Abstract
Mobile Ad-Hoc Network (MANET) consist a numerous nodes and these nodes are structured with remote transceivers. These nodes forward the message with one another by getting to the typical channel. In MANET, security is the principle challenge to be analyzed. Due to the behaviour of malevolent nodes, the network security is weakened. Along these lines, the significant goal of this research is to enhance the network security by detecting the malevolent nodes. So, for the detection of malevolent node, an effective trust management method is presented in this paper. Improving the trust score the optimized fuzzy framework is proposed. For enhancing the execution of the fuzzy framework, the triangular membership function of the input parameters is improved with the Cat Swarm Optimization. After estimating the trust score for every node in the network, threshold depend decision module is processed for detecting the activity of malevolent nodes. Implementation results illustrate that the execution of the proposed model achieves maximum network lifetime and minimum energy consumption.
Similar content being viewed by others
Change history
15 December 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s11277-022-10118-0
References
Hoebeke, J., Moerman, I., Dhoedt, B., & Demeester, P. (2004). An overview of mobile ad hoc networks: applications and challenges. Journal-Communications Network, 3(3), 60–66.
Appiah, Martin. "The impact of mobility models on the performance of mobile ad hoc network (MANET)." In 2016 International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 208–213, IEEE, 2016.
Srivastava, Ashutosh, Deepak Kumar, and Suresh C. Gupta. "Modelling mobility in emergency scenario for MANET applications." In 2014 Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1–6. IEEE, 2014.
Appiah, Martin. "Performance comparison of mobility models in Mobile Ad Hoc Network (MANET)." In 2017 1st International Conference on Next Generation Computing Applications (NextComp), pp. 47–53. IEEE, 2017.
Sandeep, J., & Kumar, J. (2015). Efficient packet transmission and energy optimization in military operation scenarios of MANET. Procedia Computer Science, 47, 400–407.
Saravanan, K., and J. Vellingiri. "Defending MANET against flooding attack for medical application." In 2017 2nd International Conference on Communication and Electronics Systems (ICCES), pp. 486–489. IEEE, 2017.
Pease, Sarogini Grace. "ROAM: Supporting safety critical applications in MANETs with cross-layer middleware." In 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM), pp. 1–2. IEEE, 2013.
Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless communications, 14(5), 85–91.
Pirzada, A., & Mcdonald, C. (2006). Trust Establishment In Pure Ad-hoc Networks. Wireless Personal Communications, 37(1–2), 139–168.
H. Xia, Z. Jia, L. Ju, X. Li and Y. Zhu, "A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules". In 2011 IEEE/ACM International Conference on Green Computing and Communications, pp. 124–130, 2011.
M. Durad, Y. Cao and Z. Liehuang, "Two Novel Trust Evaluation Algorithms". In 2006 International Conference on Communications, Circuits and Systems, pp. 1641–1646, 2006.
Kukreja, D., Dhurandher, S., & Reddy, B. (2017). Power aware malevolent nodes detection for securing MANETs against packet forwarding misbehavior attack. Journal of Ambient Intelligence and Humanized Computing, 9(4), 941–956.
Bisen, D., & Sharma, S. (2017). Fuzzy based detection of malevolent activity for security assessment of MANET. National Academy Science Letters, 41(1), 23–28.
Singh, O., Singh, J., & Singh, R. (2017). Multi-level trust based intelligence intrusion detection system to detect the malevolent nodes using elliptic curve cryptography in MANET. Cluster Computing, 21(1), 51–63.
Rajeswari, A., Kulothungan, K., Ganapathy, S., & Kannan, A. (2019). A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Networking and Applications, 12(5), 1076–1096.
Dorri, A., Vaseghi, S., & Gharib, O. (2017). DEBH: Detecting and eliminating black holes in mobile ad hoc network. Wireless Networks, 24(8), 2943–2955.
Rmayti, M., Khatoun, R., Begriche, Y., Khoukhi, L., & Gaiti, D. (2017). A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks. Computer Networks, 121, 53–64.
Kumaravel, A., & Chandrasekaran, M. (2018). Performance analysis of malicious node detection in MANET using ANFIS classification approach. Cluster Computing, 22(S6), 13445–13452.
Rao, D. and Saraf, S., n.d. 1996 Study of defuzzification methods of fuzzy logic controller for speed control of a DC motor. In Proceedings of International Conference on Power Electronics Drives and Energy Systems for Industrial Growth, pp. 782–787
Kalpana Devi, M., & Umamaheswari, K. (2020). Modified Artificial Bee Colony with firefly algorithm based spectrum handoff in cognitive radio network. International Journal of Intelligent Networks, 1, 67–75.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s11277-022-10118-0
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Thangaraj, K., Dharma, D. RETRACTED ARTICLE: Optimized Fuzzy System Dependent Trust Score for Mobile AdHoc Network. Wireless Pers Commun 117, 3255–3269 (2021). https://doi.org/10.1007/s11277-020-07984-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07984-x