Skip to main content
Log in

Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Due to the dynamic nature of network topology, routing has been recently identified as the most serious challenge in MANET. For effective routing in MANET, route discovery and optimal route selection are the two significant considerations. The main objective of this research is to determine the optimal route for packet transmission in MANET. In this study, the test score analyzes both trusted and untrusted nodes from the source initially. Based on the trusted nodes, we proposed an Adaptive Trust-based Secure and Optimal Route Selection using Hybrid Fuzzy Optimization (ATSORS-HFO) model. At first, the optimal routes are selected with the help of the Fuzzy Butterfly Optimization Algorithm (FBOA) and an Advanced Encryption Standard based on an Adaptive Chaotic Grey Wolf Optimization (ACGWO) algorithm provides secure communication. The resulting K-paths are ideally selected using the trust-based ACGWO algorithm. The key of the nodes and shared code is validated using the AES- ACGWO algorithm for each data transfer instance, showing a safe connection. To demonstrate system efficacy, the proposed model is compared to existing techniques and assessed using various evaluation metrics such as throughput, latency, packet loss ratio, packet delivery ratio, and detection rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Availability of data and material

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

Code availability

Not applicable.

References

  1. Ponguwala M, Rao DR (2019) Secure group based routing and flawless trust formulation in MANET using unsupervised machine learning approach for IoT applications. EAI Endorsed Trans Energy Web 6(24):160834

    Article  Google Scholar 

  2. Alappatt V, PM JP (2021) Trust-based energy efficient secure multipath routing in MANET using LF-SSO and SH2E. Int J Comput Netw Appl 8(4):400–411

    Google Scholar 

  3. Nabati M, Maadani M, Pourmina MA (2021) AGEN-AODV: an intelligent energy-aware routing protocol for heterogeneous mobile ad-hoc networks. Mob Netw Appl 1–12

    Google Scholar 

  4. Sankaran KS, Vasudevan N, Devabalaji KR, Babu TS, Alhelou HH, Yuvaraj T (2021) A recurrent reward based learning technique for secure neighbor selection in mobile AD-HOC networks. IEEE Access 9:21735–21745

    Article  Google Scholar 

  5. Sirajuddin M, Rupa C, Iwendi C, Biamba C (2021) TBSMR: A trust-based secure multipath routing protocol for enhancing the QoS of the mobile Ad Hoc network. Secur Commun Netw

  6. Dhanapal R, Kalpana V, Chiwariro R, Thangadurai N, Sentamilselvan K, Immanuel DJ (2021) An energy efficient secure routing for mobile nodes for Multihop Adhoc network. J Comput Theor Nanosci 18(3):973–976

    Google Scholar 

  7. Johnson AJ (2021) QoS improvement in MANET using self organized balanced optimization. Turk J Comput Math Educ (TURCOMAT) 12(11):186–194

    Google Scholar 

  8. Bisen D, Mishra S, Saurabh P (2021) K-means based cluster formation and head selection through artificial neural network in MANET

  9. Sathyaraj P, Rukmani Devi D (2021) Designing the routing protocol with secured IoT devices and QoS over Manet using trust-based performance evaluation method. J Ambient Intell Humaniz Comput 12(7):6987–6995

    Article  Google Scholar 

  10. Mukhedkar MM, Kolekar U (2019) Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. Comput J 62(10):1528–1545

    Article  MathSciNet  Google Scholar 

  11. Pathan MS, Zhu N, He J, Zardari ZA, Memon MQ, Hussain MI (2018) An efficient trust-based scheme for secure and quality of service routing in MANETs. Future Internet 10(2):16

    Article  Google Scholar 

  12. Hemalatha R, Umamaheswari R, Jothi S (2021) Optimal route maintenance based on adaptive equilibrium optimization and GTA based route discovery model in MANET. Peer Peer Netw Appl 1–15

    Google Scholar 

  13. Sankar Ganesh S, Ravi G (2020) Real time link quality based route selection and transmission in industrial Manet for improved QoS. J Ambient Intell Humaniz Comput 1–11

    Google Scholar 

  14. Garg MK, Singh N, Verma P (2018) Fuzzy rule-based approach for design and analysis of a trust-based secure routing protocol for MANETs. Procedia Comput Sci 132:653–658

    Article  Google Scholar 

  15. Shabut AM, Kaiser MS, Dahal KP, Chen W (2018) A multidimensional trust evaluation model for MANETs. J Netw Comput Appl 123:32–41

    Article  Google Scholar 

  16. Wang B, Chen X, Chang W (2014) A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob Comput 13:164–180

    Article  Google Scholar 

  17. Arora S, Singh S (2019) Butterfly optimization algorithm: a novel approach for global optimization. Soft Comput 23(3):715–734

    Article  Google Scholar 

  18. Comi A, Fotia L, Messina F, Rosaci D, Sarné GM (2016) A partnership-based approach to improve QoS on federated computing infrastructures. Inf Sci 367:246–258

    Article  Google Scholar 

  19. Bai Y, Wang D (2006) Fundamentals of fuzzy logic control—fuzzy sets, fuzzy rules and defuzzifications. In Advanced fuzzy logic technologies in industrial applications (pp. 17–36). Springer, London

  20. Mortazavi A, Moloodpoor M (2021) Enhanced butterfly optimization algorithm with a new fuzzy regulator strategy and virtual butterfly concept. Knowl-Based Syst 228:107291

    Article  Google Scholar 

  21. Sheikhpour S, Mahani A, Bagheri N (2021) Reliable advanced encryption standard hardware implementation: 32-bit and 64-bit data-paths. Microprocess Microsyst 81:103740

    Article  Google Scholar 

  22. Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the Internet of Things: perspectives and challenges. Wirel Netw 20(8):2481–2501

    Article  Google Scholar 

  23. Gupta S, Deep K (2019) A novel random walk grey wolf optimizer. Swarm Evol Comput 44:101–112

    Article  Google Scholar 

  24. Şenel FA, Gökçe F, Yüksel AS, Yiğit T (2019) A novel hybrid PSO–GWO algorithm for optimization problems. Eng Comput 35(4):1359–1373

    Article  Google Scholar 

  25. Djellali H, Ghoualmi N (2019) Improved chaotic initialization of particle swarm applied to feature selection. In 2019 International Conference on Networking and Advanced Systems (ICNAS) (pp. 1–5). IEEE

  26. Hong M, Wang Y, Liu W, Matsumura S, Wang H, Zou J, Chen ZG (2018) Arrays of planar vacancies in superior thermoelectric Ge1− x− yCdxBiyTe with band convergence. Adv Energy Mater 8(30):1801837

    Article  Google Scholar 

  27. Hao P, Sobhani B (2021) Application of the improved chaotic grey wolf optimization algorithm as a novel and efficient method for parameter estimation of solid oxide fuel cells model. Int J Hydrog Energy

  28. Alghamdi SA (2021) Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud. Int J Inf Secur 1–20

    Google Scholar 

  29. Ram Mohan C, Ananthula VR (2019) Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization. Int J Model Simul Sci Comput 10(03):1950014

    Article  Google Scholar 

  30. Ponguwala M, Rao S (2019) E 2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT. IET Commun 13(19):3207–3216

    Article  Google Scholar 

  31. Gowthul Alam MM, Baulkani S (2017) Reformulated query-based document retrieval using optimised kernel fuzzy clustering algorithm. Int J Bus Intell Data Min 12(3):299

    Google Scholar 

  32. Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117–126

    Google Scholar 

  33. Gowthul Alam MM, Baulkani S (2019) Geometric structure information based multi-objective function to increase fuzzy clustering performance with artificial and real-life data. Soft Comput 23(4):1079–1098

    Article  Google Scholar 

  34. Sundararaj V (2019) Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int J Biomed Eng Technol 31(4):325

    Article  Google Scholar 

  35. Gowthul Alam MM, Baulkani S (2019) Local and global characteristics-based kernel hybridization to increase optimal support vector machine performance for stock market prediction. Knowl Inf Syst 60(2):971–1000

    Article  Google Scholar 

  36. Hassan BA, Rashid TA (2020) Datasets on statistical analysis and performance evaluation of backtracking search optimisation algorithm compared with its counterpart algorithms. Data Brief 28:105046

    Article  Google Scholar 

  37. Hassan BA (2020) CSCF: a chaotic sine cosine firefly algorithm for practical application problems. Neural Comput Appl 1–20

    Google Scholar 

  38. Rejeesh MR (2019) Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed Tools Appl 78(16):22691–22710

    Article  Google Scholar 

  39. Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288

    Article  Google Scholar 

  40. Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, Rejeesh MR, Sundararaj R (2020) CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovolt Res Appl 28(11):1128–1145

    Article  Google Scholar 

  41. Vinu S (2019) Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel Pers Commun 104(1):173–197

    Article  Google Scholar 

  42. Malarvizhi N, Aswini J, Sasikala S, Chakravarthy MH, Neeba EA (2021) Multi-parameter optimization for load balancing with effective task scheduling and resource sharing. J Ambient Intell Humaniz Comput 1–9

    Google Scholar 

  43. Aswini J, Yamini B, Jatothu R, Nayaki KS, Nalini M (2021) An efficient cloud‐based healthcare services paradigm for chronic kidney disease prediction application using boosted support vector machine. Concurr Comput Pract Exp e6722

Download references

Author information

Authors and Affiliations

Authors

Contributions

All authors agreed on the content of the study. SR, SM, UP, SS and SKP collected all the data for analysis. SR agreed on the methodology. SR, SM, UP, SS and SKP completed the analysis based on agreed steps. Results and conclusions arediscussed and written together. The author read and approved the final manuscript.

Corresponding author

Correspondence to Srivel Ravi.

Ethics declarations

Informed consent

Informed consent was obtained from all individual participants included in the study.

Consent to participate

Not applicable.

Consent for publication

Not applicable.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ravi, S., Matheswaran, S., Perumal, U. et al. Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization. Peer-to-Peer Netw. Appl. 16, 22–34 (2023). https://doi.org/10.1007/s12083-022-01351-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01351-2

Keywords

Navigation