Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2023

02-10-2023

A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network

Authors: Meena Rao, Parul Chaudhary, Kavita Sheoran, Geetika Dhand

Published in: Peer-to-Peer Networking and Applications | Issue 6/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile ad hoc networks (MANETs) are autonomous networks where mobile nodes are connected with one another over wireless links using multi-hop transmission. Malicious attacks can severely disrupt routing setup and data transmission, seriously compromising the security and normal functioning of MANETs. This paper introduces regression and clustering techniques to compute the trust values of nodes and improve the routing of transferred packets in the MANET. Initially, the trust value of each node is detected with the help of the routing paths’ reputation. However, the trust evaluation using mathematical methods is challenging due to the ambiguity of the attack and the network’s diversity. To tackle this issue, the proposed model transforms the computation of the node’s trust values into a linear regression problem and solves this problem using Stacked Autoencoder with Sparse Bayesian Regression (SAE-SBR). After evaluating the trust value, a private collaborative K-means (PCK-means) clustering approach is proposed for clustering the nodes into benign or malicious based on the obtained trust values of nodes. Finally, the path that contains few nodes in the low trust value group and medium trust value group is chosen as the optimal routing path. The simulation results show that the proposed method minimizes the end-to-end delay time to 0.023 s in the presence of 10 malicious nodes. Also, it achieved a maximum throughput of 95.568 KbpS, a maximum detection accuracy of 94% and a maximum packet delivery ratio of 99.5%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Mirza S, ZebaBakshi S (2018) Introduction to MANET. Int Res J Eng Technol 5(1):17–20 Mirza S, ZebaBakshi S (2018) Introduction to MANET. Int Res J Eng Technol 5(1):17–20
3.
go back to reference Gupta P, Tripathi S, Singh S (2021) Energy efficient rendezvous points based routing technique using multiple mobile sink in heterogeneous wireless sensor networks. Wireless Netw 27:3733–3746CrossRef Gupta P, Tripathi S, Singh S (2021) Energy efficient rendezvous points based routing technique using multiple mobile sink in heterogeneous wireless sensor networks. Wireless Netw 27:3733–3746CrossRef
4.
go back to reference Thangaramya K, Kulothungan K, Gandhi SI, Selvi M, Kumar SVNS, Arputharaj K (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24:16483–16497CrossRef Thangaramya K, Kulothungan K, Gandhi SI, Selvi M, Kumar SVNS, Arputharaj K (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24:16483–16497CrossRef
5.
go back to reference Ramphull D, Mungur A, Armoogum S, Pudaruth S (2021) A review of mobile ad hoc NETwork (MANET) Protocols and their Applications. In2021 5th international conference on intelligent computing and control systems (ICICCS) IEEE 204–211 Ramphull D, Mungur A, Armoogum S, Pudaruth S (2021) A review of mobile ad hoc NETwork (MANET) Protocols and their Applications. In2021 5th international conference on intelligent computing and control systems (ICICCS) IEEE 204–211
6.
go back to reference Kaur G, Thakur P (2019) Routing protocols in manet: an overview. in2019 2nd international conference on intelligent computing. Instrum Control Technol (ICICICT) IEEE 1:935–941 Kaur G, Thakur P (2019) Routing protocols in manet: an overview. in2019 2nd international conference on intelligent computing. Instrum Control Technol (ICICICT) IEEE 1:935–941
7.
go back to reference Mohindra AR, Gandhi C (2021) A secure cryptography based clustering mechanism for improving the data transmission in MANET. Walailak J Sci Technol (WJST) 18(6):8987–9018CrossRef Mohindra AR, Gandhi C (2021) A secure cryptography based clustering mechanism for improving the data transmission in MANET. Walailak J Sci Technol (WJST) 18(6):8987–9018CrossRef
8.
go back to reference Rajeswari AR, Ganapathy S, Kulothungan K, Kannan A (2021) An efficient trust-based secure energy-aware clustering to mitigate trust distortion attack in mobile ad-hoc network. Concurr Comput Prac Exp 33(13):6223CrossRef Rajeswari AR, Ganapathy S, Kulothungan K, Kannan A (2021) An efficient trust-based secure energy-aware clustering to mitigate trust distortion attack in mobile ad-hoc network. Concurr Comput Prac Exp 33(13):6223CrossRef
9.
go back to reference Pandey P, Singh R (2022) Efficient ad hoc on demand distance vector routing protocol based on route stability in MANETs. Int J Wireless Inf Networks 29(3):393–404CrossRef Pandey P, Singh R (2022) Efficient ad hoc on demand distance vector routing protocol based on route stability in MANETs. Int J Wireless Inf Networks 29(3):393–404CrossRef
10.
go back to reference Rajeswari AR, Kulothungan K, Ganapathy S, Kannan A (2019) A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Netw Appl 12:1076–1096CrossRef Rajeswari AR, Kulothungan K, Ganapathy S, Kannan A (2019) A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Netw Appl 12:1076–1096CrossRef
11.
go back to reference Prasath N, Sreemathy J (2019) Optimized dynamic source routing protocol for MANETs. Clust Comput 22(5):12397–12409CrossRef Prasath N, Sreemathy J (2019) Optimized dynamic source routing protocol for MANETs. Clust Comput 22(5):12397–12409CrossRef
12.
go back to reference Mahamune AA, Chandane MM (2023) Trust-based co-operative routing for secure communication in mobile ad hoc networks. Digit Commun Netw Mahamune AA, Chandane MM (2023) Trust-based co-operative routing for secure communication in mobile ad hoc networks. Digit Commun Netw
13.
go back to reference Veeraiah N, Krishna BT (2020) An approach for optimal-secure multi-path routing and intrusion detection in MANET. Evol Intell 1–15 Veeraiah N, Krishna BT (2020) An approach for optimal-secure multi-path routing and intrusion detection in MANET. Evol Intell 1–15
14.
go back to reference Subburayalu G, Duraivelu H, Raveendran AP, Arunachalam R, Kongara D, Thangavel C (2021) Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier. J Appl Secur Res 1–19 Subburayalu G, Duraivelu H, Raveendran AP, Arunachalam R, Kongara D, Thangavel C (2021) Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier. J Appl Secur Res 1–19
15.
go back to reference Zardari ZA, Memon KA, Shah RA, Dehraj S, Ahmed I (2021) A lightweight technique for detection and prevention of wormhole attack in MANET. EAI Endorsed Trans Scalable Inf Syst 8(29):e2–e2 Zardari ZA, Memon KA, Shah RA, Dehraj S, Ahmed I (2021) A lightweight technique for detection and prevention of wormhole attack in MANET. EAI Endorsed Trans Scalable Inf Syst 8(29):e2–e2
16.
go back to reference Kalidoss T, Rajasekaran L, Kanagasabai K, Sannasi G, Kannan A (2020) QoS aware trust based routing algorithm for wireless sensor networks. Wireless Pers Commun 110:1637–1658CrossRef Kalidoss T, Rajasekaran L, Kanagasabai K, Sannasi G, Kannan A (2020) QoS aware trust based routing algorithm for wireless sensor networks. Wireless Pers Commun 110:1637–1658CrossRef
17.
go back to reference Muruganandam S, Srinivasan N, Sivaprakasam A (2022) An Intelligent Method for Intrusion Detection and Prevention in Mobile AdHoc Networks. Int J Intell Syst Appl Eng 10(3):154–160 Muruganandam S, Srinivasan N, Sivaprakasam A (2022) An Intelligent Method for Intrusion Detection and Prevention in Mobile AdHoc Networks. Int J Intell Syst Appl Eng 10(3):154–160
18.
go back to reference Hussain MS, Khan KUR (2020) A survey of ids techniques in manets using machine-learning. In: Proceedings of the Third International Conference on Computational Intelligence and Informatics: ICCII 2018, Springer Singapore, 743–751 Hussain MS, Khan KUR (2020) A survey of ids techniques in manets using machine-learning. In: Proceedings of the Third International Conference on Computational Intelligence and Informatics: ICCII 2018, Springer Singapore, 743–751
19.
go back to reference Dilipkumar S, Durairaj M (2021) Epilson Swarm Optimized Cluster Gradient and deep belief classifier for multi-attack intrusion detection in MANET. J Ambient Intell Humaniz Comput 1–16 Dilipkumar S, Durairaj M (2021) Epilson Swarm Optimized Cluster Gradient and deep belief classifier for multi-attack intrusion detection in MANET. J Ambient Intell Humaniz Comput 1–16
20.
go back to reference Fatemidokht H, Rafsanjani MK, Gupta BB, Hsu C-H (2021) Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Trans Intell Transp Syst 22(7):4757–4769CrossRef Fatemidokht H, Rafsanjani MK, Gupta BB, Hsu C-H (2021) Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Trans Intell Transp Syst 22(7):4757–4769CrossRef
21.
go back to reference Ghasemnezhad S, Ghaffari A (2018) Fuzzy logic based reliable and real-time routing protocol for mobile ad hoc networks. Wireless Pers Commun 98:593–611CrossRef Ghasemnezhad S, Ghaffari A (2018) Fuzzy logic based reliable and real-time routing protocol for mobile ad hoc networks. Wireless Pers Commun 98:593–611CrossRef
22.
go back to reference Mohammadi P, Ghaffari A (2019) Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Pers Commun 106:365–376CrossRef Mohammadi P, Ghaffari A (2019) Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Pers Commun 106:365–376CrossRef
23.
go back to reference Seyfollahi A, Moodi M, Ghaffari A (2022) MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications. Comput Stand Interfaces 82:103622CrossRef Seyfollahi A, Moodi M, Ghaffari A (2022) MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications. Comput Stand Interfaces 82:103622CrossRef
24.
go back to reference Yang H (2020) A study on improving secure routing performance using trust model in MANET. Mob Inf Syst 1–17 Yang H (2020) A study on improving secure routing performance using trust model in MANET. Mob Inf Syst 1–17
25.
go back to reference Pathan MS, Zhu N, He J, Zardari ZA, Memon MQ, Hussain MI (2018) An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10(2):16CrossRef Pathan MS, Zhu N, He J, Zardari ZA, Memon MQ, Hussain MI (2018) An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10(2):16CrossRef
26.
go back to reference Chiejina E, Xiao H, Christianson B, Mylonas A, Chiejina C (2022) A robust Dirichlet reputation and trust evaluation of nodes in mobile ad hoc networks. Sensors 22(2):571CrossRef Chiejina E, Xiao H, Christianson B, Mylonas A, Chiejina C (2022) A robust Dirichlet reputation and trust evaluation of nodes in mobile ad hoc networks. Sensors 22(2):571CrossRef
27.
go back to reference Yamini KAP, Stephy J, Suthendran K, Ravi V (2022) Improving routing disruption attack detection in MANETs using efficient trust establishment. Trans Emerg Telecommun Technol 33(5):e4446CrossRef Yamini KAP, Stephy J, Suthendran K, Ravi V (2022) Improving routing disruption attack detection in MANETs using efficient trust establishment. Trans Emerg Telecommun Technol 33(5):e4446CrossRef
28.
go back to reference Hemalatha S, Kshirsagar PR, Manoharan H, Gowri NV, Vani A, Qaiyum S, Vijayakumar P (2022) Novel link establishment communication scheme against selfish attack using node reward with trust level evaluation algorithm in MANET. Wirel Commun Mob Comput Hemalatha S, Kshirsagar PR, Manoharan H, Gowri NV, Vani A, Qaiyum S, Vijayakumar P (2022) Novel link establishment communication scheme against selfish attack using node reward with trust level evaluation algorithm in MANET. Wirel Commun Mob Comput
29.
go back to reference Geetika D, Tyagi SS (2019) SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks. Wirel Pers Commun 105(1):17–35 Geetika D, Tyagi SS (2019) SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks. Wirel Pers Commun 105(1):17–35
30.
go back to reference Geetika D, Sheoran K (2021) Protocols SMEER (Secure Multitier Energy Efficient Routing Protocol) and SCOR (Secure Elliptic curve based Chaotic key Galois Cryptography on Opportunistic Routing). Mater Today Proc 37:1324–1327CrossRef Geetika D, Sheoran K (2021) Protocols SMEER (Secure Multitier Energy Efficient Routing Protocol) and SCOR (Secure Elliptic curve based Chaotic key Galois Cryptography on Opportunistic Routing). Mater Today Proc 37:1324–1327CrossRef
31.
go back to reference Meena R, Singh N (2018) Energy Efficient QoS Aware Hierarchical KF-MAC Routing Protocol in Manet. Wirel Pers Commun, Springer Link, ISSN: 0929–6212 80(3):1–14 Meena R, Singh N (2018) Energy Efficient QoS Aware Hierarchical KF-MAC Routing Protocol in Manet. Wirel Pers Commun, Springer Link, ISSN: 0929–6212 80(3):1–14
32.
go back to reference Mukesh KG, Singh N, Rao M (2017) Design and Implementation of Trust-based Secure Routing Protocol for MANETs. Int J Appl Eng Res 12(16):5440–5446 Mukesh KG, Singh N, Rao M (2017) Design and Implementation of Trust-based Secure Routing Protocol for MANETs. Int J Appl Eng Res 12(16):5440–5446
33.
go back to reference Veeraiah N, Khalaf OI, Prasad CVPR, Alotaibi Y, Alsufyani A, Alghamdi SA, Alsufyani N (2021) Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 9:120996–121005CrossRef Veeraiah N, Khalaf OI, Prasad CVPR, Alotaibi Y, Alsufyani A, Alghamdi SA, Alsufyani N (2021) Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 9:120996–121005CrossRef
34.
go back to reference Pathan MS, He J, Zhu N, Zardari ZA, Memon MQ, Azmat A (2019) An efficient scheme for detection and prevention of black hole attacks in AODV-based MANETs. Int J Adv Comput Sci Appl 10(1) Pathan MS, He J, Zhu N, Zardari ZA, Memon MQ, Azmat A (2019) An efficient scheme for detection and prevention of black hole attacks in AODV-based MANETs. Int J Adv Comput Sci Appl 10(1)
35.
go back to reference Devika B, Sudha PN (2020) Power optimization in MANET using topology management. Eng Sci Technol Int J 23(3):565–575 Devika B, Sudha PN (2020) Power optimization in MANET using topology management. Eng Sci Technol Int J 23(3):565–575
36.
go back to reference Liu L, Xu X, Liu Y, Ma Z, Peng J (2021) A detection framework against CPMA attack based on trust evaluation and machine learning in IoT network. IEEE Internet Things J 8(20):15249–15258CrossRef Liu L, Xu X, Liu Y, Ma Z, Peng J (2021) A detection framework against CPMA attack based on trust evaluation and machine learning in IoT network. IEEE Internet Things J 8(20):15249–15258CrossRef
Metadata
Title
A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network
Authors
Meena Rao
Parul Chaudhary
Kavita Sheoran
Geetika Dhand
Publication date
02-10-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01560-3

Other articles of this Issue 6/2023

Peer-to-Peer Networking and Applications 6/2023 Go to the issue

Premium Partner