Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2022

20.07.2022

Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network

verfasst von: V. Thirunavukkarasu, A. Senthil Kumar, P. Prakasam

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An Internet of Things (IoT) is a superior technology that will connect more number of wired/wireless devices through an internet. The Mobile Adhoc Network (MANET) is s wireless system which will connect the wireless devices through low bandwidth wireless links. Hence, Integrating MANET with IoT greatly improves the performance of the IoT subject to energy constrained and trusted security. Protecting the ad hoc routing from the black hole attacks, Byzantine flooding, Location disclosure attacks etc., seems to be a very difficult issue in the previous researches. To overcome the aforementioned security issues, a novel methodology called Cluster and Angular based Energy Proficient Trusted Routing (ACEPTR) protocol is proposed in this research article. Initially, Node Credit Score (NCS) is calculated to compute trust ratio for the nodes. The credit score calculation includes both Self-Trust computation and Joint-Trust computation. Once highest NCS is computed then angular energy based route selection process is carried out to form the clusters since cluster based routing reduces energy consumption extensively. The conventional communication control process is applied for finding node’s transmission range so that data can be transmitted over angular energy based highest NCS nodes. The simulation results obtained is compared with the conventional schemes and the metrics proved that the proposed scheme achieves better system performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Suma V (2021) Internet-of-Things (IoT) based Smart Agriculture in India-An Overview. J ISMAC 3(01):1–15CrossRef Suma V (2021) Internet-of-Things (IoT) based Smart Agriculture in India-An Overview. J ISMAC 3(01):1–15CrossRef
2.
Zurück zum Zitat Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708CrossRef Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708CrossRef
3.
Zurück zum Zitat Doukas C, Maglogiannis I (2012) Bringing iot and cloud computing towards pervasive healthcare. In: Proceedings of the IEEE 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 922–926 Doukas C, Maglogiannis I (2012) Bringing iot and cloud computing towards pervasive healthcare. In: Proceedings of the IEEE 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 922–926
4.
Zurück zum Zitat Bohli JM, Skarmeta A, Moreno MV, García D, Langendorfer P (2015) Smartie project: Secure IoT data management for smart cities. In: Proceedings of the IEEE International Conference on Recent Advances in Internet of Things (RIoT), 1–6 Bohli JM, Skarmeta A, Moreno MV, García D, Langendorfer P (2015) Smartie project: Secure IoT data management for smart cities. In: Proceedings of the IEEE International Conference on Recent Advances in Internet of Things (RIoT), 1–6
5.
Zurück zum Zitat Dandala TT, Krishnamurthy V, Alwan R (2017) Internet of Vehicles (IoV) for traffic management. In: Proceedings of the International Conference on Computer, Communication and Signal Processing (ICCCSP), 1–4 Dandala TT, Krishnamurthy V, Alwan R (2017) Internet of Vehicles (IoV) for traffic management. In: Proceedings of the International Conference on Computer, Communication and Signal Processing (ICCCSP), 1–4
6.
Zurück zum Zitat Zhan G, Shi W, Deng J (2011) Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Trans Dependable Secur Comput 9(2):184–197CrossRef Zhan G, Shi W, Deng J (2011) Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Trans Dependable Secur Comput 9(2):184–197CrossRef
7.
Zurück zum Zitat Cho J-H, Swami A, Chen R (2010) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13(4):562–583CrossRef Cho J-H, Swami A, Chen R (2010) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13(4):562–583CrossRef
8.
Zurück zum Zitat Chen, Xin J-H, Cho, Zhu S (2014) GlobalTrust: An attack-resilient reputation system for tactical networks. In: Proceedings of the Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking, 275–283 Chen, Xin J-H, Cho, Zhu S (2014) GlobalTrust: An attack-resilient reputation system for tactical networks. In: Proceedings of the Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking, 275–283
10.
Zurück zum Zitat Misra, Sudip P, Venkata Krishna, AkhilBhiwal AS, Chawla BE, Wolfinger, Lee C (2012) A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks. J Supercomputing 62(1):04–23CrossRef Misra, Sudip P, Venkata Krishna, AkhilBhiwal AS, Chawla BE, Wolfinger, Lee C (2012) A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks. J Supercomputing 62(1):04–23CrossRef
11.
Zurück zum Zitat Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun Surv tutorials 15(4):2027–2045CrossRef Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun Surv tutorials 15(4):2027–2045CrossRef
12.
Zurück zum Zitat Rathish CR, Karpagavadivu K, Sindhuja P, Kousalya A (2021) A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET. Inform Technol Control 50(1):45–54CrossRef Rathish CR, Karpagavadivu K, Sindhuja P, Kousalya A (2021) A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET. Inform Technol Control 50(1):45–54CrossRef
13.
Zurück zum Zitat Venkataraman R, Rama Rao T (2012) Regression-based trust model for mobile ad hoc networks. IET Inf Secur 6(3):131–140CrossRef Venkataraman R, Rama Rao T (2012) Regression-based trust model for mobile ad hoc networks. IET Inf Secur 6(3):131–140CrossRef
14.
Zurück zum Zitat Gunasekaran M, and KandhasamyPremalatha (2013) TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks. IET Inf Secur 7(3):203–211CrossRef Gunasekaran M, and KandhasamyPremalatha (2013) TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks. IET Inf Secur 7(3):203–211CrossRef
15.
Zurück zum Zitat Wei Z, Tang H, Yu FR, Wang M, Mason P (2014) Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans Veh Technol 63(9):4647–4658CrossRef Wei Z, Tang H, Yu FR, Wang M, Mason P (2014) Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans Veh Technol 63(9):4647–4658CrossRef
16.
Zurück zum Zitat Usha MS, Ravishankar KC (2021) Implementation of trust-based novel approach for security enhancements in MANETs. SN Comput Sci 2(4):1–7CrossRef Usha MS, Ravishankar KC (2021) Implementation of trust-based novel approach for security enhancements in MANETs. SN Comput Sci 2(4):1–7CrossRef
18.
Zurück zum Zitat Shabut AM, Keshav P, Dahal SK, Bista, Irfan U, Awan (2015) Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 14(10):2101–2115CrossRef Shabut AM, Keshav P, Dahal SK, Bista, Irfan U, Awan (2015) Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 14(10):2101–2115CrossRef
19.
Zurück zum Zitat Wang Y, Chen R, Cho J-H, Jeffrey JPT (2017) Trust-based task assignment with multiobjective optimization in service-oriented ad hoc networks. IEEE Trans Netw Serv Manage 14(1):217–232CrossRef Wang Y, Chen R, Cho J-H, Jeffrey JPT (2017) Trust-based task assignment with multiobjective optimization in service-oriented ad hoc networks. IEEE Trans Netw Serv Manage 14(1):217–232CrossRef
20.
Zurück zum Zitat Cai R, Jun XJ, Li, Peter Han Joo Chong (2019) An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans Mob Comput 18(1):42–55CrossRef Cai R, Jun XJ, Li, Peter Han Joo Chong (2019) An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans Mob Comput 18(1):42–55CrossRef
21.
Zurück zum Zitat Yun J, Chung J-M (2018) Centralized trust-based secure routing in wireless networks. IEEE Wirel Commun Lett 7(6):1066–1069CrossRef Yun J, Chung J-M (2018) Centralized trust-based secure routing in wireless networks. IEEE Wirel Commun Lett 7(6):1066–1069CrossRef
22.
Zurück zum Zitat Wang X, Zhang P, Du Y, Mei Qi (2020) Trust Routing Protocol Based on Cloud-Based Fuzzy Petri Net and Trust Entropy for Mobile Ad hoc Network. IEEE Access 8:47675–47693CrossRef Wang X, Zhang P, Du Y, Mei Qi (2020) Trust Routing Protocol Based on Cloud-Based Fuzzy Petri Net and Trust Entropy for Mobile Ad hoc Network. IEEE Access 8:47675–47693CrossRef
23.
Zurück zum Zitat Ponguwala M, Rao S (2019) E2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT. IET Commun 13(19):3207–3216CrossRef Ponguwala M, Rao S (2019) E2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT. IET Commun 13(19):3207–3216CrossRef
25.
Zurück zum Zitat Jhaveri RH, Patel NM, Zhong Y, Sangaiah AK (2018) Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT. IEEE Access 6:20085–20103CrossRef Jhaveri RH, Patel NM, Zhong Y, Sangaiah AK (2018) Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT. IEEE Access 6:20085–20103CrossRef
26.
Zurück zum Zitat Cho J-H, Chen R (2019) COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks. IEEE Access 7:92296–92313CrossRef Cho J-H, Chen R (2019) COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks. IEEE Access 7:92296–92313CrossRef
27.
Zurück zum Zitat Xia H, Li Z, Zheng Y, Liu A, Choi Y-J, Sekiya H (2018) A novel light-weight subjective trust inference framework in MANETs. IEEE Trans Sustainable Comput 5(2):236–248CrossRef Xia H, Li Z, Zheng Y, Liu A, Choi Y-J, Sekiya H (2018) A novel light-weight subjective trust inference framework in MANETs. IEEE Trans Sustainable Comput 5(2):236–248CrossRef
28.
Zurück zum Zitat Manasrah AM, Gupta BB (2019) An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment. Cluster Comput 22(1):1639–1653CrossRef Manasrah AM, Gupta BB (2019) An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment. Cluster Comput 22(1):1639–1653CrossRef
29.
Zurück zum Zitat Mirsadeghi F, Rafsanjani MK, Gupta BB (2020) A trust infrastructure based authentication method for clustered vehicular ad hoc networks.Peer-to-Peer Networking and Applications,1–17 Mirsadeghi F, Rafsanjani MK, Gupta BB (2020) A trust infrastructure based authentication method for clustered vehicular ad hoc networks.Peer-to-Peer Networking and Applications,1–17
30.
31.
Zurück zum Zitat Fatemidokht H, Rafsanjani MK, Gupta BB, Hsu CH (2021) Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular Ad Hoc networks in intelligent transportation systems. IEEE Trans Intell Transp Syst 22(7):4757–4769. doi: https://doi.org/10.1109/TITS.2020.3041746CrossRef Fatemidokht H, Rafsanjani MK, Gupta BB, Hsu CH (2021) Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular Ad Hoc networks in intelligent transportation systems. IEEE Trans Intell Transp Syst 22(7):4757–4769. doi: https://​doi.​org/​10.​1109/​TITS.​2020.​3041746CrossRef
33.
Zurück zum Zitat Veeraiah N, Khalaf OI, Prasad CVPR, Alotaibi Y, Alsufyani A, Alghamdi SA, Alsufyani N (2021) Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 9:120996–121005CrossRef Veeraiah N, Khalaf OI, Prasad CVPR, Alotaibi Y, Alsufyani A, Alghamdi SA, Alsufyani N (2021) Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 9:120996–121005CrossRef
Metadaten
Titel
Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network
verfasst von
V. Thirunavukkarasu
A. Senthil Kumar
P. Prakasam
Publikationsdatum
20.07.2022
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2022
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01340-5

Weitere Artikel der Ausgabe 5/2022

Peer-to-Peer Networking and Applications 5/2022 Zur Ausgabe

Premium Partner