Skip to main content

Trust Aware Secure Routing Model in MANET: Self-improved Particle Swarm Optimization for Optimal Route Selection

  • Conference paper
  • First Online:
Computer, Communication, and Signal Processing (ICCCSP 2022)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 651))

  • 227 Accesses

Abstract

In the heterogeneous network, MANETs are the collective gathering of diverse mobile devices with the ability to join and leave the network at any moment as the most prominent feature. As a consequence, mobile nodes in the decentralized network may link, interact, and transfer information to one another without the need of an intermediary router. Several academics have recently explored a variety of routing approaches to tackle issues such as packet data transmission delays and poor PDR. This paper aims to introduce a new trust-aware routing in MANET that ensures the trust level among the nodes. For this, a new trust rate estimation process is introduced based on energy and mobility of nodes exist. Thereby, a Self-Improved Particle Swarm optimization algorithm (SI-PSO) is proposed for choosing the optimal trust aware route for data transmission. The optimal route selection is performed by considering certain parameters like trust rate (security), Packet Drop Ratio (PDR) distance, congestion, energy, and as well. The performance of the adopted work is examined to the existing schemes regarding Energy, Delay, and Network Lifetime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Usha, M.S., Ravishankar, K.C.: Implementation of trust-based novel approach for security enhancements in MANETs. SN Comput. Sci. 2(4), 1–7 (2021). https://doi.org/10.1007/s42979-021-00628-2

    Article  Google Scholar 

  2. Devi, V.S., Hegde, N.P.: Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer. Wireless Pers. Commun. 100(3), 923–940 (2018). https://doi.org/10.1007/s11277-018-5358-5

    Article  Google Scholar 

  3. Sathyaraj, P., Rukmani Devi, D.: Designing the routing protocol with secured IoT devices and QoS over Manet using trust-based performance evaluation method. J. Ambient. Intell. Humaniz. Comput. 12(7), 6987–6995 (2020). https://doi.org/10.1007/s12652-020-02358-4

    Article  Google Scholar 

  4. Merlin, R.T., Ravi, R.: Novel trust based energy aware routing mechanism for mitigation of black hole attacks in MANET. Wireless Pers. Commun. 104(4), 1599–1636 (2019). https://doi.org/10.1007/s11277-019-06120-8

    Article  Google Scholar 

  5. Anitha Josephine, J., Senthilkumar, S.: Tanimoto support vector regressive linear program boost based node trust evaluation for secure communication in MANET. Wireless Pers. Commun. 117(4), 2973–2993 (2020). https://doi.org/10.1007/s11277-020-07209-1

    Article  Google Scholar 

  6. Ambekar, R.K., Kolekar, U.D.: T-TOHIP: trust-based topology-hiding multipath routing in mobile ad hoc network. Evol. Intel. 1–15 (2019). https://doi.org/10.1007/s12065-019-00280-z

  7. Rajeswari, A.R., Kulothungan, K., Ganapathy, S., Kannan, A.: A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Netw. Appl. 12(5), 1076–1096 (2019). https://doi.org/10.1007/s12083-019-00766-8

    Article  Google Scholar 

  8. Kukreja, D., Sharma, D.K.: T-SEA: trust based secure and energy aware routing protocol for mobile ad hoc networks. Int. J. Inf. Technol. 1–15 (2019). https://doi.org/10.1007/s41870-019-00392-w

  9. Veeraiah, N., Krishna, B.T.: An approach for optimal-secure multi-path routing and intrusion detection in MANET. Evol. Intel. 1–15 (2020). https://doi.org/10.1007/s12065-020-00388-7

  10. Tripathy, B.K., Jena, S.K., Bera, P., Das, S.: An adaptive secure and efficient routing protocol for mobile ad hoc networks. Wireless Pers. Commun. 114(2), 1339–1370 (2020). https://doi.org/10.1007/s11277-020-07423-x

    Article  Google Scholar 

  11. Nivedita, V., Nandhagopal, N.: Improving QoS and efficient multi-hop and relay based communication frame work against attacker in MANET. J. Ambient. Intell. Humaniz. Comput. 12(3), 4081–4091 (2020). https://doi.org/10.1007/s12652-020-01787-5

    Article  Google Scholar 

  12. Jamaesha, S.S., Bhavani, S.: A secure and efficient cluster based location aware routing protocol in MANET. Clust. Comput. 22(2), 4179–4186 (2018). https://doi.org/10.1007/s10586-018-1703-4

    Article  Google Scholar 

  13. Hemalatha, R., Umamaheswari, R., Jothi, S.: LF distribution and equilibrium optimizer based fuzzy logic for multipath routing in MANET. Wireless Pers. Commun. 120(2), 1837–1861 (2021). https://doi.org/10.1007/s11277-021-08537-6

    Article  Google Scholar 

  14. Tamil Selvi, P., Suresh GhanaDhas, C.: A novel algorithm for enhancement of energy efficient zone based routing protocol for MANET. Mobile Netw. Appl. 24(2), 307–317 (2018). https://doi.org/10.1007/s11036-018-1043-x

    Article  Google Scholar 

  15. Desai, A.M., Jhaveri, R.H.: Secure routing in mobile Ad hoc networks: a predictive approach. Int. J. Inf. Technol. 11(2), 345–356 (2018). https://doi.org/10.1007/s41870-018-0188-y

    Article  Google Scholar 

  16. Janani, V.S., Manikandan, M.S.K.: Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2018(1), 1–27 (2018). https://doi.org/10.1186/s13638-017-1001-5

  17. Rajashanthi, M., Valarmathi, K.: A secure trusted multipath routing and optimal fuzzy logic for enhancing QoS in MANETs. Wireless Pers. Commun. 112(1), 75–90 (2019). https://doi.org/10.1007/s11277-019-07016-3

    Article  Google Scholar 

  18. Pushpalatha, K., Karthikeyan, M.: A generalized framework for disruption tolerant secure opportunistic routing during emergency situations using MANETs. Clust. Comput. 22(4), 9905–9913 (2018). https://doi.org/10.1007/s10586-018-1849-0

    Article  Google Scholar 

  19. Kukreja, D., Dhurandher, S.K., Reddy, B.V.R.: Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J. Ambient. Intell. Humaniz. Comput. 9(4), 941–956 (2017). https://doi.org/10.1007/s12652-017-0496-2

    Article  Google Scholar 

  20. Nagendranath, M.V.S.S., Babu, A.R.: An efficient mobility aware stable and secure clustering protocol for mobile ADHOC networks. Peer-to-Peer Netw. Appl. 13(4), 1185–1192 (2020). https://doi.org/10.1007/s12083-019-00868-3

  21. Kushwah, R., Tapaswi, S., Kumar, A.: A detailed study on internet connectivity schemes for mobile ad Hoc network. Wireless Pers. Commun. 104(4), 1433–1471 (2018). https://doi.org/10.1007/s11277-018-6093-7

    Article  Google Scholar 

  22. Srivastava, A., Gupta, S.K., Najim, M., Sahu, N., Aggarwal, G., Mazumdar, B.D.: DSSAM: digitally signed secure acknowledgement method for mobile ad hoc network. EURASIP J. Wirel. Commun. Netw. 2021(1), 1–29 (2021). https://doi.org/10.1186/s13638-021-01894-7

    Article  Google Scholar 

  23. Kumar, S.: Prediction of node and link failures in mobile ad hoc network using hello based path recovery routing protocol. Wireless Pers. Commun. 115(1), 725–744 (2020). https://doi.org/10.1007/s11277-020-07596-5

    Article  Google Scholar 

  24. Vatambeti, R.: A novel wolf based trust accumulation approach for preventing the malicious activities in mobile ad hoc network. Wireless Pers. Commun. 113(4), 2141–2166 (2020). https://doi.org/10.1007/s11277-020-07316-z

    Article  Google Scholar 

  25. Selvakumar, K., Seethalakshmi, N.: Secure group key management protocol for mobile ad hoc networks. Clust. Comput. 22(5), 11989–11995 (2018). https://doi.org/10.1007/s10586-017-1535-7

    Article  Google Scholar 

  26. Rajakumar, B.R.: Impact of static and adaptive mutation techniques on genetic algorithm. Int. J. Hybrid Intell. Syst. 10(1), 11–22 (2013). https://doi.org/10.3233/HIS-120161

  27. Manickavelu, D., Vaidyanathan, R.U.: Particle swarm optimization (PSO)-based node and link lifetime prediction algorithm for route recovery in MANET. EURASIP J. Wireless Commun. Netw. 2014 (2014)

    Google Scholar 

  28. Rajakumar, B.R.: Static and adaptive mutation techniques for genetic algorithm: a systematic comparative analysis. Int. J. Comput. Sci. Eng. 8(2), 180–193 (2013). https://doi.org/10.1504/IJCSE.2013.053087

  29. Swamy, S.M., Rajakumar, B.R., Valarmathi, I.R.: Design of hybrid wind and photovoltaic power system using opposition-based genetic algorithm with cauchy mutation. In: IET Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems (SEISCON 2013). Chennai, India (2013). https://doi.org/10.1049/ic.2013.0361

  30. George, A., Rajakumar, B.R.: APOGA: an adaptive population pool size based genetic algorithm. In: AASRI Procedia - 2013 AASRI Conference on Intelligent Systems and Control (ISC 2013), vol. 4, pp. 288–296 (2013). https://doi.org/10.1016/j.aasri.2013.10.043

  31. Rajakumar, B.R., George, A.: A new adaptive mutation technique for genetic algorithm. In: Proceedings of IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–7, December 18–20. Coimbatore, India (2012). https://doi.org/10.1109/ICCIC.2012.6510293

  32. Liu, H., Abraham, A., Snášel, V., McLoone, A.: Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments. Inf. Sci. 192, 228–243 (2012)

    Google Scholar 

  33. Vrionis, T.D., Koutiva, X.I., Vovos, N.A.: A genetic algorithm-based low voltage ride-through control strategy for grid connected doubly fed induction wind generators. IEEE Trans. Power Syst. 29(3) (2014)

    Google Scholar 

  34. Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51–67 (2016)

    Article  Google Scholar 

  35. Mirjalili, S., Mirjalili, S.M.: Andrew Lewis. Grey Wolf Optimizer” Advances in Engineering Software, vol. 69, pp. 46–61 (2014)

    Google Scholar 

  36. Murugan, T.K.S.: Hybrid weed-particle swarm optimization algorithm and C- mixture for data publishing. Multimedia Res. 2(3), 33–42 (2019)

    Google Scholar 

  37. Srinivas, V., Santhirani, C.: Hybrid particle swarm optimization-deep neural network model for speaker recognition. Multimedia Res. 3(1), 1–10 (2020)

    Google Scholar 

  38. Cristin, R., Gladiss Merlin, N.R., Ramanathan, L., Vimala, S.: Image forgery detection using back propagation neural network model and particle swarm optimization algorithm. Multimedia Res. 3(1), 21–32 (2020)

    Google Scholar 

  39. Rajeshkumar, G.: Hybrid particle swarm optimization and firefly algorithm for distributed generators placements in radial distribution system. J. Comput. Mech. Power Syst. Control 2(1), 41–48 (2019)

    Article  Google Scholar 

  40. Gayathri Devi, K.S.: Hybrid genetic algorithm and particle swarm optimization algorithm for optimal power flow in power system. J. Comput. Mech. Power Syst. Control 2(2), 31–37 (2019)

    Article  MathSciNet  Google Scholar 

  41. Roy, R.G.: Economic dispatch problem in power system using hybrid Particle Swarm optimization and enhanced Bat optimization algorithm. J. Comput. Mech. Power Syst. Control 3(3) (2020)

    Google Scholar 

  42. AlBalushi, F.M.: Chaotic based hybrid artificial sheep algorithm - particle swarm optimization for energy and secure aware in WSN. J. Network. Commun. Syst. 2(2), 37–48 (2019)

    Google Scholar 

  43. Deotale, N., Kolekar, U., Kondelwar, A.: Self-adaptive particle swarm optimization for optimal transmit antenna selection. J. Netw. Commun. Syst. 3(1), 1–10 (2020)

    Google Scholar 

  44. Haridas, S., Prasath, A.R.: Enhancement of network lifetime in MANET: improved particle swarm optimization for delayless and secured geographic routing. J. Adv. Res. Dyn. Control Syst. 12 (07) (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to S. Haridas or A. Rama Prasath .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Haridas, S., Prasath, A.R. (2022). Trust Aware Secure Routing Model in MANET: Self-improved Particle Swarm Optimization for Optimal Route Selection. In: Neuhold, E.J., Fernando, X., Lu, J., Piramuthu, S., Chandrabose, A. (eds) Computer, Communication, and Signal Processing. ICCCSP 2022. IFIP Advances in Information and Communication Technology, vol 651. Springer, Cham. https://doi.org/10.1007/978-3-031-11633-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-11633-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-11632-2

  • Online ISBN: 978-3-031-11633-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics