Skip to main content
Erschienen in: Wireless Networks 7/2022

14.06.2022 | Original Paper

Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks

verfasst von: Ranjit Kumar, Sachin Tripathi, Rajeev Agrawal

Erschienen in: Wireless Networks | Ausgabe 7/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The openness nature of the Ad-hoc sensor networks emerged as a security threat in this network environment that leads to packets drop, network overhead, high range energy consumption, and transmission delay. Previous methods such as Trust-Based Malicious Nodes Detection in AD-hoc (TBMND) and Security based Data-Aware Routing Protocol (SDARP) found that this happens due to malicious nodes in the network. A malicious node in a network degrades its efficiency that also affects the routing decision making and also makes error decisions in route selection. Trust vector model and Trust-based Secure Routing (TBSR) have made attempts to evaluate trust nodes via various techniques, but unfortunately, the accuracy level has not been reached to the required range. In this paper, a trust-based energy-aware routing using GEOSR protocol for Ad-hoc sensor networks is presented for providing an energy-efficient and secured routing. In this trust-based energy-aware routing, initially the sensor nodes are deployed in the ad-hoc network. The clustering is performed based on the estimation of distance among the each nodes and the cluster head (CH) is selected based on the threshold value. After CH selection, the trust evaluation is performed for identify the trust and untrusted nodes present in the network. The untrusted node is considered as malicious node which is detected and blocked. The trusted nodes are forwarded to select the optimal routing path for secured transmission. Golden Eagle Optimized Secure Routing (GEOSR) is introduced for selecting the optimal routing path based on the parameters such as distance delay and energy objective function. Thus, energy-efficient and secured routing were done using the GEOSR protocol. GEOSR protocol was then implemented in the NS-2 simulation tool and then compared with existing techniques. GEOSR protocol shows 95% of residual energy for the prediction of two malicious nodes. Thus GEOSR was suitable for real-time applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Thiagarajan, R., Babu, M. R., & Moorthi, M. (2021). Quality of service based Ad hoc on-demand multipath distance vector routing protocol in mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(5), 4957–4965.CrossRef Thiagarajan, R., Babu, M. R., & Moorthi, M. (2021). Quality of service based Ad hoc on-demand multipath distance vector routing protocol in mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(5), 4957–4965.CrossRef
2.
Zurück zum Zitat Hassan, M. H., Mostafa, S. A., Mahdin, H., Mustapha, A., & Ramli, A. A. (2021). Hassan MH and Jubair MA Mobile ad-hoc network routing protocols of time-critical events for search and rescue missions. Bulletin of Electrical Engineering and Informatics, 10(1), 192–199.CrossRef Hassan, M. H., Mostafa, S. A., Mahdin, H., Mustapha, A., & Ramli, A. A. (2021). Hassan MH and Jubair MA Mobile ad-hoc network routing protocols of time-critical events for search and rescue missions. Bulletin of Electrical Engineering and Informatics, 10(1), 192–199.CrossRef
3.
Zurück zum Zitat Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile Ad-Hoc network (MANET). IEEE Access, 9, 11872–11883.CrossRef Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile Ad-Hoc network (MANET). IEEE Access, 9, 11872–11883.CrossRef
4.
Zurück zum Zitat Akhter, A. F. M., Ahmed, M., Shah, A. F. M., Anwar, A., Kayes, A. S. M., & Zengin, A. (2021). A blockchain-based authentication protocol for cooperative vehicular ad hoc network. Sensors, 21(4), 1273.CrossRef Akhter, A. F. M., Ahmed, M., Shah, A. F. M., Anwar, A., Kayes, A. S. M., & Zengin, A. (2021). A blockchain-based authentication protocol for cooperative vehicular ad hoc network. Sensors, 21(4), 1273.CrossRef
5.
Zurück zum Zitat Rana, K. K., Tripathi, S., & Raw, R. S. (2021). Fuzzy logic-based directional location routing in vehicular ad hoc network. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 91(1), 135–146.CrossRef Rana, K. K., Tripathi, S., & Raw, R. S. (2021). Fuzzy logic-based directional location routing in vehicular ad hoc network. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 91(1), 135–146.CrossRef
6.
Zurück zum Zitat Sridevi, N., & Nagarajan, V. (2021). Efficient traffic control and lifetime maximization in mobile ad hoc network by using PSO–BAT optimization. Wireless Networks, 27(2), 861–870.CrossRef Sridevi, N., & Nagarajan, V. (2021). Efficient traffic control and lifetime maximization in mobile ad hoc network by using PSO–BAT optimization. Wireless Networks, 27(2), 861–870.CrossRef
7.
Zurück zum Zitat Zhang, X., Li, R., Hou, W., & Shi, J. (2021). Research on Manhattan distance based trust management in vehicular Ad hoc network. Security and Communication Networks, 2021. Zhang, X., Li, R., Hou, W., & Shi, J. (2021). Research on Manhattan distance based trust management in vehicular Ad hoc network. Security and Communication Networks, 2021.
8.
Zurück zum Zitat Anand, M., Balaji, N., Bharathiraja, N., & Antonidoss, A. (2021). A controlled framework for reliable multicast routing protocol in mobile ad hoc network. Materials Today: Proceedings Anand, M., Balaji, N., Bharathiraja, N., & Antonidoss, A. (2021). A controlled framework for reliable multicast routing protocol in mobile ad hoc network. Materials Today: Proceedings
9.
Zurück zum Zitat Hanin, M. H., Amani, M., & Fakhri, Y. (2021). Improved TCP prediction congestion in mobile Ad hoc network based on cross-layer and fuzzy logic. International Journal of Interactive Mobile Technologies, 15(14), 125.CrossRef Hanin, M. H., Amani, M., & Fakhri, Y. (2021). Improved TCP prediction congestion in mobile Ad hoc network based on cross-layer and fuzzy logic. International Journal of Interactive Mobile Technologies, 15(14), 125.CrossRef
10.
Zurück zum Zitat Mohammed, A., Abdullah, N. F., Alani, S., Alheety, O. S., Shaker, M. M., Saad, M. A., & Mahmood, S. N. (2021). Weighted round robin scheduling algorithms in mobile AD HOC network. In: 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), IEEE, 1–5. Mohammed, A., Abdullah, N. F., Alani, S., Alheety, O. S., Shaker, M. M., Saad, M. A., & Mahmood, S. N. (2021). Weighted round robin scheduling algorithms in mobile AD HOC network. In: 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), IEEE, 1–5.
11.
Zurück zum Zitat Maakar, S. K., Khurana, M., Chakraborty, C., Sinwar. D., & Srivastava, D. (2021). Performance evaluation of AODV and DSR routing protocols for flying Ad hoc network using highway mobility model. Journal of Circuits, Systems and Computers, 2250008. Maakar, S. K., Khurana, M., Chakraborty, C., Sinwar. D., & Srivastava, D. (2021). Performance evaluation of AODV and DSR routing protocols for flying Ad hoc network using highway mobility model. Journal of Circuits, Systems and Computers, 2250008.
12.
Zurück zum Zitat Reddy, M. V. K. & PremKumar, S. (2021) Predicting the malfunctioning node in mobile Ad Hoc network. Design Engineering 8337–8346. Reddy, M. V. K. & PremKumar, S. (2021) Predicting the malfunctioning node in mobile Ad Hoc network. Design Engineering 8337–8346.
13.
Zurück zum Zitat Papadimitratos, P., & Haas, Z. J. (2006). Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 343–356.CrossRef Papadimitratos, P., & Haas, Z. J. (2006). Secure data communication in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 343–356.CrossRef
14.
Zurück zum Zitat Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., & Lam, K. Y. (2010). Trust based routing for misbehavior detection in ad hoc networks. Journal of Networks, 5(5), 551.CrossRef Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., & Lam, K. Y. (2010). Trust based routing for misbehavior detection in ad hoc networks. Journal of Networks, 5(5), 551.CrossRef
15.
Zurück zum Zitat Bertino, E. (2014). Data trustworthiness—approaches and research challenges. In: Data privacy management, autonomous spontaneous security, and security assurance, Springer, Cham, 17–25. Bertino, E. (2014). Data trustworthiness—approaches and research challenges. In: Data privacy management, autonomous spontaneous security, and security assurance, Springer, Cham, 17–25.
16.
Zurück zum Zitat Malar, A., Kowsigan, M., Krishnamoorthy, N., Karthick, S., Prabhu, E., & Venkatachalam, K. (2021). Multi constraints applied energy efficient routing technique based on ant colony optimization used for disaster resilient location detection in mobile ad-hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(3), 4007–4017.CrossRef Malar, A., Kowsigan, M., Krishnamoorthy, N., Karthick, S., Prabhu, E., & Venkatachalam, K. (2021). Multi constraints applied energy efficient routing technique based on ant colony optimization used for disaster resilient location detection in mobile ad-hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(3), 4007–4017.CrossRef
17.
Zurück zum Zitat Poongodi, M., Hamdi, M., Sharma, A., Ma, M., & Singh, P. K. (2019). DDoS detection mechanism using trust-based evaluation system in VANET. IEEE Access, 7, 183532–183544.CrossRef Poongodi, M., Hamdi, M., Sharma, A., Ma, M., & Singh, P. K. (2019). DDoS detection mechanism using trust-based evaluation system in VANET. IEEE Access, 7, 183532–183544.CrossRef
18.
Zurück zum Zitat Gunasekaran, M., & Periakaruppan, S. (2017). A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks. International Journal of Electronics, 104(6), 993–1007.CrossRef Gunasekaran, M., & Periakaruppan, S. (2017). A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks. International Journal of Electronics, 104(6), 993–1007.CrossRef
19.
Zurück zum Zitat Kim, B., & Song, J. (2019). Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2019(1), 1–16.CrossRef Kim, B., & Song, J. (2019). Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2019(1), 1–16.CrossRef
20.
Zurück zum Zitat Jhaveri, R. H., & Patel, N. M. (2017). Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. International Journal of Communication Systems, 30(7), e3148.CrossRef Jhaveri, R. H., & Patel, N. M. (2017). Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. International Journal of Communication Systems, 30(7), e3148.CrossRef
21.
Zurück zum Zitat Jhaveri, R. H. & Patel, N. M. (2016). Evaluating energy efficiency of secure routing schemes for mobile Ad-Hoc networks. International Journal of Next-Generation Computing, 7(2). Jhaveri, R. H. & Patel, N. M. (2016). Evaluating energy efficiency of secure routing schemes for mobile Ad-Hoc networks. International Journal of Next-Generation Computing7(2).
22.
Zurück zum Zitat Salam, A., Javaid, Q., & Ahmad, M. (2020). Bioinspired mobility-aware clustering optimization in flying ad hoc sensor network for internet of things: BIMAC-FASNET. Complexity. Salam, A., Javaid, Q., & Ahmad, M. (2020). Bioinspired mobility-aware clustering optimization in flying ad hoc sensor network for internet of things: BIMAC-FASNET. Complexity.
23.
Zurück zum Zitat Kumar, K. V., Jayasankar, T., Eswaramoorthy, V., & Nivedhitha, V. (2020). SDARP: Security based data aware routing protocol for ad hoc sensor networks. International Journal of Intelligent Networks, 1, 36–42.CrossRef Kumar, K. V., Jayasankar, T., Eswaramoorthy, V., & Nivedhitha, V. (2020). SDARP: Security based data aware routing protocol for ad hoc sensor networks. International Journal of Intelligent Networks, 1, 36–42.CrossRef
24.
Zurück zum Zitat Sajan, R. I., & Jasper, J. (2020). Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network. International Journal of Communication Systems, 33(8), e4341.CrossRef Sajan, R. I., & Jasper, J. (2020). Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network. International Journal of Communication Systems, 33(8), e4341.CrossRef
25.
Zurück zum Zitat Ahmed, A., Kamalrulnizam, A. B., Muhammad, I. C., Khalid, H., & Abdul, W. K. (2015). TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal, 15(12), 6962–6972.CrossRef Ahmed, A., Kamalrulnizam, A. B., Muhammad, I. C., Khalid, H., & Abdul, W. K. (2015). TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sensors Journal, 15(12), 6962–6972.CrossRef
26.
Zurück zum Zitat Haseeb, K., Naveed, I., Ahmad, A., Ikram, U. D., Almajed, H. N., & Nadra, G. (2019). Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access, 7, 79980–79988.CrossRef Haseeb, K., Naveed, I., Ahmad, A., Ikram, U. D., Almajed, H. N., & Nadra, G. (2019). Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs. IEEE Access, 7, 79980–79988.CrossRef
27.
Zurück zum Zitat Selvi, M., Thangaramya, K., Sannasi, G., Kanagasabai, K., Khannah Nehemiah, H., & Arputharaj, K. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks.". Wireless Personal Communications, 105(4), 1475–1490.CrossRef Selvi, M., Thangaramya, K., Sannasi, G., Kanagasabai, K., Khannah Nehemiah, H., & Arputharaj, K. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks.". Wireless Personal Communications, 105(4), 1475–1490.CrossRef
28.
Zurück zum Zitat Zahedi, A., & Parma, F. (2019). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 12(1), 167–176.CrossRef Zahedi, A., & Parma, F. (2019). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 12(1), 167–176.CrossRef
29.
Zurück zum Zitat Kavidha, V., & Ananthakumaran, S. (2019). Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink. Peer-to-Peer Networking and Applications, 12(4), 881–892.CrossRef Kavidha, V., & Ananthakumaran, S. (2019). Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink. Peer-to-Peer Networking and Applications, 12(4), 881–892.CrossRef
30.
Zurück zum Zitat Vinitha, A. & Rukmini, M. S. S. (2019). Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. Journal of King Saud University-Computer and Information Sciences. Vinitha, A. & Rukmini, M. S. S. (2019). Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. Journal of King Saud University-Computer and Information Sciences.
Metadaten
Titel
Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks
verfasst von
Ranjit Kumar
Sachin Tripathi
Rajeev Agrawal
Publikationsdatum
14.06.2022
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 7/2022
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-022-02991-1

Weitere Artikel der Ausgabe 7/2022

Wireless Networks 7/2022 Zur Ausgabe

Neuer Inhalt