Abstract
Mobile Ad hoc Network is self-organized and movable in nature, it is widely used in various applications including military and private sectors. However, security is one of the key concerns in routing because of the moving nodes; thus it is usually affected by Black Hole and Grey Hole attack. These types of malicious activities are more harmful to the network channel, and once the attack is happened it is difficult to predict and mitigate. To end this problem the current research proposed a novel Grey Wolf Trust Accumulation (GWTA) Schema in wireless mesh network architecture, thus the attacks are identified by the finest function of the GWTA model. Moreover, the predicted attacked nodes are replaced to the last position of the network medium to prevent the packet loss. Furthermore, the comparison studies proved the effectiveness of the proposed model by attaining less packet drop and high throughput ratio rate.















Similar content being viewed by others
Notes
Computers or any other electronic devices.
References
Wu, W. C. (2020). Spectrum sensing in optical wireless communication network. Transactions on Emerging Telecommunications Technologies,1, e3716.
Sultanuddin, S. J., & Ali Hussain, M. (2020). Token system-based efficient route optimization in mobile ad hoc network for v ehicular ad hoc network in smart city. Transactions on Emerging Telecommunications Technologies,1, e3853.
Ur Rahman, H., et al. (2020). A community-based social P2P network for sharing human life digital memories. Transactions on Emerging Telecommunications Technologies,1, e3866.
Sundar, R., & Kathirvel, A. (2020). Aggressively delivered mechanism over variable length density using a simulated annealing algorithm in mobile ad hoc network. Transactions on Emerging Telecommunications Technologies,1, e3863.
Bany Taha, M., et al. (2020). TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network. Transactions on Emerging Telecommunications Technologies,1, e3860.
Robinson, Y. H., et al. (2019). FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing,10(11), 4455–4472.
Liu, S., et al. (2019). Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios. IEEE Access,7, 21343–21358.
Madhja, A., Nikoletseas, S., & Voudouris, A. A. (2019). Adaptive wireless power transfer in mobile ad hoc networks. Computer Networks,152, 87–97.
Rath, M., et al. (2019). QTM: A QoS task monitoring system for mobile ad hoc networks. Recent Findings in Intelligent Computing Techniques (pp. 543–550). Singapore: Springer.
Saini, T. K., & Sharma, S. C. (2019). Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classification, and key attributes. Ad Hoc Networks,89, 58–77.
Wang, W., et al. (2019). A realistic mobility model with irregular obstacle constraints for mobile ad hoc networks. Wireless Networks,25(2), 487–506.
Elmahdi, E., Yoo, S. M., & Sharshembiev, K. (2020). Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. Journal of Information Security and Applications,51, 102425.
Darwish, S. M., Elmasry, A., & Ibrahim, S. H. (2019). Optimal Shortest Path in Mobile Ad-Hoc Network Based on Fruit Fly Optimization Algorithm. International Conference on Advanced Machine Learning Technologies and Applications,1, 1.
Banerjee, A., Dutta, P., & Sufian, A. (2019). Movement guided management of topology (MGMT) with balanced load in mobile ad hoc networks. International Journal of Information Technology,11(1), 149–158.
Jamali, M. A. J. (2019). A multipath QoS multicast routing protocol based on link stability and route reliability in mobile ad-hoc networks. Journal of Ambient Intelligence and Humanized Computing,10(1), 107–123.
Sufian, A., Banerjee, A., & Dutta, P. (2019). Energy and velocity based tree multicast routing in mobile Ad-Hoc networks. Wireless Personal Communications,107(4), 2191–2209.
Sharma, V. K., Verma, L. P., & Kumar, M. (2019). CL-ADSP: Cross-layer adaptive data scheduling policy in mobile ad hoc networks. Future Generation Computer Systems,97, 530–563.
Lavanya, P., Reddy, V. S. K., & Prasad, A. M. (2019). Simulation and QoS metrics comparison of routing protocols for mobile ad hoc networks using network simulator (pp. 567–575)., Microelectronics, Electromagnetics and Telecommunications Singapore: Springer.
Palani, U., Suresh, K. C., & Nachiappan, A. (2019). Mobility prediction in mobile ad hoc networks using eye of coverage approach. Cluster Computing,22(6), 14991–14998.
Zeng, B., Yao, L., & Wang, R. (2019). A reliable routing decision algorithm with minimal multicast power consumption in mobile wireless network. In IEEE 7th international conference on computer science and network technology (ICCSNT). IEEE.
Farheen, N. S. S., & Jain, A. (2020). Improved routing in MANET with optimized multi path routing fine-tuned with hybrid modeling. Journal of King Saud University-Computer and Information Sciences,1, 1.
Kumar, H., et al. (2020). Study and design of route repairing mechanism in MANET. Design frameworks for wireless networks (pp. 123–149). Singapore: Springer.
Juneja, K. (2020). Random-session and K-neighbour based suspected node analysis approach for cooperative blackhole detection in MANET. Wireless Personal Communications,110(1), 45–68.
Islabudeen, M., & Devi, M. K. K. (2020). A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks. Wireless Personal Communications,1, 1–32.
Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray hole attack in MANET. Wireless Networks,24(2), 565–579. https://doi.org/10.1007/s11276-016-1353-5.
Khamayseh, Y. M., Aljawarneh, S. A., & Asaad, A. E. (2018). Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems,18, 90–100. https://doi.org/10.1016/j.suscom.2017.07.001.
Kshirsagar, V. H., Kanthe, A. M., & Simunic, D. (2018). Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Personal Communications,100(2), 311–320. https://doi.org/10.1007/s11277-017-5070-x.
Bhuvaneswari, R., & Ramachandran, R. (2018). Denial of service attack solution in OLSR based manet by varying number of fictitious nodes. Cluster Computing. https://doi.org/10.1007/s10586-018-1723-0.
Jamal, T., & Butt, S. A. (2019). Malicious node analysis in MANETS. International Journal of Information Technology,11(4), 859–867. https://doi.org/10.1007/s41870-018-0168-2.
Srikaanth, P. B., & Nagarajan, V. (2019). Semi-Markov chain-based grey prediction-based mitigation scheme for vampire attacks in MANETs. Cluster Computing,22(6), 15541–15549. https://doi.org/10.1007/s10586-018-2698-6.
Zareie, A., Sheikhahmadi, A., & Jalili, M. (2020). Identification of influential users in social network using gray wolf optimization algorithm. Expert Systems with Applications,142, 112971.
Ali Zardari, Z., et al. (2019). A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet,11(3), 61.
Pal, A., et al. (2020). An efficient load balanced stable multi-path routing for mobile ad-hoc network. Microsystem Technologies,1, 1–15.
Vigenesh, M., & Santhosh, R. (2019). An efficient stream region sink position analysis model for routing attack detection in mobile ad hoc networks. Computers & Electrical Engineering,74, 273–280.
Vimala, S., Khanaa, V., & Nalini, C. (2019). A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks. Cluster Computing,22(2), 4065–4074.
Bala, K., Jothi, S., & Chandrasekar, A. (2019). An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis. Cluster Computing,22(6), 15205–15212.
Moudni, H., et al. (2019). Black hole attack detection using fuzzy based intrusion detection systems in MANET. Procedia Computer Science,151, 1176–1181.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no potential conflict of interest.
Human and Animal Rights
All applicable institutional and/or national guidelines for the care and use of animals were followed.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Vatambeti, R. A Novel Wolf Based Trust Accumulation Approach for Preventing the Malicious Activities in Mobile Ad Hoc Network. Wireless Pers Commun 113, 2141–2166 (2020). https://doi.org/10.1007/s11277-020-07316-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07316-z