Skip to main content

Trust-Based Fuzzy Bat Optimization Algorithm for Attack Detection in Manet

  • Conference paper
  • First Online:
Smart Innovations in Communication and Computational Sciences

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1168))

Abstract

Mobile nodes dynamically form a multi-hop wireless networks which are termed as mobile ad hoc networks (MANETs). Centralized infrastructure is not required for the operation of MANETs. They are non-fixed infrastructure networks, and there are so many issues with them because of their dynamic topology, mobile nodes, security, bandwidth constraints, limited battery backup, etc. Trust is an association, trustworthiness, reliability and faithfulness of the nodes in the network. This paper discusses about the trust and trust computations. In this work, a trust-based fuzzy bat (TBF) optimization model is proposed and implemented to mitigate the effects of attacks. Various network environments are used to perform sensitivity analysis. Performance metrics like normalized routing overhead and packet delivery ratio are used for evaluation. Values of trust update interval, weight of trust component and distrust threshold are varied. A security solution is ensured using fuzzy bat with trust evaluation model in an untrusted environment of MANETs. The result concludes that the proposed TFB algorithm provides higher lifetime of a network and throughput and lower consumption of energy and end-to-end delay than the existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Popli, R., Garg, K., Batra, S.: Outlier detection using data mining in trust based clustered MANET’s. Int. J. Electr. Electron. Comput. Sci. Eng. 5(1), 2454–1222

    Google Scholar 

  2. Li, W., Joshi, A.: Outlier detection in ad hoc networks using dempster-shafer theory. In: IEEE, Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 112–121 (2009)

    Google Scholar 

  3. Liu, Q., Wang, G., Li, F., Yang, S., Wu, J.: Preserving privacy with probabilistic in distinguish ability in weighted social networks. IEEE Trans. Parallel Distrib. Syst. 28(5), 1417–1429 (2017, May). https://doi.org/10.1109/tpds.2016.2615020

  4. Jhaveri, R. H., Patel, N. M., Jinwala, D.C.: A composite trust model for secure routing in mobile ad-hoc networks. In: J.H. Ortiz, A.P. de la Cruz (eds.) Ad hoc networks, Rijeka, Croatia: InTech, pp. 19–45 (2017)

    Google Scholar 

  5. Khan, M.S., Khan, M.I., Malik, S.-U.-R., Khalid, O., Azim, M., Javaid, N.: MATF: a multi-attribute trust framework for MANETs. EURASIP J. Wirel. Commun. Netw. 2016(1), 197 (2016). https://doi.org/10.1186/s13638-016-0691-4

    Article  Google Scholar 

  6. Thorat, S.A., Kulkarni, P.J.: Uncertainty analysis framework for trust based routing in MANET. Peer Peer Netw. Appl. 10(4), 1101–1111 (2017)

    Article  Google Scholar 

  7. Jawhar, I., et al. TRAS: a trust-based routing protocol for ad hoc and sensor networks. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS). IEEE (2016)

    Google Scholar 

  8. Sethuraman, P., Kannan, N.: Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET. Wirel. Netw. 23(7), 2227–2237 (2017)

    Google Scholar 

  9. Joseph, J.F.C., et al.: CRADS: integrated cross layer approach for detecting routing attacks in MANETs. In: 2008 IEEE Wireless Communications and Networking Conference. IEEE (2008)

    Google Scholar 

  10. Golbeck, J. (ed.): Computing With Social Trust. Springer Science & Business Media (2008)

    Google Scholar 

  11. Luo, J., et al.: Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks. In: 2008 33rd IEEE Conference on Local Computer Networks (LCN). IEEE (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shashi Shekhar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, R., Shekhar, S. (2021). Trust-Based Fuzzy Bat Optimization Algorithm for Attack Detection in Manet. In: Tiwari, S., Trivedi, M., Mishra, K., Misra, A., Kumar, K., Suryani, E. (eds) Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 1168. Springer, Singapore. https://doi.org/10.1007/978-981-15-5345-5_1

Download citation

Publish with us

Policies and ethics