Abstract
Security in communication is an important and challenging issue in the recent years. In the past, many secure routing algorithms have been proposed to provide energy efficiency and security in Mobile Ad hoc Networks. However due to the increase in attackers and new types of attacks, the existing secure routing techniques are challenged by malicious users. In order to handle these problems, a new trust and fuzzy cluster based dynamic secure routing algorithm is proposed in this paper for enhancing energy efficiency and security. For this purpose, a new trust model which uses historical trust, neighbor trust and behavioral trust is proposed in this work for isolating the malicious nodes in the routing process. Moreover, the fuzzy clustering technique proposed in this paper provides energy efficiency by applying cluster head based routing, cluster head rotation and fuzzy decision making. The fuzzy rules also help to handle the uncertainty occurring due to the movement of nodes in the network. From the experiments conducted in this work, it is proved that the proposed algorithm enhances the security of communication which in turn increases the packet delivery ratio and reduces the delay.
Similar content being viewed by others
References
Chen, A., Xu, G., & Yang, Y. (2008). A cluster-based trust model for mobile ad hoc networks. In 4th international conference on wireless communications, networking and mobile computing (pp. 1–4).
Perkins, C. E., & Royer, E. M. (2002). Ad hoc on-demand distance vector routing. In Second IEEE workshop on mobile computing systems and applications (WMCSA ‘99) (pp. 123–135)
Tang, S., & Zhang, B. (2004). A robust AODV protocol with local update. In 10th Asia Pacific conference on communications (Vol. 1, No. 29, pp. 418–422).
Das, A., & Islam, M. M. (2012). Secured trust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261–274.
Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2017). An intelligent secured and energy efficient routing algorithm for MANETs. Wireless Personal Communications, 96(2), 1753–1769.
Selvi, M., Logambigai, R., Ganapathy, S., Sai Ramesh, L., Khanna Nehemiah, H., & Arputharaj, K. (2016) Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics, ACM digital library (pp. 117–122).
Logambigai, R., & Kannan, A. (2016). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks, 22(3), 945–957.
Bao, F., Chen, I.-R., Chang, M. J., & Cho, J.-H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions Network and Service Management, 9(2), 169–183.
Zhou, L., & Haas, Z. (1999). Securing ad hoc networks. IEEE Network, 13(6), 24–30.
El-said, S. A., Osamaa, A., & Hassanien, A. E. (2016). Optimized hierarchical routing technique for wireless sensors networks. Soft Computing, 20, 4549–4564.
Sarma, H. K. D., Mall, R., & Kar, A. (2016). E2R2: Energy-efficient and reliable routing for mobile wireless sensor networks. IEEE Systems Journal, 10(2), 604–616.
Shen, J., Wang, C., Wang, A., Sun, X., Moh, S., & Hung, P. C. K. (2017). Organized topology based routing protocol in incompletely predictable ad-hoc networks. Computer Communications, 99(1), 107–118.
Yadav, A. K., Das, S. K., & Tripathi, S. (2017). EFMMRP: Design of efficient fuzzy based multi-constraint multicast routing protocol for wireless ad-hoc network. Computer Networks, 118, 15–23.
Li, F., & Ju, W. (2010). Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), 1035–1048.
Marti, S., Giuli, T., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the sixth annual ACM/IEEE international conference on mobile computing and networking (pp. 255–265).
Yan, Z., Zhang, P., & Virtanen, T. (2003). Trust evaluation based security solution in ad hoc networks. In Proceedings of the seventh Nordic workshop on secure IT systems (pp. 1–14).
Jemili, I., Chaabouni, N., Belghith, A., & Mosbah, M. (2012). A multipath layered cluster based routing for ad hoc networks. In 2012 5th international conference on new technologies, mobility and security (NTMS) (pp. 1–5).
Serique, L. F. S., & De Sousa, R. T. (2012). Evaluating trust in ad hoc network routing by induction of decision trees. IEEE Latin America Transactions, 10(1), 1332–1343.
Han, Z., Jie, W., Zhang, J., Liu, L., & Tian, K. (2014). A general self-organized tree-based energy-balance routing protocol for wireless sensor network. IEEE Transactions on Nuclear Science, 61(2), 732–740.
Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.
Zahedi, Z. M., Akbari, R., Shokouhifar, M., Safaei, F., & Jalali, A. (2016). Swarm intelligence based fuzzy routing protocol for clustered wireless sensor networks. Expert Systems with Applications, 55, 313–328.
Shokouhifar, M., & Jalali, A. (2017). Optimized sugeno fuzzy clustering algorithm for wireless sensor networks. Engineering Applications of Artificial Intelligence, 60, 16–25.
Abuarqoub, A., Hammoudeh, M., Adebisi, B., Jabbar, S., Bounceur, A., & Al-Bashar, H. (2017). Dynamic clustering and management of mobile wireless sensor networks. Computer Networks, 117, 62–75.
Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.
Mhemed, R., Aslam, N., Phillips, W., Comeau, F. (2012). An energy efficient fuzzy logic cluster formation protocol in wireless sensor networks. Procedia Computer Science, 10, 255–262.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rama Prabha, K.P., Jeyanthi, N. A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks. Wireless Pers Commun 98, 2959–2974 (2018). https://doi.org/10.1007/s11277-017-5010-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-5010-9