Skip to main content

Advertisement

Log in

A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Security in communication is an important and challenging issue in the recent years. In the past, many secure routing algorithms have been proposed to provide energy efficiency and security in Mobile Ad hoc Networks. However due to the increase in attackers and new types of attacks, the existing secure routing techniques are challenged by malicious users. In order to handle these problems, a new trust and fuzzy cluster based dynamic secure routing algorithm is proposed in this paper for enhancing energy efficiency and security. For this purpose, a new trust model which uses historical trust, neighbor trust and behavioral trust is proposed in this work for isolating the malicious nodes in the routing process. Moreover, the fuzzy clustering technique proposed in this paper provides energy efficiency by applying cluster head based routing, cluster head rotation and fuzzy decision making. The fuzzy rules also help to handle the uncertainty occurring due to the movement of nodes in the network. From the experiments conducted in this work, it is proved that the proposed algorithm enhances the security of communication which in turn increases the packet delivery ratio and reduces the delay.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Chen, A., Xu, G., & Yang, Y. (2008). A cluster-based trust model for mobile ad hoc networks. In 4th international conference on wireless communications, networking and mobile computing (pp. 1–4).

  2. Perkins, C. E., & Royer, E. M. (2002). Ad hoc on-demand distance vector routing. In Second IEEE workshop on mobile computing systems and applications (WMCSA ‘99) (pp. 123–135)

  3. Tang, S., & Zhang, B. (2004). A robust AODV protocol with local update. In 10th Asia Pacific conference on communications (Vol. 1, No. 29, pp. 418–422).

  4. Das, A., & Islam, M. M. (2012). Secured trust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261–274.

    Article  Google Scholar 

  5. Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2017). An intelligent secured and energy efficient routing algorithm for MANETs. Wireless Personal Communications, 96(2), 1753–1769.

    Article  Google Scholar 

  6. Selvi, M., Logambigai, R., Ganapathy, S., Sai Ramesh, L., Khanna Nehemiah, H., & Arputharaj, K. (2016) Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics, ACM digital library (pp. 117–122).

  7. Logambigai, R., & Kannan, A. (2016). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks, 22(3), 945–957.

    Article  Google Scholar 

  8. Bao, F., Chen, I.-R., Chang, M. J., & Cho, J.-H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions Network and Service Management, 9(2), 169–183.

    Article  Google Scholar 

  9. Zhou, L., & Haas, Z. (1999). Securing ad hoc networks. IEEE Network, 13(6), 24–30.

    Article  Google Scholar 

  10. El-said, S. A., Osamaa, A., & Hassanien, A. E. (2016). Optimized hierarchical routing technique for wireless sensors networks. Soft Computing, 20, 4549–4564.

    Article  Google Scholar 

  11. Sarma, H. K. D., Mall, R., & Kar, A. (2016). E2R2: Energy-efficient and reliable routing for mobile wireless sensor networks. IEEE Systems Journal, 10(2), 604–616.

    Article  Google Scholar 

  12. Shen, J., Wang, C., Wang, A., Sun, X., Moh, S., & Hung, P. C. K. (2017). Organized topology based routing protocol in incompletely predictable ad-hoc networks. Computer Communications, 99(1), 107–118.

    Article  Google Scholar 

  13. Yadav, A. K., Das, S. K., & Tripathi, S. (2017). EFMMRP: Design of efficient fuzzy based multi-constraint multicast routing protocol for wireless ad-hoc network. Computer Networks, 118, 15–23.

    Article  Google Scholar 

  14. Li, F., & Ju, W. (2010). Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), 1035–1048.

    Article  Google Scholar 

  15. Marti, S., Giuli, T., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the sixth annual ACM/IEEE international conference on mobile computing and networking (pp. 255–265).

  16. Yan, Z., Zhang, P., & Virtanen, T. (2003). Trust evaluation based security solution in ad hoc networks. In Proceedings of the seventh Nordic workshop on secure IT systems (pp. 1–14).

  17. Jemili, I., Chaabouni, N., Belghith, A., & Mosbah, M. (2012). A multipath layered cluster based routing for ad hoc networks. In 2012 5th international conference on new technologies, mobility and security (NTMS) (pp. 1–5).

  18. Serique, L. F. S., & De Sousa, R. T. (2012). Evaluating trust in ad hoc network routing by induction of decision trees. IEEE Latin America Transactions, 10(1), 1332–1343.

    Article  Google Scholar 

  19. Han, Z., Jie, W., Zhang, J., Liu, L., & Tian, K. (2014). A general self-organized tree-based energy-balance routing protocol for wireless sensor network. IEEE Transactions on Nuclear Science, 61(2), 732–740.

    Article  Google Scholar 

  20. Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.

    Article  Google Scholar 

  21. Zahedi, Z. M., Akbari, R., Shokouhifar, M., Safaei, F., & Jalali, A. (2016). Swarm intelligence based fuzzy routing protocol for clustered wireless sensor networks. Expert Systems with Applications, 55, 313–328.

    Article  Google Scholar 

  22. Shokouhifar, M., & Jalali, A. (2017). Optimized sugeno fuzzy clustering algorithm for wireless sensor networks. Engineering Applications of Artificial Intelligence, 60, 16–25.

    Article  Google Scholar 

  23. Abuarqoub, A., Hammoudeh, M., Adebisi, B., Jabbar, S., Bounceur, A., & Al-Bashar, H. (2017). Dynamic clustering and management of mobile wireless sensor networks. Computer Networks, 117, 62–75.

    Article  Google Scholar 

  24. Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.

    Article  Google Scholar 

  25. Mhemed, R., Aslam, N., Phillips, W., Comeau, F. (2012). An energy efficient fuzzy logic cluster formation protocol in wireless sensor networks. Procedia Computer Science, 10, 255–262.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. P. Rama Prabha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rama Prabha, K.P., Jeyanthi, N. A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks. Wireless Pers Commun 98, 2959–2974 (2018). https://doi.org/10.1007/s11277-017-5010-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-5010-9

Keywords

Navigation