Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2023

16-09-2023

Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET

Authors: V. Krishnakumar, R. Asokan

Published in: Peer-to-Peer Networking and Applications | Issue 6/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile ad hoc network (MANET) is a set of mobile nodes that communicate via wireless networks while moving from one place to another. Numerous studies have been done on increasing reliable between routing nodes, trust management, the use of cryptographic systems, and centralized routing decisions and so on. However, the majority of routing methods are challenging to execute in real-world scenarios, because it is challenging to determine the malicious behaviors of routing nodes. There is still no reliable method to prevent malicious node attacks. Due to these networks' dynamic and decentralized character, packet routing in MANET is difficult. To overcome this problem, this manuscript proposes a Dropout Ensemble Extreme Learning Neural Network (DrpEnXLNN) optimized with Metaheuristic Anopheles Search routing algorithm(MASA) based Token fostered Block chain Technology for trusted distributed optimal routing in Mobile adhoc networks. The aim of this work is to provide the most efficient method for data transmission and generates tokens for packet stream admittance with a secret key that goes to each routing mobile node. Subsequently, the trusted routing information is distributed by proposed block chain(BC) based mobile ad hoc network utilizing DrpEnXLNN optimized with MASA. The proposed technique is simulated in NS-2(Network Simulator) tool. The performance metrics, such as average delay, average latency, average energy consume, throughput of block chain token transactions are evaluated. Finally, the proposed TDRP-MASA-DrpEnXLNN-BCMANET method attains 22% and 14% less delay during 25% spiteful routing environment, 15% and 8% less delay during 50% spiteful routing environment when analyzed to the existing models.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Usman M, Jan MA, He X, Nanda P (2020) QASEC: A secured data communication scheme for mobile Ad-hoc networks. Futur Gener Comput Syst 109:604–610CrossRef Usman M, Jan MA, He X, Nanda P (2020) QASEC: A secured data communication scheme for mobile Ad-hoc networks. Futur Gener Comput Syst 109:604–610CrossRef
2.
go back to reference Tilwari V, Maheswar R, Jayarajan P, Sundararajan TVP, Hindia MHD, Dimyati K, Amiri IS (2020) MCLMR: A multicriteria based multipath routing in the mobile ad hoc networks. Wireless Pers Commun 112(4):2461–2483CrossRef Tilwari V, Maheswar R, Jayarajan P, Sundararajan TVP, Hindia MHD, Dimyati K, Amiri IS (2020) MCLMR: A multicriteria based multipath routing in the mobile ad hoc networks. Wireless Pers Commun 112(4):2461–2483CrossRef
3.
go back to reference Krishnan RS, Julie EG, Robinson YH, Kumar R, Son LH, Tuan TA, Long HV (2020) Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks. Wireless Netw 26(2):1275–1289CrossRef Krishnan RS, Julie EG, Robinson YH, Kumar R, Son LH, Tuan TA, Long HV (2020) Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks. Wireless Netw 26(2):1275–1289CrossRef
4.
go back to reference Bhardwaj A, El-Ocla H (2020) Multipath routing protocol using genetic algorithm in mobile ad hoc networks. IEEE Access 8:177534–177548CrossRef Bhardwaj A, El-Ocla H (2020) Multipath routing protocol using genetic algorithm in mobile ad hoc networks. IEEE Access 8:177534–177548CrossRef
5.
go back to reference Roldán J, Boubeta-Puig J, Martínez JL, Ortiz G (2020) Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks. Expert Syst Appl 149CrossRef Roldán J, Boubeta-Puig J, Martínez JL, Ortiz G (2020) Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks. Expert Syst Appl 149CrossRef
6.
go back to reference Gurung S, Chauhan S (2020) A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wireless Netw 26(3):1981–2011CrossRef Gurung S, Chauhan S (2020) A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wireless Netw 26(3):1981–2011CrossRef
7.
go back to reference El-Semary AM, Diab H (2019) BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map. IEEE Access 7:95197–95211CrossRef El-Semary AM, Diab H (2019) BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map. IEEE Access 7:95197–95211CrossRef
8.
go back to reference Panda N, Pattanayak BK (2018) Defense against co-operative black-hole attack and gray-hole attack in MANET.Int J Eng Technol 7(3.4):84–89 Panda N, Pattanayak BK (2018) Defense against co-operative black-hole attack and gray-hole attack in MANET.Int J Eng Technol 7(3.4):84–89
9.
go back to reference Sivanesh S, Dhulipala VR (2021) Accurate and cognitive intrusion detection system (ACIDS): a novel black hole detection mechanism in mobile ad hoc networks. Mob Netw Appl 26(4):1696–1704CrossRef Sivanesh S, Dhulipala VR (2021) Accurate and cognitive intrusion detection system (ACIDS): a novel black hole detection mechanism in mobile ad hoc networks. Mob Netw Appl 26(4):1696–1704CrossRef
10.
go back to reference Shajin FH, Rajesh P, Nagoji Rao VK (2022) Efficient Framework for Brain Tumour Classification using Hierarchical Deep Learning Neural Network Classifier.Comput Methods Biomech Biomed Eng Imaging Vis1–8 Shajin FH, Rajesh P, Nagoji Rao VK (2022) Efficient Framework for Brain Tumour Classification using Hierarchical Deep Learning Neural Network Classifier.Comput Methods Biomech Biomed Eng Imaging Vis1–8
11.
go back to reference Rajesh P, Shajin FH, Kumaran GK (2022) An Efficient IWOLRS Control Technique of Brushless DC Motor for Torque Ripple Minimization. Appl Sci Eng Prog 15(3):5514–5514 Rajesh P, Shajin FH, Kumaran GK (2022) An Efficient IWOLRS Control Technique of Brushless DC Motor for Torque Ripple Minimization. Appl Sci Eng Prog 15(3):5514–5514
12.
go back to reference Shajin FH, Rajesh P (2020) Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol.Int J Pervasive Comput Commun Shajin FH, Rajesh P (2020) Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol.Int J Pervasive Comput Commun
13.
go back to reference Rajesh P, Shajin F (2020) A multi-objective hybrid algorithm for planning electrical distribution system. Eur J Electr Eng 22(4–5):224–509CrossRef Rajesh P, Shajin F (2020) A multi-objective hybrid algorithm for planning electrical distribution system. Eur J Electr Eng 22(4–5):224–509CrossRef
14.
go back to reference Thota MK, Shajin FH, Rajesh P (2020) Survey on software defect prediction techniques. Int J Appl Sci 17(4):331–344 Thota MK, Shajin FH, Rajesh P (2020) Survey on software defect prediction techniques. Int J Appl Sci 17(4):331–344
15.
go back to reference Montecchi M, Plangger K, Etter M (2019) It’s real, trust me! Establishing supply chain provenance using blockchain. Bus Horiz 62(3):283–293CrossRef Montecchi M, Plangger K, Etter M (2019) It’s real, trust me! Establishing supply chain provenance using blockchain. Bus Horiz 62(3):283–293CrossRef
16.
go back to reference Gupta R, Tanwar S, Kumar N, Tyagi S (2020) Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review.Comput Electr Eng86:106717 Gupta R, Tanwar S, Kumar N, Tyagi S (2020) Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review.Comput Electr Eng86:106717
17.
go back to reference Liu Y, Yu FR, Li X, Ji H, Leung VC (2020) Blockchain and machine learning for communications and networking systems. IEEE Commun Surv Tutor 22(2):1392–1431CrossRef Liu Y, Yu FR, Li X, Ji H, Leung VC (2020) Blockchain and machine learning for communications and networking systems. IEEE Commun Surv Tutor 22(2):1392–1431CrossRef
18.
go back to reference Makhdoom I, Zhou I, Abolhasan M, Lipman J, Ni W (2020) PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput Secur 88CrossRef Makhdoom I, Zhou I, Abolhasan M, Lipman J, Ni W (2020) PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput Secur 88CrossRef
19.
go back to reference Rahman MS, Khalil I, Moustafa N, Kalapaaking AP, Bouras A (2021) A blockchain-enabled privacy-preserving verifiable query framework for securing cloud-assisted industrial internet of things systems. IEEE Trans Industr Inf 18(7):5007–5017CrossRef Rahman MS, Khalil I, Moustafa N, Kalapaaking AP, Bouras A (2021) A blockchain-enabled privacy-preserving verifiable query framework for securing cloud-assisted industrial internet of things systems. IEEE Trans Industr Inf 18(7):5007–5017CrossRef
20.
go back to reference Ajao LA, Umar BU, Olajide DO, Misra S (2022) Application of crypto-blockchain technology for securing electronic voting systems. In Blockchain Applications in the Smart Era (85-105). Cham: Springer International Publishing Ajao LA, Umar BU, Olajide DO, Misra S (2022) Application of crypto-blockchain technology for securing electronic voting systems. In Blockchain Applications in the Smart Era (85-105). Cham: Springer International Publishing
21.
go back to reference Ren Y, Leng Y, Qi J, Sharma PK, Wang J, Almakhadmeh Z, Tolba A (2021) Multiple cloud storage mechanism based on blockchain in smart homes. Futur Gener Comput Syst 115:304–313CrossRef Ren Y, Leng Y, Qi J, Sharma PK, Wang J, Almakhadmeh Z, Tolba A (2021) Multiple cloud storage mechanism based on blockchain in smart homes. Futur Gener Comput Syst 115:304–313CrossRef
22.
go back to reference Karale S, Ranaware V (2019) Applications of blockchain technology in smart city development: a research. Int J Innov Technol 8(11):556–559 Karale S, Ranaware V (2019) Applications of blockchain technology in smart city development: a research. Int J Innov Technol 8(11):556–559
23.
go back to reference Thebiga M, SujiPramila R (2020) A new mathematical and correlation coefficient based approach to recognize and to obstruct the black hole attacks in MANETs using DSR routing. Wireless Pers Commun 114(2):975–993CrossRef Thebiga M, SujiPramila R (2020) A new mathematical and correlation coefficient based approach to recognize and to obstruct the black hole attacks in MANETs using DSR routing. Wireless Pers Commun 114(2):975–993CrossRef
24.
go back to reference Balaji S, Julie EG, Robinson YH, Kumar R, Thong PH (2019) Design of a security-aware routing scheme in mobile ad-hoc network using repeated game model. Comput Stand Interfaces 66:103358CrossRef Balaji S, Julie EG, Robinson YH, Kumar R, Thong PH (2019) Design of a security-aware routing scheme in mobile ad-hoc network using repeated game model. Comput Stand Interfaces 66:103358CrossRef
25.
go back to reference Kanagasundaram H, Kathirvel A (2019) EIMO-ESOLSR: energy efficient and security-based model for OLSR routing protocol in mobile ad-hoc network. IET Commun 13(5):553–559CrossRef Kanagasundaram H, Kathirvel A (2019) EIMO-ESOLSR: energy efficient and security-based model for OLSR routing protocol in mobile ad-hoc network. IET Commun 13(5):553–559CrossRef
26.
go back to reference Wang X, Zhang P, Du Y, Qi M (2020) Trust routing protocol based on cloud-based fuzzy petri net and trust entropy for mobile ad hoc network. IEEE Access 8:47675–47693CrossRef Wang X, Zhang P, Du Y, Qi M (2020) Trust routing protocol based on cloud-based fuzzy petri net and trust entropy for mobile ad hoc network. IEEE Access 8:47675–47693CrossRef
27.
go back to reference Wang T, Guo J, Ai S, Cao J (2021) RBT: A distributed reputation system for blockchain-based peer-to-peer energy trading with fairness consideration. Appl Energy 295CrossRef Wang T, Guo J, Ai S, Cao J (2021) RBT: A distributed reputation system for blockchain-based peer-to-peer energy trading with fairness consideration. Appl Energy 295CrossRef
28.
go back to reference Zhai J, Zang L, Zhou Z (2018) Ensemble dropout extreme learning machine via fuzzy integral for data classification. Neurocomputing 275:1043–1052CrossRef Zhai J, Zang L, Zhou Z (2018) Ensemble dropout extreme learning machine via fuzzy integral for data classification. Neurocomputing 275:1043–1052CrossRef
29.
go back to reference Jiao Z, Zhang B, Zhang L, Liu M, Gong W, Li C (2020) A blockchain-based computing architecture for mobile Ad Hoc cloud. IEEE Netw 34(4):140–149CrossRef Jiao Z, Zhang B, Zhang L, Liu M, Gong W, Li C (2020) A blockchain-based computing architecture for mobile Ad Hoc cloud. IEEE Netw 34(4):140–149CrossRef
30.
go back to reference Lwin MT, Yim J, Ko YB (2020) Blockchain-based lightweight trust management in mobile ad-hoc networks. Sensors 20(3):698CrossRef Lwin MT, Yim J, Ko YB (2020) Blockchain-based lightweight trust management in mobile ad-hoc networks. Sensors 20(3):698CrossRef
31.
go back to reference Abdel-Sattar AS, Azer MA (2022) Using Blockchain Technology in MANETs Security. In2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) 489-494. IEEE Abdel-Sattar AS, Azer MA (2022) Using Blockchain Technology in MANETs Security. In2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) 489-494. IEEE
32.
go back to reference Manjula T, Anand B (2021) A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network. J Ambient Intell Humaniz Comput 12(3):3621–3631CrossRef Manjula T, Anand B (2021) A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network. J Ambient Intell Humaniz Comput 12(3):3621–3631CrossRef
33.
go back to reference Machado C, Westphall CM (2021) Blockchain incentivized data forwarding in MANETs: Strategies and challenges. Ad Hoc Netw 110CrossRef Machado C, Westphall CM (2021) Blockchain incentivized data forwarding in MANETs: Strategies and challenges. Ad Hoc Netw 110CrossRef
34.
go back to reference Boddu N, Boba V, Vatambeti R (2022) A novel georouting potency based optimum spider monkey approach for avoiding congestion in energy efficient mobile ad-hoc network. 127(2):1157-1186 Boddu N, Boba V, Vatambeti R (2022) A novel georouting potency based optimum spider monkey approach for avoiding congestion in energy efficient mobile ad-hoc network. 127(2):1157-1186
35.
go back to reference Maruthupandi J, Prasanna S, Jayalakshmi P, Mareeswari V, Sanjeevi P (2021) Route manipulation aware software-defined networks for effective routing in SDN controlled MANET by disney routing protocol. Microprocess Microsyst 80CrossRef Maruthupandi J, Prasanna S, Jayalakshmi P, Mareeswari V, Sanjeevi P (2021) Route manipulation aware software-defined networks for effective routing in SDN controlled MANET by disney routing protocol. Microprocess Microsyst 80CrossRef
36.
go back to reference Raja L, Periasamy PS (2022) A Trusted distributed routing scheme for wireless sensor networks using block chain and jelly fish search optimizer based deep generative adversarial neural network (Deep-GANN) technique. Wireless Pers Commun 126(2):1101–1128CrossRef Raja L, Periasamy PS (2022) A Trusted distributed routing scheme for wireless sensor networks using block chain and jelly fish search optimizer based deep generative adversarial neural network (Deep-GANN) technique. Wireless Pers Commun 126(2):1101–1128CrossRef
Metadata
Title
Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET
Authors
V. Krishnakumar
R. Asokan
Publication date
16-09-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01551-4

Other articles of this Issue 6/2023

Peer-to-Peer Networking and Applications 6/2023 Go to the issue

Premium Partner