Skip to main content
Log in

A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Mobile ad hoc networks (MANETs) are autonomous networks where mobile nodes are connected with one another over wireless links using multi-hop transmission. Malicious attacks can severely disrupt routing setup and data transmission, seriously compromising the security and normal functioning of MANETs. This paper introduces regression and clustering techniques to compute the trust values of nodes and improve the routing of transferred packets in the MANET. Initially, the trust value of each node is detected with the help of the routing paths’ reputation. However, the trust evaluation using mathematical methods is challenging due to the ambiguity of the attack and the network’s diversity. To tackle this issue, the proposed model transforms the computation of the node’s trust values into a linear regression problem and solves this problem using Stacked Autoencoder with Sparse Bayesian Regression (SAE-SBR). After evaluating the trust value, a private collaborative K-means (PCK-means) clustering approach is proposed for clustering the nodes into benign or malicious based on the obtained trust values of nodes. Finally, the path that contains few nodes in the low trust value group and medium trust value group is chosen as the optimal routing path. The simulation results show that the proposed method minimizes the end-to-end delay time to 0.023 s in the presence of 10 malicious nodes. Also, it achieved a maximum throughput of 95.568 KbpS, a maximum detection accuracy of 94% and a maximum packet delivery ratio of 99.5%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability statement

Data sharing is not applicable to this article.

References

  1. Alam T, Benaida, M(2019) The role of cloud-MANET framework in the internet of things (IoT).arXiv preprint http://arxiv.org/abs/1902.09436

  2. Mirza S, ZebaBakshi S (2018) Introduction to MANET. Int Res J Eng Technol 5(1):17–20

    Google Scholar 

  3. Gupta P, Tripathi S, Singh S (2021) Energy efficient rendezvous points based routing technique using multiple mobile sink in heterogeneous wireless sensor networks. Wireless Netw 27:3733–3746

    Article  Google Scholar 

  4. Thangaramya K, Kulothungan K, Gandhi SI, Selvi M, Kumar SVNS, Arputharaj K (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24:16483–16497

    Article  Google Scholar 

  5. Ramphull D, Mungur A, Armoogum S, Pudaruth S (2021) A review of mobile ad hoc NETwork (MANET) Protocols and their Applications. In2021 5th international conference on intelligent computing and control systems (ICICCS) IEEE 204–211

  6. Kaur G, Thakur P (2019) Routing protocols in manet: an overview. in2019 2nd international conference on intelligent computing. Instrum Control Technol (ICICICT) IEEE 1:935–941

  7. Mohindra AR, Gandhi C (2021) A secure cryptography based clustering mechanism for improving the data transmission in MANET. Walailak J Sci Technol (WJST) 18(6):8987–9018

    Article  Google Scholar 

  8. Rajeswari AR, Ganapathy S, Kulothungan K, Kannan A (2021) An efficient trust-based secure energy-aware clustering to mitigate trust distortion attack in mobile ad-hoc network. Concurr Comput Prac Exp 33(13):6223

    Article  Google Scholar 

  9. Pandey P, Singh R (2022) Efficient ad hoc on demand distance vector routing protocol based on route stability in MANETs. Int J Wireless Inf Networks 29(3):393–404

    Article  Google Scholar 

  10. Rajeswari AR, Kulothungan K, Ganapathy S, Kannan A (2019) A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Netw Appl 12:1076–1096

    Article  Google Scholar 

  11. Prasath N, Sreemathy J (2019) Optimized dynamic source routing protocol for MANETs. Clust Comput 22(5):12397–12409

    Article  Google Scholar 

  12. Mahamune AA, Chandane MM (2023) Trust-based co-operative routing for secure communication in mobile ad hoc networks. Digit Commun Netw

  13. Veeraiah N, Krishna BT (2020) An approach for optimal-secure multi-path routing and intrusion detection in MANET. Evol Intell 1–15

  14. Subburayalu G, Duraivelu H, Raveendran AP, Arunachalam R, Kongara D, Thangavel C (2021) Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier. J Appl Secur Res 1–19

  15. Zardari ZA, Memon KA, Shah RA, Dehraj S, Ahmed I (2021) A lightweight technique for detection and prevention of wormhole attack in MANET. EAI Endorsed Trans Scalable Inf Syst 8(29):e2–e2

    Google Scholar 

  16. Kalidoss T, Rajasekaran L, Kanagasabai K, Sannasi G, Kannan A (2020) QoS aware trust based routing algorithm for wireless sensor networks. Wireless Pers Commun 110:1637–1658

    Article  Google Scholar 

  17. Muruganandam S, Srinivasan N, Sivaprakasam A (2022) An Intelligent Method for Intrusion Detection and Prevention in Mobile AdHoc Networks. Int J Intell Syst Appl Eng 10(3):154–160

    Google Scholar 

  18. Hussain MS, Khan KUR (2020) A survey of ids techniques in manets using machine-learning. In: Proceedings of the Third International Conference on Computational Intelligence and Informatics: ICCII 2018, Springer Singapore, 743–751

  19. Dilipkumar S, Durairaj M (2021) Epilson Swarm Optimized Cluster Gradient and deep belief classifier for multi-attack intrusion detection in MANET. J Ambient Intell Humaniz Comput 1–16

  20. Fatemidokht H, Rafsanjani MK, Gupta BB, Hsu C-H (2021) Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Trans Intell Transp Syst 22(7):4757–4769

    Article  Google Scholar 

  21. Ghasemnezhad S, Ghaffari A (2018) Fuzzy logic based reliable and real-time routing protocol for mobile ad hoc networks. Wireless Pers Commun 98:593–611

    Article  Google Scholar 

  22. Mohammadi P, Ghaffari A (2019) Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Pers Commun 106:365–376

    Article  Google Scholar 

  23. Seyfollahi A, Moodi M, Ghaffari A (2022) MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications. Comput Stand Interfaces 82:103622

    Article  Google Scholar 

  24. Yang H (2020) A study on improving secure routing performance using trust model in MANET. Mob Inf Syst 1–17

  25. Pathan MS, Zhu N, He J, Zardari ZA, Memon MQ, Hussain MI (2018) An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10(2):16

    Article  Google Scholar 

  26. Chiejina E, Xiao H, Christianson B, Mylonas A, Chiejina C (2022) A robust Dirichlet reputation and trust evaluation of nodes in mobile ad hoc networks. Sensors 22(2):571

    Article  Google Scholar 

  27. Yamini KAP, Stephy J, Suthendran K, Ravi V (2022) Improving routing disruption attack detection in MANETs using efficient trust establishment. Trans Emerg Telecommun Technol 33(5):e4446

    Article  Google Scholar 

  28. Hemalatha S, Kshirsagar PR, Manoharan H, Gowri NV, Vani A, Qaiyum S, Vijayakumar P (2022) Novel link establishment communication scheme against selfish attack using node reward with trust level evaluation algorithm in MANET. Wirel Commun Mob Comput

  29. Geetika D, Tyagi SS (2019) SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks. Wirel Pers Commun 105(1):17–35

  30. Geetika D, Sheoran K (2021) Protocols SMEER (Secure Multitier Energy Efficient Routing Protocol) and SCOR (Secure Elliptic curve based Chaotic key Galois Cryptography on Opportunistic Routing). Mater Today Proc 37:1324–1327

    Article  Google Scholar 

  31. Meena R, Singh N (2018) Energy Efficient QoS Aware Hierarchical KF-MAC Routing Protocol in Manet. Wirel Pers Commun, Springer Link, ISSN: 0929–6212 80(3):1–14

  32. Mukesh KG, Singh N, Rao M (2017) Design and Implementation of Trust-based Secure Routing Protocol for MANETs. Int J Appl Eng Res 12(16):5440–5446

    Google Scholar 

  33. Veeraiah N, Khalaf OI, Prasad CVPR, Alotaibi Y, Alsufyani A, Alghamdi SA, Alsufyani N (2021) Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 9:120996–121005

    Article  Google Scholar 

  34. Pathan MS, He J, Zhu N, Zardari ZA, Memon MQ, Azmat A (2019) An efficient scheme for detection and prevention of black hole attacks in AODV-based MANETs. Int J Adv Comput Sci Appl 10(1)

  35. Devika B, Sudha PN (2020) Power optimization in MANET using topology management. Eng Sci Technol Int J 23(3):565–575

    Google Scholar 

  36. Liu L, Xu X, Liu Y, Ma Z, Peng J (2021) A detection framework against CPMA attack based on trust evaluation and machine learning in IoT network. IEEE Internet Things J 8(20):15249–15258

    Article  Google Scholar 

Download references

Funding

No funding is provided for the preparation of the manuscript.

Author information

Authors and Affiliations

Authors

Contributions

All authors have equal contributions in this work.

Corresponding author

Correspondence to Geetika Dhand.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by authors.

Consent to participate

All the authors involved have agreed to participate in this submitted article.

Consent to publish

All the authors involved in this manuscript give full consent for publication of this submitted article.

Conflict of interest

Authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rao, M., Chaudhary, P., Sheoran, K. et al. A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network. Peer-to-Peer Netw. Appl. 16, 2794–2810 (2023). https://doi.org/10.1007/s12083-023-01560-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01560-3

Keywords

Navigation