediction and routing in ad hoc wireless networks. Int J Netw Manag 11(1):3–30

    Article  MATH  Google Scholar 

  9. Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secur 4(4):212–232

    Article  Google Scholar 

  10. Chiang CC, Wu HK, Liu W, Gerla M (1997) Routing in clustered multihop, mobile wireless networks with fading channel, In IEEE Singapore international conference on networks, SICON’97, April 16–17, 1997, Singapore, pp. 197–211

  11. Zhang DG (2015) Extended AODV routing method based on distributed minimum transmission (DMT) for WSN. Int J Electron Commun 69(1):371–381

    Article  Google Scholar 

  12. Zhang DG, Li G, Zheng K (2014) An energy-balanced routing method based on forward-aware factor for wireless sensor network. IEEE Trans Ind Inf 10(1):766–773

    Article  Google Scholar 

  13. Zhang DG, Zheng K, Zhang T (2015) A novel multicast routing method with minimum transmission for WSN of cloud computing service. Soft Comput 19(7):1817–1827

    Article  Google Scholar 

  14. Zhang D, Wang X, Song X (2015) New clustering routing method based on PECE for WSN. EURASIP J Wirel Commun Netw 2015(162):1–13

    Google Scholar 

  15. Zhang DG, Zhu YN (2012) A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the internet of things (IOT). Comput Math Appl 64(5):1044–1055

    Article  MATH  Google Scholar 

  16. Liu S, Zhang T (2017) Novel unequal clustering routing protocol considering energy balancing based on Network Partition & Distance for Mobile education. J Netw Comput Appl 88(15): 1–9

    Google Scholar 

  17. Zhang DG, Niu HL, Liu S (2017) Novel PEECR-based clustering routing approach. Soft Comput 21(24):7313–7323

    Article  Google Scholar 

  18. Zhang DG, Ge H, Zhang T (2018) New multi-hop clustering algorithm for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 7:1–14

    Article  Google Scholar 

  19. Zhang T, Dong Y (2018) Novel optimized link state routing protocol based on quantum genetic strategy for Mobile learning. J Netw Comput Appl 122(15):37–49

    Article  Google Scholar 

  20. Liu S, Liu XH (2018) Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO). Int J Commun Syst 13(8):1–15

    Google Scholar 

  21. Marti S, Giuli T, Lai K, Baker M (2000) Mitigating routing misbehavior in Mobile ad hoc networks. Proceedings of Annual ACM/ IEEE International Conference on Mobile Computing and Networking, pp. 255–265

  22. Pappadimitratos P, Haas ZJ (2006) Secure data communication in Mobile ad hoc networks. IEEE J Sel Areas Commun 24(2):343–356

    Article  Google Scholar 

  23. Govindan K, Mohapatra P (2011) Trust computations and trust dynamics in mobile ad hoc networks: a survey. IEEE Commun Surv Tutorials 99:1–20

    Google Scholar 

  24. Esch J (2010) A survey of trust and reputation management systems in wireless communications. Proc IEEE 98(10):1755–1772

    Article  Google Scholar 

  25. Momani M, Challa S (2010) Survey of trust models in different network domains. Int J Ad Hoc Sensor Ubiquitous Comput 1(3):1–19

    Article  Google Scholar 

  26. Ramana KS, Chari A, Kasiviswanth N (2010) A survey on trust management for mobile adhoc networks. Int J Netw Secur Appl 13(4):562–583

    Google Scholar 

  27. Abusalah LA (2008) Khokhar, Guizani, M.: survey of secure Mobile ad hoc routing protocols. IEEE Commun Surv Tutorials 19(4):78–93

    Article  Google Scholar 

  28. Moe MEG, Helvik BE, Knapskog SJ (2008) TSR: trust-based secure MANET routing using HMMs. Proceedings of ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp83–90

  29. Luo J, Liu X, Fan M (2009) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53(14):2396–2407

    Article  MATH  Google Scholar 

  30. Kulothungan K, Angel Arul Jothi J, Kannan A (2011) An adaptive fault tolerant routing protocol with error reporting scheme for wireless sensor networks. Eur J Sci Res 16(1):19–32

    Google Scholar 

  31. Ren J, Zhang Y, Zhang K, Shen XS (2014) Exploiting channel-aware reputation system against selective forwarding attacks in WSNs. In Proceedings of IEEE GLOBECOM, pp. 330–335

  32. Ren J, Zhang Y, Zhang K, Shen X (2016) Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans Wirel Commun 15(5):3718–3731

    Article  Google Scholar 

  33. Ren J, Zhang Y, Zhang K, Shen XS (2015) SACRM: social aware crowdsourcing with reputation management in mobile sensing. Comput Commun 65:55–65

    Article  Google Scholar 

  34. Bao F, Chen R, Chang M, Cho JH (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manage 9(2):169–183

    Article  Google Scholar 

  35. Li R, Li J, Liu P, Chen H (2007) An objective trust management framework for mobile ad hoc networks. Proceedings of IEEE vehicular technology conference, pp. 55–60

  36. Jerusha S, Kulothungan K, Kannan A (2012) Location aware cluster based routing in wireless sensor networks. International Journal of Computer & Communication Technology 3(5):1–6

    Google Scholar 

  37. Xia H, Jia Z, Sha EHM (2014) Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inf Secur 8(2):88–103

    Article  Google Scholar 

  38. Li R, Li J, Liu P, Kato J (2009) A novel hybrid trust management framework for MANETs, Distributed computing systems workshops 29th IEEE international conference: 251–256

  39. Das A, Islam MM (2012) Secured trust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans Dependable Secure Comput 9(2):261–274

    Article  Google Scholar 

  40. Eissa T, Razak SA, Khokhar RH, Samian N (2013) Trust-based routing mechanism in MANET: design and implementation. Mobile Netw Appl 18(5):666–677

    Article  Google Scholar 

  41. Feng Li JW (2010) Uncertainty modeling and reduction in MANETs. IEEE Trans Mob Comput 9(7):1035–1048

    Article  Google Scholar 

  42. Haddadou N, Rachedi A, Ghamri-Doudane Y (2015) A job market signaling scheme for incentive and trust management in vehicular ad hoc networks. IEEE Trans Veh Technol 64(8):3657–3674

    Article  Google Scholar 

  43. Xia H, Jia Z, Ju L, Zhu Y (2011) Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wireless Sens Syst 1(4):248–266

    Article  Google Scholar 

  44. Yu L, Liu Z, Gao Y, Samba D (2012) Trust evaluation model based on behavior space classification for ad hoc networks. Tsinghua Sci Technol 17(2):179–185

    Article  Google Scholar 

  45. Saloua C, Salim C (2016) Dynamic fuzzy logic and reinforcement learning for adaptive energy efficient routing in mobile ad-hoc networks. Appl Soft Comput 38:321–328

    Article  Google Scholar 

  46. Kumar K, Singh V (2014) Power consumption based simulation model for mobile ad-hoc network. Wirel Pers Commun 77:1437–1448

    Article  Google Scholar 

  47. Logambigai R, Kannan A (2016) Fuzzy logic based unequal clustering for wireless sensor networks. Wirel Netw 22(3):945–957

    Article  Google Scholar 

  48. Rachedi A, Benslimane A (2009) Toward a cross-layer monitoring process for mobile ad hoc networks. Secur Commun Netw 2(4):351–368

    Article  Google Scholar 

  49. Gazdar T, Rachedi A, Benslimane A, Belghith A (2012) A distributed advanced analytical trust model for VANETs. Proc IEEE Globecom:201–206

  50. Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf Secur 6:77–83

    Article  Google Scholar 

  51. Nanaware PM, Babar SD (2016) Trust system based intrusion detection in mobile ad hoc network (MANET). In Proceedings of the IEEE International Conference on Next Generation Intelligent Systems (ICNGIS), pp. 1–4

  52. Rafsanjani MK, Fatemidokht H (2015) FBeeAdHoc: a secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs. AEU Int J Electron Commun 69(11):1613–1621

    Article  Google Scholar 

  53. Ghaffari A (2017) Real-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms. Wirel Netw 23:1613–1621

    Article  Google Scholar 

  54. Griffiths N, Jhumka A, Dawson A, Myers R (2008) A simple trust model for on-demand routing in mobile ad-hoc networks. In Proceedings of the Intelligent Distributed Computing:105–114

  55. Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD cup 99 data set. In Proceedings of IEEE symposium on computational intelligence in security and defense applications, pp. 53–58

  56. Ganapathy S, Vijayakumar P (2016) Palanichamy Yogesh & Arputharaj Kannan.: an intelligent CRF based feature selection for effective intrusion detection. Int Arab J Inf Technol 13(1):44–50

    Google Scholar 

  57. Abdelaziz C, Kerrache N, Calafate LCT, Juan-Carlos C, Manzoni P (2016) T-VNets: a novel trust architecture for vehicular networks using the standardized messaging services of ETSI ITS. Comput Commun 93(1):68–83

    Google Scholar 

  58. Ahmed S, Al-Rubeaai S, Tepe K (2017) Novel trust framework for vehicular networks. IEEE Trans Veh Technol 66(10):9498–9511

    Article  Google Scholar 

  59. Vijayakumar P, Azees M, Kannan A, Jegatha Deborah L (2015) Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):1015–1028

    Article  Google Scholar 

  60. Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient routing algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769

    Article  Google Scholar 

  61. Hai DT, Le Vinh T (2017) Novel fuzzy clustering scheme for 3D wireless sensor networks. Appl Soft Comput 54:141–149

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. R. Rajeswari.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajeswari, A.R., Kulothungan, K., Ganapathy, S. et al. A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Netw. Appl. 12, 1076–1096 (2019). https://doi.org/10.1007/s12083-019-00766-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00766-8

Keywords

Navigation