Abstract
In the contemporary technology context, several physical things may be used to support human activities. The Internet of Things is a cutting-edge technology solution that is used to link physical items with the digital world via a range of networks as well as communication technologies. The Internet of Things benefits from the smart settings in which mobile ad hoc networks (MANET) operate, making it more appealing to users and financially viable. Wireless sensors with MANETs may be integrated using the Internet of Things to develop new MANET-IoT devices and IT-based networks. Such a strategy lowers network deployment costs while increasing user mobility. That does, however, also bring up fresh, challenging issues about networking concerns. We introduced a new DAG-Blockchain architecture for MANET-IoT security in this study. The Multi-Factor PUF identification technique protects the network. Network topology is separated into clusters with all allowed nodes. We introduced the Secure Trust-based Dijikstra’s Method with numerous criteria for secure data transfer. We presented a Bi-Directional GRU for deep packet analysis. Deep packet inspection is used to identify intrusions, which are then blocked by a blocking mechanism. The suggested method achieved increased efficiency in the packet delivery ratio, productivity, time analysis, detection accuracy, and security level using the combination of algorithms. The numerical findings from the simulation and analysis of the proposed DAG-IDS in the WSN-IoT network reveal significant improvements across various performance metrics. Specifically, the DAG-IDS demonstrates enhanced network lifetime, achieving up to 220 cycles compared to 100 cycles in the BLOCKCHAIN method. The analysis also highlights superior packet delivery ratios (PDR) exceeding 90%, reduced delays, and efficient throughput, showcasing the effectiveness of the proposed approach in optimizing the network's quality of service, energy efficiency, and security.









Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
Sharmila, Kumar D, Kumar P, Ashok A (2020) Introduction to multimedia big data computing for IoT. Multimedia Big Data Computing for IoT Applications: Concepts. Paradigms and Solutions 3–36. https://doi.org/10.1007/978-981-13-8759-3_1
Marathe NR, Shinde SK (2021) Multidimensional Multi-Attribute Approach to Counter the Routing Attacks on MANET. Wireless Pers Commun 119:1993–2016. https://doi.org/10.1007/s11277-021-08315-4
Mujeeb SM, Sam RP, Kasa M (2020) Energy- and trust-aware secure routing algorithm for big data classification using MapReduce framework in IoT networks. Int J Model Simul Sci Comput 12: 2150010:1–2150010:24. https://doi.org/10.1142/S1793962321500100
Muzammal SM, Murugesan RK, Jhanjhi NZ (2021) A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches. IEEE Internet Things J 8:4186–4210. https://doi.org/10.1109/JIOT.2020.3031162
Aravind K, Maddikunta PK (2022) Multiobjectives for Optimal Geographic Routing in IoT Health Care System. Complex 2022:7568804:1–7568804:15. https://doi.org/10.1155/2022/7568804
Arulselvan G, Rajaram A (2023) Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs. J Intell Fuzzy Syst. https://doi.org/10.3233/JIFS-231905
Hashemi SY, Aliee FS (2020) Fuzzy, Dynamic and Trust Based Routing Protocol for IoT. J Netw Syst Manage 28:1248–1278. https://doi.org/10.1007/s10922-020-09535-y
Cao J, Wang X, Huang M, Yi B, He Q (2021) A security‐driven network architecture for routing in industrial Internet of Things. Trans Emerg Telecommun Technol 32. https://doi.org/10.1002/ett.4216
NiranjanM M, Kenchaiah N (2020) Secure and optimized method of providing trustworthiness for iot sensors in low-power wan deployments. https://www.tdcommons.org/dpubs_series/3692
Mabodi K, Yusefi M, Zandiyan S, Irankhah L, Fotohi R (2020) Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J Supercomput 76:7081–7106. https://doi.org/10.1007/s11227-019-03137-5
Javaid N (2022) A Secure and Efficient Trust Model for Wireless Sensor IoTs Using Blockchain. IEEE Access 10:4568–4579. https://doi.org/10.1109/ACCESS.2022.3140401
Nargunam AS (2020) Dynamic Security Scheme for MANET. https://www.irma-international.org/viewtitle/33406/?isxn=9781599049298
Safdar Malik T, Siddiqui MN, Mateen M, Malik KR, Sun S, Wen J (2022) Comparison of Blackhole and Wormhole Attacks in Cloud MANET Enabled IoT for Agricultural Field Monitoring. Security Commun Netw. https://doi.org/10.1155/2022/4943218
Mujeeb SM, Sam RP, Kasa M (2021) Adaptive EHTARA: An Energy-Efficient and Trust Aware Secure Routing Algorithm for Big Data Classification in IoT Network. Wireless Pers Commun 121:621–646. https://doi.org/10.1007/s11277-021-08653-3
Gayathri A, Prabu AJ, Rajasoundaran S, Routray S, Narayanasamy P, Kumar DN, Qi Y (2022) Cooperative and feedback based authentic routing protocol for energy efficient IoT systems. Concurrency and Comput: Pract Exp 34. https://doi.org/10.1002/cpe.6886.
Raj MG (2022) Chaotic Whale Crow Optimization Algorithm for Secure Routing In Iot Environment. Int J Semant Web Inf Syst. https://doi.org/10.4018/IJSWIS.300824
Lakshmi GV, Vaishnavi P (2022) An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution. Wireless Pers Commun 124:333–348. https://doi.org/10.1007/s11277-021-09359-2
Rajaram, A. and Baskar, A (2023) Hybrid Optimization-Based Multi-Path Routing for Dynamic Cluster-Based MANET. Cybernetics and Systems. https://doi.org/10.1080/01969722.2023.2166249
Sugumaran VR, RajaramA. Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs. J Intell Fuzzy Syst 1–16. https://doi.org/10.3233/JIFS-231340
Premanand RP, Rajaram A (2020) Enhanced data accuracy based PATH discovery using backing route selection algorithm in MANET. Peer-to-Peer Networking Appl 13(6):2089–2098. https://doi.org/10.1007/s12083-019-00824-1
Anil GN (2021) Multi-level Trust Modelling to Resist Impact of Routing Attacks on Reliable Data/Communication Transactions in MANET-IoT Ecosystem. Softw Eng Algorithm. https://doi.org/10.1007/978-3-030-77442-4_17
Revathi B, Arulanandam K (2021) Design And Development of Robust And Secure Cluster Routing Algorithm For Manet Based IOT. International Journal of Computer Trends and Technology 69(8)15-19. https://doi.org/10.14445/22312803/IJCTT-V69I8P104
Krishnamoorthy VK, Izonin I, Subramanian S, Shandilya SK, Velayutham S, Munichamy TR, Havryliuk M (2023) Energy Saving Optimization Technique-Based Routing Protocol in Mobile Ad-Hoc Network with IoT Environment. Energies. https://doi.org/10.3390/en16031385
Bai PT (2022) RMBSRA: Routing Manager Based Secure Route Analysis Mechanism for Achieving Secure Routing Protocol in IOT MANET. https://doi.org/10.22247/ijcna/2022/212331
Rajeswari AR, Kulothungan K, Ganapathy S, Kannan A (2021) Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT. J Intell Fuzzy Syst 40:9197–9211. https://doi.org/10.3233/JIFS-201633
Usturge SI, Kumar TP (2022) DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot. Information Security Journal: A Global Perspective 32:331–346. https://doi.org/10.1080/19393555.2022.2053002
Dupak L, Banerjee S (2022) Hybrid trust and weight evaluation-based trust assessment using ECK-ANFIS and AOMDV-REPO-based optimal routing in MANET environment. J Supercomput 78:17074–17094. https://doi.org/10.1007/s11227-022-04530-3
Baba AM, Apeh ST, Erameh KB (2021) Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET. Advances in Multidisciplinary and scientific Research Journal Publication. https://doi.org/10.22624/aims%2Fabmic2021p12.
Kumari A, Gupta R, Tanwar S, Kumar N (2020) A taxonomy of blockchain-enabled softwarization for secure UAV network. Comput Commun 161:304–323. https://doi.org/10.1016/j.comcom.2020.07.042
Acknowledgements
There is no acknowledgement involved in this work.
Funding
No funding is involved in this work.
Author information
Authors and Affiliations
Contributions
Authorship contributions
Corresponding author
Ethics declarations
Ethics approval and consent to participate:
No participation of humans takes place in this implementation process.
Human and animal rights
No violation of Human and Animal Rights is involved.
Conflict of interest
Conflict of Interest is not applicable in this work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ilakkiya, N., Rajaram, A. A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment. Multimed Tools Appl 83, 87903–87928 (2024). https://doi.org/10.1007/s11042-024-18845-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-024-18845-1