Skip to main content

Advertisement

Log in

Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

An Internet of Things (IoT) is a superior technology that will connect more number of wired/wireless devices through an internet. The Mobile Adhoc Network (MANET) is s wireless system which will connect the wireless devices through low bandwidth wireless links. Hence, Integrating MANET with IoT greatly improves the performance of the IoT subject to energy constrained and trusted security. Protecting the ad hoc routing from the black hole attacks, Byzantine flooding, Location disclosure attacks etc., seems to be a very difficult issue in the previous researches. To overcome the aforementioned security issues, a novel methodology called Cluster and Angular based Energy Proficient Trusted Routing (ACEPTR) protocol is proposed in this research article. Initially, Node Credit Score (NCS) is calculated to compute trust ratio for the nodes. The credit score calculation includes both Self-Trust computation and Joint-Trust computation. Once highest NCS is computed then angular energy based route selection process is carried out to form the clusters since cluster based routing reduces energy consumption extensively. The conventional communication control process is applied for finding node’s transmission range so that data can be transmitted over angular energy based highest NCS nodes. The simulation results obtained is compared with the conventional schemes and the metrics proved that the proposed scheme achieves better system performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data Availability

NA.

Code Availability

Custom Code.

References

  1. Suma V (2021) Internet-of-Things (IoT) based Smart Agriculture in India-An Overview. J ISMAC 3(01):1–15

    Article  Google Scholar 

  2. Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708

    Article  Google Scholar 

  3. Doukas C, Maglogiannis I (2012) Bringing iot and cloud computing towards pervasive healthcare. In: Proceedings of the IEEE 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 922–926

  4. Bohli JM, Skarmeta A, Moreno MV, García D, Langendorfer P (2015) Smartie project: Secure IoT data management for smart cities. In: Proceedings of the IEEE International Conference on Recent Advances in Internet of Things (RIoT), 1–6

  5. Dandala TT, Krishnamurthy V, Alwan R (2017) Internet of Vehicles (IoV) for traffic management. In: Proceedings of the International Conference on Computer, Communication and Signal Processing (ICCCSP), 1–4

  6. Zhan G, Shi W, Deng J (2011) Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Trans Dependable Secur Comput 9(2):184–197

    Article  Google Scholar 

  7. Cho J-H, Swami A, Chen R (2010) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13(4):562–583

    Article  Google Scholar 

  8. Chen, Xin J-H, Cho, Zhu S (2014) GlobalTrust: An attack-resilient reputation system for tactical networks. In: Proceedings of the Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking, 275–283

  9. Gong W, You Z, Chen D, Zhao X, Gu M, Kwok-Yan, Lam (2010) Trust based routing for misbehavior detection in ad hoc networks. J Networks 5(5). doi: https://doi.org/10.4304/jnw.5.5.551-558

  10. Misra, Sudip P, Venkata Krishna, AkhilBhiwal AS, Chawla BE, Wolfinger, Lee C (2012) A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks. J Supercomputing 62(1):04–23

    Article  Google Scholar 

  11. Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun Surv tutorials 15(4):2027–2045

    Article  Google Scholar 

  12. Rathish CR, Karpagavadivu K, Sindhuja P, Kousalya A (2021) A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET. Inform Technol Control 50(1):45–54

    Article  Google Scholar 

  13. Venkataraman R, Rama Rao T (2012) Regression-based trust model for mobile ad hoc networks. IET Inf Secur 6(3):131–140

    Article  Google Scholar 

  14. Gunasekaran M, and KandhasamyPremalatha (2013) TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks. IET Inf Secur 7(3):203–211

    Article  Google Scholar 

  15. Wei Z, Tang H, Yu FR, Wang M, Mason P (2014) Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans Veh Technol 63(9):4647–4658

    Article  Google Scholar 

  16. Usha MS, Ravishankar KC (2021) Implementation of trust-based novel approach for security enhancements in MANETs. SN Comput Sci 2(4):1–7

    Article  Google Scholar 

  17. Rajeswari AR, Kulothungan K, Ganapathy S et al (2019) A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Netw Appl 12:1076–1096. https://doi.org/10.1007/s12083-019-00766-8

    Article  Google Scholar 

  18. Shabut AM, Keshav P, Dahal SK, Bista, Irfan U, Awan (2015) Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 14(10):2101–2115

    Article  Google Scholar 

  19. Wang Y, Chen R, Cho J-H, Jeffrey JPT (2017) Trust-based task assignment with multiobjective optimization in service-oriented ad hoc networks. IEEE Trans Netw Serv Manage 14(1):217–232

    Article  Google Scholar 

  20. Cai R, Jun XJ, Li, Peter Han Joo Chong (2019) An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans Mob Comput 18(1):42–55

    Article  Google Scholar 

  21. Yun J, Chung J-M (2018) Centralized trust-based secure routing in wireless networks. IEEE Wirel Commun Lett 7(6):1066–1069

    Article  Google Scholar 

  22. Wang X, Zhang P, Du Y, Mei Qi (2020) Trust Routing Protocol Based on Cloud-Based Fuzzy Petri Net and Trust Entropy for Mobile Ad hoc Network. IEEE Access 8:47675–47693

    Article  Google Scholar 

  23. Ponguwala M, Rao S (2019) E2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT. IET Commun 13(19):3207–3216

    Article  Google Scholar 

  24. Alleema NN, Kumar DS (2020) Volunteer nodes of ant colony optimization routing for minimizing delay in peer to peer MANETs. Peer-to-Peer Netw Appl 13:590–600. https://doi.org/10.1007/s12083-019-00772-w

    Article  Google Scholar 

  25. Jhaveri RH, Patel NM, Zhong Y, Sangaiah AK (2018) Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT. IEEE Access 6:20085–20103

    Article  Google Scholar 

  26. Cho J-H, Chen R (2019) COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks. IEEE Access 7:92296–92313

    Article  Google Scholar 

  27. Xia H, Li Z, Zheng Y, Liu A, Choi Y-J, Sekiya H (2018) A novel light-weight subjective trust inference framework in MANETs. IEEE Trans Sustainable Comput 5(2):236–248

    Article  Google Scholar 

  28. Manasrah AM, Gupta BB (2019) An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment. Cluster Comput 22(1):1639–1653

    Article  Google Scholar 

  29. Mirsadeghi F, Rafsanjani MK, Gupta BB (2020) A trust infrastructure based authentication method for clustered vehicular ad hoc networks.Peer-to-Peer Networking and Applications,1–17

  30. Leonid L, Irina B, Lubov Z, Yuri U, Alexander S, Denis P, Yong Z, Yan X (2022) Message Authentication and Network Anomalies Detection in Vehicular Ad Hoc Networks, 2022: 9440886, Security and Communication Networks, https://doi.org/10.1155/2022/9440886

  31. Fatemidokht H, Rafsanjani MK, Gupta BB, Hsu CH (2021) Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular Ad Hoc networks in intelligent transportation systems. IEEE Trans Intell Transp Syst 22(7):4757–4769. doi: https://doi.org/10.1109/TITS.2020.3041746

    Article  Google Scholar 

  32. Shafi S, Ratnam DV (2022) A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs. Peer-to-Peer Netw Appl 15:576–591. https://doi.org/10.1007/s12083-021-01272-6

    Article  Google Scholar 

  33. Veeraiah N, Khalaf OI, Prasad CVPR, Alotaibi Y, Alsufyani A, Alghamdi SA, Alsufyani N (2021) Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 9:120996–121005

    Article  Google Scholar 

Download references

Funding

NA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Senthil Kumar.

Ethics declarations

Conflicts of interest/Competing interests

We hereby declared that there is no conflict of interest in this research work/paper.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary Material 1

Supplementary Material 2

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thirunavukkarasu, V., Senthil Kumar, A. & Prakasam, P. Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network. Peer-to-Peer Netw. Appl. 15, 2240–2252 (2022). https://doi.org/10.1007/s12083-022-01340-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01340-5

Keywords

Navigation