Skip to main content

Advertisement

Log in

A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the contemporary technology context, several physical things may be used to support human activities. The Internet of Things is a cutting-edge technology solution that is used to link physical items with the digital world via a range of networks as well as communication technologies. The Internet of Things benefits from the smart settings in which mobile ad hoc networks (MANET) operate, making it more appealing to users and financially viable. Wireless sensors with MANETs may be integrated using the Internet of Things to develop new MANET-IoT devices and IT-based networks. Such a strategy lowers network deployment costs while increasing user mobility. That does, however, also bring up fresh, challenging issues about networking concerns. We introduced a new DAG-Blockchain architecture for MANET-IoT security in this study. The Multi-Factor PUF identification technique protects the network. Network topology is separated into clusters with all allowed nodes. We introduced the Secure Trust-based Dijikstra’s Method with numerous criteria for secure data transfer. We presented a Bi-Directional GRU for deep packet analysis. Deep packet inspection is used to identify intrusions, which are then blocked by a blocking mechanism. The suggested method achieved increased efficiency in the packet delivery ratio, productivity, time analysis, detection accuracy, and security level using the combination of algorithms. The numerical findings from the simulation and analysis of the proposed DAG-IDS in the WSN-IoT network reveal significant improvements across various performance metrics. Specifically, the DAG-IDS demonstrates enhanced network lifetime, achieving up to 220 cycles compared to 100 cycles in the BLOCKCHAIN method. The analysis also highlights superior packet delivery ratios (PDR) exceeding 90%, reduced delays, and efficient throughput, showcasing the effectiveness of the proposed approach in optimizing the network's quality of service, energy efficiency, and security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References 

  1. Sharmila, Kumar D, Kumar P, Ashok A (2020) Introduction to multimedia big data computing for IoT. Multimedia Big Data Computing for IoT Applications: Concepts. Paradigms and Solutions 3–36. https://doi.org/10.1007/978-981-13-8759-3_1

  2. Marathe NR, Shinde SK (2021) Multidimensional Multi-Attribute Approach to Counter the Routing Attacks on MANET. Wireless Pers Commun 119:1993–2016. https://doi.org/10.1007/s11277-021-08315-4

    Article  Google Scholar 

  3. Mujeeb SM, Sam RP, Kasa M (2020) Energy- and trust-aware secure routing algorithm for big data classification using MapReduce framework in IoT networks. Int J Model Simul Sci Comput 12: 2150010:1–2150010:24. https://doi.org/10.1142/S1793962321500100

  4. Muzammal SM, Murugesan RK, Jhanjhi NZ (2021) A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches. IEEE Internet Things J 8:4186–4210. https://doi.org/10.1109/JIOT.2020.3031162

    Article  Google Scholar 

  5. Aravind K, Maddikunta PK (2022) Multiobjectives for Optimal Geographic Routing in IoT Health Care System. Complex 2022:7568804:1–7568804:15. https://doi.org/10.1155/2022/7568804

  6. Arulselvan G, Rajaram A (2023) Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs. J Intell Fuzzy Syst. https://doi.org/10.3233/JIFS-231905

    Article  Google Scholar 

  7. Hashemi SY, Aliee FS (2020) Fuzzy, Dynamic and Trust Based Routing Protocol for IoT. J Netw Syst Manage 28:1248–1278. https://doi.org/10.1007/s10922-020-09535-y

    Article  Google Scholar 

  8. Cao J, Wang X, Huang M, Yi B, He Q (2021) A security‐driven network architecture for routing in industrial Internet of Things. Trans Emerg Telecommun Technol 32. https://doi.org/10.1002/ett.4216

  9. NiranjanM M, Kenchaiah N (2020) Secure and optimized method of providing trustworthiness for iot sensors in low-power wan deployments. https://www.tdcommons.org/dpubs_series/3692

  10. Mabodi K, Yusefi M, Zandiyan S, Irankhah L, Fotohi R (2020) Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J Supercomput 76:7081–7106. https://doi.org/10.1007/s11227-019-03137-5

    Article  Google Scholar 

  11. Javaid N (2022) A Secure and Efficient Trust Model for Wireless Sensor IoTs Using Blockchain. IEEE Access 10:4568–4579. https://doi.org/10.1109/ACCESS.2022.3140401

    Article  Google Scholar 

  12. Nargunam AS (2020) Dynamic Security Scheme for MANET. https://www.irma-international.org/viewtitle/33406/?isxn=9781599049298

  13. Safdar Malik T, Siddiqui MN, Mateen M, Malik KR, Sun S, Wen J (2022) Comparison of Blackhole and Wormhole Attacks in Cloud MANET Enabled IoT for Agricultural Field Monitoring. Security Commun Netw. https://doi.org/10.1155/2022/4943218

    Article  Google Scholar 

  14. Mujeeb SM, Sam RP, Kasa M (2021) Adaptive EHTARA: An Energy-Efficient and Trust Aware Secure Routing Algorithm for Big Data Classification in IoT Network. Wireless Pers Commun 121:621–646. https://doi.org/10.1007/s11277-021-08653-3

    Article  Google Scholar 

  15. Gayathri A, Prabu AJ, Rajasoundaran S, Routray S, Narayanasamy P, Kumar DN, Qi Y (2022) Cooperative and feedback based authentic routing protocol for energy efficient IoT systems. Concurrency and Comput: Pract Exp 34. https://doi.org/10.1002/cpe.6886.

  16. Raj MG (2022) Chaotic Whale Crow Optimization Algorithm for Secure Routing In Iot Environment. Int J Semant Web Inf Syst. https://doi.org/10.4018/IJSWIS.300824

    Article  Google Scholar 

  17. Lakshmi GV, Vaishnavi P (2022) An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution. Wireless Pers Commun 124:333–348. https://doi.org/10.1007/s11277-021-09359-2

    Article  Google Scholar 

  18. Rajaram, A. and Baskar, A (2023) Hybrid Optimization-Based Multi-Path Routing for Dynamic Cluster-Based MANET. Cybernetics and Systems. https://doi.org/10.1080/01969722.2023.2166249

  19. Sugumaran VR, RajaramA. Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs. J Intell Fuzzy Syst 1–16. https://doi.org/10.3233/JIFS-231340

  20. Premanand RP, Rajaram A (2020) Enhanced data accuracy based PATH discovery using backing route selection algorithm in MANET. Peer-to-Peer Networking Appl 13(6):2089–2098. https://doi.org/10.1007/s12083-019-00824-1

    Article  Google Scholar 

  21. Anil GN (2021) Multi-level Trust Modelling to Resist Impact of Routing Attacks on Reliable Data/Communication Transactions in MANET-IoT Ecosystem. Softw Eng Algorithm. https://doi.org/10.1007/978-3-030-77442-4_17

    Article  Google Scholar 

  22. Revathi B, Arulanandam K (2021) Design And Development of Robust And Secure Cluster Routing Algorithm For Manet Based IOT. International Journal of Computer Trends and Technology 69(8)15-19. https://doi.org/10.14445/22312803/IJCTT-V69I8P104

  23. Krishnamoorthy VK, Izonin I, Subramanian S, Shandilya SK, Velayutham S, Munichamy TR, Havryliuk M (2023) Energy Saving Optimization Technique-Based Routing Protocol in Mobile Ad-Hoc Network with IoT Environment. Energies. https://doi.org/10.3390/en16031385

    Article  Google Scholar 

  24. Bai PT (2022) RMBSRA: Routing Manager Based Secure Route Analysis Mechanism for Achieving Secure Routing Protocol in IOT MANET. https://doi.org/10.22247/ijcna/2022/212331

  25. Rajeswari AR, Kulothungan K, Ganapathy S, Kannan A (2021) Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT. J Intell Fuzzy Syst 40:9197–9211. https://doi.org/10.3233/JIFS-201633

    Article  Google Scholar 

  26. Usturge SI, Kumar TP (2022) DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot. Information Security Journal: A Global Perspective 32:331–346. https://doi.org/10.1080/19393555.2022.2053002

    Article  Google Scholar 

  27. Dupak L, Banerjee S (2022) Hybrid trust and weight evaluation-based trust assessment using ECK-ANFIS and AOMDV-REPO-based optimal routing in MANET environment. J Supercomput 78:17074–17094. https://doi.org/10.1007/s11227-022-04530-3

    Article  Google Scholar 

  28. Baba AM, Apeh ST, Erameh KB (2021) Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET. Advances in Multidisciplinary and scientific Research Journal Publication. https://doi.org/10.22624/aims%2Fabmic2021p12.

  29. Kumari A, Gupta R, Tanwar S, Kumar N (2020) A taxonomy of blockchain-enabled softwarization for secure UAV network. Comput Commun 161:304–323. https://doi.org/10.1016/j.comcom.2020.07.042

    Article  Google Scholar 

Download references

Acknowledgements

There is no acknowledgement involved in this work.

Funding

No funding is involved in this work.

Author information

Authors and Affiliations

Authors

Contributions

Authorship contributions

Corresponding author

Correspondence to N. Ilakkiya.

Ethics declarations

Ethics approval and consent to participate:

No participation of humans takes place in this implementation process.

Human and animal rights

No violation of Human and Animal Rights is involved.

Conflict of interest

Conflict of Interest is not applicable in this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ilakkiya, N., Rajaram, A. A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18845-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18845-1

Keywords

Navigation