Skip to main content
Top
Published in: Wireless Networks 7/2022

14-06-2022 | Original Paper

Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks

Authors: Ranjit Kumar, Sachin Tripathi, Rajeev Agrawal

Published in: Wireless Networks | Issue 7/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The openness nature of the Ad-hoc sensor networks emerged as a security threat in this network environment that leads to packets drop, network overhead, high range energy consumption, and transmission delay. Previous methods such as Trust-Based Malicious Nodes Detection in AD-hoc (TBMND) and Security based Data-Aware Routing Protocol (SDARP) found that this happens due to malicious nodes in the network. A malicious node in a network degrades its efficiency that also affects the routing decision making and also makes error decisions in route selection. Trust vector model and Trust-based Secure Routing (TBSR) have made attempts to evaluate trust nodes via various techniques, but unfortunately, the accuracy level has not been reached to the required range. In this paper, a trust-based energy-aware routing using GEOSR protocol for Ad-hoc sensor networks is presented for providing an energy-efficient and secured routing. In this trust-based energy-aware routing, initially the sensor nodes are deployed in the ad-hoc network. The clustering is performed based on the estimation of distance among the each nodes and the cluster head (CH) is selected based on the threshold value. After CH selection, the trust evaluation is performed for identify the trust and untrusted nodes present in the network. The untrusted node is considered as malicious node which is detected and blocked. The trusted nodes are forwarded to select the optimal routing path for secured transmission. Golden Eagle Optimized Secure Routing (GEOSR) is introduced for selecting the optimal routing path based on the parameters such as distance delay and energy objective function. Thus, energy-efficient and secured routing were done using the GEOSR protocol. GEOSR protocol was then implemented in the NS-2 simulation tool and then compared with existing techniques. GEOSR protocol shows 95% of residual energy for the prediction of two malicious nodes. Thus GEOSR was suitable for real-time applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Thiagarajan, R., Babu, M. R., & Moorthi, M. (2021). Quality of service based Ad hoc on-demand multipath distance vector routing protocol in mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(5), 4957–4965.CrossRef Thiagarajan, R., Babu, M. R., & Moorthi, M. (2021). Quality of service based Ad hoc on-demand multipath distance vector routing protocol in mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(5), 4957–4965.CrossRef
2.
go back to reference Hassan, M. H., Mostafa, S. A., Mahdin, H., Mustapha, A., & Ramli, A. A. (2021). Hassan MH and Jubair MA Mobile ad-hoc network routing protocols of time-critical events for search and rescue missions. Bulletin of Electrical Engineering and Informatics, 10(1), 192–199.CrossRef Hassan, M. H., Mostafa, S. A., Mahdin, H., Mustapha, A., & Ramli, A. A. (2021). Hassan MH and Jubair MA Mobile ad-hoc network routing protocols of time-critical events for search and rescue missions. Bulletin of Electrical Engineering and Informatics, 10(1), 192–199.CrossRef
3.
go back to reference Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile Ad-Hoc network (MANET). IEEE Access, 9, 11872–11883.CrossRef Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile Ad-Hoc network (MANET). IEEE Access, 9, 11872–11883.CrossRef
4.
go back to reference Akhter, A. F. M., Ahmed, M., Shah, A. F. M., Anwar, A., Kayes, A. S. M., & Zengin, A. (2021). A blockchain-based authentication protocol for cooperative vehicular ad hoc network. Sensors, 21(4), 1273.CrossRef Akhter, A. F. M., Ahmed, M., Shah, A. F. M., Anwar, A., Kayes, A. S. M., & Zengin, A. (2021). A blockchain-based authentication protocol for cooperative vehicular ad hoc network. Sensors, 21(4), 1273.CrossRef
5.
go back to reference Rana, K. K., Tripathi, S., & Raw, R. S. (2021). Fuzzy logic-based directional location routing in vehicular ad hoc network. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 91(1), 135–146.CrossRef Rana, K. K., Tripathi, S., & Raw, R. S. (2021). Fuzzy logic-based directional location routing in vehicular ad hoc network. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 91(1), 135–146.CrossRef
6.
go back to reference Sridevi, N., & Nagarajan, V. (2021). Efficient traffic control and lifetime maximization in mobile ad hoc network by using PSO–BAT optimization. Wireless Networks, 27(2), 861–870.CrossRef Sridevi, N., & Nagarajan, V. (2021). Efficient traffic control and lifetime maximization in mobile ad hoc network by using PSO–BAT optimization. Wireless Networks, 27(2), 861–870.CrossRef
7.
go back to reference Zhang, X., Li, R., Hou, W., & Shi, J. (2021). Research on Manhattan distance based trust management in vehicular Ad hoc network. Security and Communication Networks, 2021. Zhang, X., Li, R., Hou, W., & Shi, J. (2021). Research on Manhattan distance based trust management in vehicular Ad hoc network. Security and Communication Networks, 2021.
8.
go back to reference Anand, M., Balaji, N., Bharathiraja, N., & Antonidoss, A. (2021). A controlled framework for reliable multicast routing protocol in mobile ad hoc network. Materials Today: Proceedings Anand, M., Balaji, N., Bharathiraja, N., & Antonidoss, A. (2021). A controlled framework for reliable multicast routing protocol in mobile ad hoc network. Materials Today: Proceedings
9.
go back to reference Hanin, M. H., Amani, M., & Fakhri, Y. (2021). Improved TCP prediction congestion in mobile Ad hoc network based on cross-layer and fuzzy logic. International Journal of Interactive Mobile Technologies, 15(14), 125.CrossRef Hanin, M. H., Amani, M., & Fakhri, Y. (2021). Improved TCP prediction congestion in mobile Ad hoc network based on cross-layer and fuzzy logic. International Journal of Interactive Mobile Technologies, 15(14), 125.CrossRef
10.
go back to reference Mohammed, A., Abdullah, N. F., Alani, S., Alheety, O. S., Shaker, M. M., Saad, M. A., & Mahmood, S. N. (2021). Weighted round robin scheduling algorithms in mobile AD HOC network. In: 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), IEEE, 1–5. Mohammed, A., Abdullah, N. F., Alani, S., Alheety, O. S., Shaker, M. M., Saad, M. A., & Mahmood, S. N. (2021). Weighted round robin scheduling algorithms in mobile AD HOC network. In: 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), IEEE, 1–5.
11.
go back to reference Maakar, S. K., Khurana, M., Chakraborty, C., Sinwar. D., & Srivastava, D. (2021). Performance evaluation of AODV and DSR routing protocols for flying Ad hoc network using highway mobility model. Journal of Circuits, Systems and Computers, 2250008. Maakar, S. K., Khurana, M., Chakraborty, C., Sinwar. D., & Srivastava, D. (2021). Performance evaluation of AODV and DSR routing protocols for flying Ad hoc network using highway mobility model. Journal of Circuits, Systems and Computers, 2250008.
12.
go back to reference Reddy, M. V. K. & PremKumar, S. (2021) Predicting the malfunctioning node in mobile Ad Hoc network. Design Engineering 8337–8346. Reddy, M. V. K. & PremKumar, S. (2021) Predicting the malfunctioning node in mobile Ad Hoc network. Design Engineering 8337–8346.
13.
go back to reference Papadimitratos, P., & Haas, Z. J. (2006). Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 343–356.CrossRef Papadimitratos, P., & Haas, Z. J. (2006). Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 343–356.CrossRef
14.
go back to reference Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., & Lam, K. Y. (2010). Trust based routing for misbehavior detection in ad hoc networks. Journal of Networks, 5(5), 551.CrossRef Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., & Lam, K. Y. (2010). Trust based routing for misbehavior detection in ad hoc networks. Journal of Networks, 5(5), 551.CrossRef
15.
go back to reference Bertino, E. (2014). Data trustworthiness—approaches and research challenges. In: Data privacy management, autonomous spontaneous security, and security assurance, Springer, Cham, 17–25. Bertino, E. (2014). Data trustworthiness—approaches and research challenges. In: Data privacy management, autonomous spontaneous security, and security assurance, Springer, Cham, 17–25.
16.
go back to reference Malar, A., Kowsigan, M., Krishnamoorthy, N., Karthick, S., Prabhu, E., & Venkatachalam, K. (2021). Multi constraints applied energy efficient routing technique based on ant colony optimization used for disaster resilient location detection in mobile ad-hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(3), 4007–4017.CrossRef Malar, A., Kowsigan, M., Krishnamoorthy, N., Karthick, S., Prabhu, E., & Venkatachalam, K. (2021). Multi constraints applied energy efficient routing technique based on ant colony optimization used for disaster resilient location detection in mobile ad-hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(3), 4007–4017.CrossRef
17.
go back to reference Poongodi, M., Hamdi, M., Sharma, A., Ma, M., & Singh, P. K. (2019). DDoS detection mechanism using trust-based evaluation system in VANET. IEEE Access, 7, 183532–183544.CrossRef Poongodi, M., Hamdi, M., Sharma, A., Ma, M., & Singh, P. K. (2019). DDoS detection mechanism using trust-based evaluation system in VANET. IEEE Access, 7, 183532–183544.CrossRef
18.
go back to reference Gunasekaran, M., & Periakaruppan, S. (2017). A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks. International Journal of Electronics, 104(6), 993–1007.CrossRef Gunasekaran, M., & Periakaruppan, S. (2017). A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks. International Journal of Electronics, 104(6), 993–1007.CrossRef
19.
go back to reference Kim, B., & Song, J. (2019). Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2019(1), 1–16.CrossRef Kim, B., & Song, J. (2019). Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2019(1), 1–16.CrossRef
20.
go back to reference Jhaveri, R. H., & Patel, N. M. (2017). Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. International Journal of Communication Systems, 30(7), e3148.CrossRef Jhaveri, R. H., & Patel, N. M. (2017). Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. International Journal of Communication Systems, 30(7), e3148.CrossRef
21.
go back to reference Jhaveri, R. H. & Patel, N. M. (2016). Evaluating energy efficiency of secure routing schemes for mobile Ad-Hoc networks. International Journal of Next-Generation Computing, 7(2). Jhaveri, R. H. & Patel, N. M. (2016). Evaluating energy efficiency of secure routing schemes for mobile Ad-Hoc networks. International Journal of Next-Generation Computing7(2).
22.
go back to reference Salam, A., Javaid, Q., & Ahmad, M. (2020). Bioinspired mobility-aware clustering optimization in flying ad hoc sensor network for internet of things: BIMAC-FASNET. Complexity. Salam, A., Javaid, Q., & Ahmad, M. (2020). Bioinspired mobility-aware clustering optimization in flying ad hoc sensor network for internet of things: BIMAC-FASNET. Complexity.
23.
go back to reference Kumar, K. V., Jayasankar, T., Eswaramoorthy, V., & Nivedhitha, V. (2020). SDARP: Security based data aware routing protocol for ad hoc sensor networks. International Journal of Intelligent Networks, 1, 36–42.CrossRef Kumar, K. V., Jayasankar, T., Eswaramoorthy, V., & Nivedhitha, V. (2020). SDARP: Security based data aware routing protocol for ad hoc sensor networks. International Journal of Intelligent Networks, 1, 36–42.CrossRef
24.
go back to reference Sajan, R. I., & Jasper, J. (2020). Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network. International Journal of Communication Systems, 33(8), e4341.CrossRef Sajan, R. I., & Jasper, J. (2020). Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network. International Journal of Communication Systems, 33(8), e4341.CrossRef
25.
go back to reference Ahmed, A., Kamalrulnizam, A. B., Muhammad, I. C., Khalid, H., & Abdul, W. K. (2015). TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal, 15(12), 6962–6972.CrossRef Ahmed, A., Kamalrulnizam, A. B., Muhammad, I. C., Khalid, H., & Abdul, W. K. (2015). TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal, 15(12), 6962–6972.CrossRef
26.
go back to reference Haseeb, K., Naveed, I., Ahmad, A., Ikram, U. D., Almajed, H. N., & Nadra, G. (2019). Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access, 7, 79980–79988.CrossRef Haseeb, K., Naveed, I., Ahmad, A., Ikram, U. D., Almajed, H. N., & Nadra, G. (2019). Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access, 7, 79980–79988.CrossRef
27.
go back to reference Selvi, M., Thangaramya, K., Sannasi, G., Kanagasabai, K., Khannah Nehemiah, H., & Arputharaj, K. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks.". Wireless Personal Communications, 105(4), 1475–1490.CrossRef Selvi, M., Thangaramya, K., Sannasi, G., Kanagasabai, K., Khannah Nehemiah, H., & Arputharaj, K. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks.". Wireless Personal Communications, 105(4), 1475–1490.CrossRef
28.
go back to reference Zahedi, A., & Parma, F. (2019). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 12(1), 167–176.CrossRef Zahedi, A., & Parma, F. (2019). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 12(1), 167–176.CrossRef
29.
go back to reference Kavidha, V., & Ananthakumaran, S. (2019). Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink. Peer-to-Peer Networking and Applications, 12(4), 881–892.CrossRef Kavidha, V., & Ananthakumaran, S. (2019). Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink. Peer-to-Peer Networking and Applications, 12(4), 881–892.CrossRef
30.
go back to reference Vinitha, A. & Rukmini, M. S. S. (2019). Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. Journal of King Saud University-Computer and Information Sciences. Vinitha, A. & Rukmini, M. S. S. (2019). Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. Journal of King Saud University-Computer and Information Sciences.
Metadata
Title
Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks
Authors
Ranjit Kumar
Sachin Tripathi
Rajeev Agrawal
Publication date
14-06-2022
Publisher
Springer US
Published in
Wireless Networks / Issue 7/2022
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-022-02991-1

Other articles of this Issue 7/2022

Wireless Networks 7/2022 Go to the issue