Abstract
Mobile ad hoc networks (MANETs) are autonomous networks where mobile nodes are connected with one another over wireless links using multi-hop transmission. Malicious attacks can severely disrupt routing setup and data transmission, seriously compromising the security and normal functioning of MANETs. This paper introduces regression and clustering techniques to compute the trust values of nodes and improve the routing of transferred packets in the MANET. Initially, the trust value of each node is detected with the help of the routing paths’ reputation. However, the trust evaluation using mathematical methods is challenging due to the ambiguity of the attack and the network’s diversity. To tackle this issue, the proposed model transforms the computation of the node’s trust values into a linear regression problem and solves this problem using Stacked Autoencoder with Sparse Bayesian Regression (SAE-SBR). After evaluating the trust value, a private collaborative K-means (PCK-means) clustering approach is proposed for clustering the nodes into benign or malicious based on the obtained trust values of nodes. Finally, the path that contains few nodes in the low trust value group and medium trust value group is chosen as the optimal routing path. The simulation results show that the proposed method minimizes the end-to-end delay time to 0.023 s in the presence of 10 malicious nodes. Also, it achieved a maximum throughput of 95.568 KbpS, a maximum detection accuracy of 94% and a maximum packet delivery ratio of 99.5%.












Similar content being viewed by others
Data availability statement
Data sharing is not applicable to this article.
References
Alam T, Benaida, M(2019) The role of cloud-MANET framework in the internet of things (IoT).arXiv preprint http://arxiv.org/abs/1902.09436
Mirza S, ZebaBakshi S (2018) Introduction to MANET. Int Res J Eng Technol 5(1):17–20
Gupta P, Tripathi S, Singh S (2021) Energy efficient rendezvous points based routing technique using multiple mobile sink in heterogeneous wireless sensor networks. Wireless Netw 27:3733–3746
Thangaramya K, Kulothungan K, Gandhi SI, Selvi M, Kumar SVNS, Arputharaj K (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24:16483–16497
Ramphull D, Mungur A, Armoogum S, Pudaruth S (2021) A review of mobile ad hoc NETwork (MANET) Protocols and their Applications. In2021 5th international conference on intelligent computing and control systems (ICICCS) IEEE 204–211
Kaur G, Thakur P (2019) Routing protocols in manet: an overview. in2019 2nd international conference on intelligent computing. Instrum Control Technol (ICICICT) IEEE 1:935–941
Mohindra AR, Gandhi C (2021) A secure cryptography based clustering mechanism for improving the data transmission in MANET. Walailak J Sci Technol (WJST) 18(6):8987–9018
Rajeswari AR, Ganapathy S, Kulothungan K, Kannan A (2021) An efficient trust-based secure energy-aware clustering to mitigate trust distortion attack in mobile ad-hoc network. Concurr Comput Prac Exp 33(13):6223
Pandey P, Singh R (2022) Efficient ad hoc on demand distance vector routing protocol based on route stability in MANETs. Int J Wireless Inf Networks 29(3):393–404
Rajeswari AR, Kulothungan K, Ganapathy S, Kannan A (2019) A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Netw Appl 12:1076–1096
Prasath N, Sreemathy J (2019) Optimized dynamic source routing protocol for MANETs. Clust Comput 22(5):12397–12409
Mahamune AA, Chandane MM (2023) Trust-based co-operative routing for secure communication in mobile ad hoc networks. Digit Commun Netw
Veeraiah N, Krishna BT (2020) An approach for optimal-secure multi-path routing and intrusion detection in MANET. Evol Intell 1–15
Subburayalu G, Duraivelu H, Raveendran AP, Arunachalam R, Kongara D, Thangavel C (2021) Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier. J Appl Secur Res 1–19
Zardari ZA, Memon KA, Shah RA, Dehraj S, Ahmed I (2021) A lightweight technique for detection and prevention of wormhole attack in MANET. EAI Endorsed Trans Scalable Inf Syst 8(29):e2–e2
Kalidoss T, Rajasekaran L, Kanagasabai K, Sannasi G, Kannan A (2020) QoS aware trust based routing algorithm for wireless sensor networks. Wireless Pers Commun 110:1637–1658
Muruganandam S, Srinivasan N, Sivaprakasam A (2022) An Intelligent Method for Intrusion Detection and Prevention in Mobile AdHoc Networks. Int J Intell Syst Appl Eng 10(3):154–160
Hussain MS, Khan KUR (2020) A survey of ids techniques in manets using machine-learning. In: Proceedings of the Third International Conference on Computational Intelligence and Informatics: ICCII 2018, Springer Singapore, 743–751
Dilipkumar S, Durairaj M (2021) Epilson Swarm Optimized Cluster Gradient and deep belief classifier for multi-attack intrusion detection in MANET. J Ambient Intell Humaniz Comput 1–16
Fatemidokht H, Rafsanjani MK, Gupta BB, Hsu C-H (2021) Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Trans Intell Transp Syst 22(7):4757–4769
Ghasemnezhad S, Ghaffari A (2018) Fuzzy logic based reliable and real-time routing protocol for mobile ad hoc networks. Wireless Pers Commun 98:593–611
Mohammadi P, Ghaffari A (2019) Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Pers Commun 106:365–376
Seyfollahi A, Moodi M, Ghaffari A (2022) MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications. Comput Stand Interfaces 82:103622
Yang H (2020) A study on improving secure routing performance using trust model in MANET. Mob Inf Syst 1–17
Pathan MS, Zhu N, He J, Zardari ZA, Memon MQ, Hussain MI (2018) An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10(2):16
Chiejina E, Xiao H, Christianson B, Mylonas A, Chiejina C (2022) A robust Dirichlet reputation and trust evaluation of nodes in mobile ad hoc networks. Sensors 22(2):571
Yamini KAP, Stephy J, Suthendran K, Ravi V (2022) Improving routing disruption attack detection in MANETs using efficient trust establishment. Trans Emerg Telecommun Technol 33(5):e4446
Hemalatha S, Kshirsagar PR, Manoharan H, Gowri NV, Vani A, Qaiyum S, Vijayakumar P (2022) Novel link establishment communication scheme against selfish attack using node reward with trust level evaluation algorithm in MANET. Wirel Commun Mob Comput
Geetika D, Tyagi SS (2019) SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks. Wirel Pers Commun 105(1):17–35
Geetika D, Sheoran K (2021) Protocols SMEER (Secure Multitier Energy Efficient Routing Protocol) and SCOR (Secure Elliptic curve based Chaotic key Galois Cryptography on Opportunistic Routing). Mater Today Proc 37:1324–1327
Meena R, Singh N (2018) Energy Efficient QoS Aware Hierarchical KF-MAC Routing Protocol in Manet. Wirel Pers Commun, Springer Link, ISSN: 0929–6212 80(3):1–14
Mukesh KG, Singh N, Rao M (2017) Design and Implementation of Trust-based Secure Routing Protocol for MANETs. Int J Appl Eng Res 12(16):5440–5446
Veeraiah N, Khalaf OI, Prasad CVPR, Alotaibi Y, Alsufyani A, Alghamdi SA, Alsufyani N (2021) Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 9:120996–121005
Pathan MS, He J, Zhu N, Zardari ZA, Memon MQ, Azmat A (2019) An efficient scheme for detection and prevention of black hole attacks in AODV-based MANETs. Int J Adv Comput Sci Appl 10(1)
Devika B, Sudha PN (2020) Power optimization in MANET using topology management. Eng Sci Technol Int J 23(3):565–575
Liu L, Xu X, Liu Y, Ma Z, Peng J (2021) A detection framework against CPMA attack based on trust evaluation and machine learning in IoT network. IEEE Internet Things J 8(20):15249–15258
Funding
No funding is provided for the preparation of the manuscript.
Author information
Authors and Affiliations
Contributions
All authors have equal contributions in this work.
Corresponding author
Ethics declarations
Ethical approval
This article does not contain any studies with human participants or animals performed by authors.
Consent to participate
All the authors involved have agreed to participate in this submitted article.
Consent to publish
All the authors involved in this manuscript give full consent for publication of this submitted article.
Conflict of interest
Authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rao, M., Chaudhary, P., Sheoran, K. et al. A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network. Peer-to-Peer Netw. Appl. 16, 2794–2810 (2023). https://doi.org/10.1007/s12083-023-01560-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01560-3