Skip to main content
Log in

RETRACTED ARTICLE: Optimized Fuzzy System Dependent Trust Score for Mobile AdHoc Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

This article was retracted on 15 December 2022

This article has been updated

Abstract

Mobile Ad-Hoc Network (MANET) consist a numerous nodes and these nodes are structured with remote transceivers. These nodes forward the message with one another by getting to the typical channel. In MANET, security is the principle challenge to be analyzed. Due to the behaviour of malevolent nodes, the network security is weakened. Along these lines, the significant goal of this research is to enhance the network security by detecting the malevolent nodes. So, for the detection of malevolent node, an effective trust management method is presented in this paper. Improving the trust score the optimized fuzzy framework is proposed. For enhancing the execution of the fuzzy framework, the triangular membership function of the input parameters is improved with the Cat Swarm Optimization. After estimating the trust score for every node in the network, threshold depend decision module is processed for detecting the activity of malevolent nodes. Implementation results illustrate that the execution of the proposed model achieves maximum network lifetime and minimum energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Change history

References

  1. Hoebeke, J., Moerman, I., Dhoedt, B., & Demeester, P. (2004). An overview of mobile ad hoc networks: applications and challenges. Journal-Communications Network, 3(3), 60–66.

    Google Scholar 

  2. Appiah, Martin. "The impact of mobility models on the performance of mobile ad hoc network (MANET)." In 2016 International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 208–213, IEEE, 2016.

  3. Srivastava, Ashutosh, Deepak Kumar, and Suresh C. Gupta. "Modelling mobility in emergency scenario for MANET applications." In 2014 Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1–6. IEEE, 2014.

  4. Appiah, Martin. "Performance comparison of mobility models in Mobile Ad Hoc Network (MANET)." In 2017 1st International Conference on Next Generation Computing Applications (NextComp), pp. 47–53. IEEE, 2017.

  5. Sandeep, J., & Kumar, J. (2015). Efficient packet transmission and energy optimization in military operation scenarios of MANET. Procedia Computer Science, 47, 400–407.

    Article  Google Scholar 

  6. Saravanan, K., and J. Vellingiri. "Defending MANET against flooding attack for medical application." In 2017 2nd International Conference on Communication and Electronics Systems (ICCES), pp. 486–489. IEEE, 2017.

  7. Pease, Sarogini Grace. "ROAM: Supporting safety critical applications in MANETs with cross-layer middleware." In 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM), pp. 1–2. IEEE, 2013.

  8. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless communications, 14(5), 85–91.

    Article  Google Scholar 

  9. Pirzada, A., & Mcdonald, C. (2006). Trust Establishment In Pure Ad-hoc Networks. Wireless Personal Communications, 37(1–2), 139–168.

    Article  Google Scholar 

  10. H. Xia, Z. Jia, L. Ju, X. Li and Y. Zhu, "A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules". In 2011 IEEE/ACM International Conference on Green Computing and Communications, pp. 124–130, 2011.

  11. M. Durad, Y. Cao and Z. Liehuang, "Two Novel Trust Evaluation Algorithms". In 2006 International Conference on Communications, Circuits and Systems, pp. 1641–1646, 2006.

  12. Kukreja, D., Dhurandher, S., & Reddy, B. (2017). Power aware malevolent nodes detection for securing MANETs against packet forwarding misbehavior attack. Journal of Ambient Intelligence and Humanized Computing, 9(4), 941–956.

    Article  Google Scholar 

  13. Bisen, D., & Sharma, S. (2017). Fuzzy based detection of malevolent activity for security assessment of MANET. National Academy Science Letters, 41(1), 23–28.

    Article  Google Scholar 

  14. Singh, O., Singh, J., & Singh, R. (2017). Multi-level trust based intelligence intrusion detection system to detect the malevolent nodes using elliptic curve cryptography in MANET. Cluster Computing, 21(1), 51–63.

    Article  Google Scholar 

  15. Rajeswari, A., Kulothungan, K., Ganapathy, S., & Kannan, A. (2019). A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Networking and Applications, 12(5), 1076–1096.

    Article  Google Scholar 

  16. Dorri, A., Vaseghi, S., & Gharib, O. (2017). DEBH: Detecting and eliminating black holes in mobile ad hoc network. Wireless Networks, 24(8), 2943–2955.

    Article  Google Scholar 

  17. Rmayti, M., Khatoun, R., Begriche, Y., Khoukhi, L., & Gaiti, D. (2017). A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks. Computer Networks, 121, 53–64.

    Article  Google Scholar 

  18. Kumaravel, A., & Chandrasekaran, M. (2018). Performance analysis of malicious node detection in MANET using ANFIS classification approach. Cluster Computing, 22(S6), 13445–13452.

    Article  Google Scholar 

  19. Rao, D. and Saraf, S., n.d. 1996 Study of defuzzification methods of fuzzy logic controller for speed control of a DC motor. In Proceedings of International Conference on Power Electronics Drives and Energy Systems for Industrial Growth, pp. 782–787

  20. Kalpana Devi, M., & Umamaheswari, K. (2020). Modified Artificial Bee Colony with firefly algorithm based spectrum handoff in cognitive radio network. International Journal of Intelligent Networks, 1, 67–75.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kavitha Thangaraj.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s11277-022-10118-0

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thangaraj, K., Dharma, D. RETRACTED ARTICLE: Optimized Fuzzy System Dependent Trust Score for Mobile AdHoc Network. Wireless Pers Commun 117, 3255–3269 (2021). https://doi.org/10.1007/s11277-020-07984-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07984-x

Keywords

Navigation