53
Views
0
CrossRef citations to date
0
Altmetric
Communications

Trust-adaptive Fuzzy-Statistical Protocol for Optimizing the Communication in Attacked Network

ORCID Icon &

References

  • A. Roy, and T. Deb. “performance comparison of routing protocols in mobile ad hoc networks,” Proceedings of the International Conference on Computing and Communication Systems, pp. 33-48, 2018.
  • A. Vij, and V. Sharma. “Security issues in mobile adhoc network: A survey paper,” International Conference on Computing; Communication and Automation (ICCCA), pp. 561–566, 2016.
  • K. Juneja, “Probabilistic dempster shafer based communication behaviour analysis for attack safe communication in mobile network,” Pertanika Journal of Science & Technology, Vol. 27, no. 3, pp. 1301–1316, 2019.
  • K. Juneja, “Random-session and K-neighbour based suspected node Analysis Approach for cooperative blackhole Detection in MANET,” Wirel. Pers. Commun., Vol. 110, pp. 45–68, 2020.
  • Nikita Verma and Ashish Jain, “Trust management in mobile ad hoc network: A survey,” International conference of Electronics, Communication and Aerospace Technology (ICECA), pp. 455–460, 2017.
  • C. Lochert, B. Scheuermann, and M. Mauve, “A survey on congestion control for mobile ad hoc networks,” Wirel. Commun. Mob. Comput., Vol. 7, no. 5, pp. 655–676, 2007.
  • M. Conti, E. Gregori, and G. Maselli. “Cooperation issues in mobile ad hoc networks,” 24th International Conference on Distributed Computing Systems Workshops, pp. 803–808, 2004.
  • S. Malik, and P. K. Sahu, “A comparative study on routing protocols for VANETs,” Heliyon, Vol. 5, no. 8, p. e02340, 2019. https://doi.org/10.1016/j.heliyon.2019.e02340
  • T. K. Saini, and S. C. Sharma, “Prominent unicast routing protocols for mobile ad hoc networks: criterion, classification, and key attributes,” Ad. Hoc. Netw., Vol. 89, pp. 58–77, 2019.
  • K. Prabha, “Performance assessment and comparison of efficient ad hoc reactive and proactive network routing protocols,” SN Computer Science, Vol. 1, 2020. Article No. 13. https://doi.org/10.1007/s42979-019-0015-y
  • S. Mollahasani, A. Eroglu, I. Demirkol, and E. Onur, “Density-aware mobile networks: opportunities and challenges,” Comput. Netw., Vol. 175, 2020, pp. 107271. https://doi.org/10.1016/j.comnet.2020.107271.
  • R. Menaka, J. M. Mathana, R. Dhanagopal, and B. Sundarambal. “Performance evaluation of DSR protocol in MANET untrustworthy environment,” 6th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1049–1052, 2020.
  • E. S. Alamsyah, I. K. E. Purnama, and M. H. Purnomo. “Analysis of reactive routing protocols in MANET based on quality of service,” International Seminar on Application for Technology of Information and Communication (iSemantic), pp. 342–345, 2019.
  • T. Jamal, and S. A. Butt, “Malicious node analysis in MANETS,” Int. J. Inf. Technol., Vol. 11, pp. 859–867, 2019.
  • A. Saini, and R. Nath, “Performance evaluation of AODV and DSR routing protocol on varying speed and pause time in mobile ad hoc networks,” Next-Generation Networks, Advances in Intelligent Systems and Computing, Vol. 638, pp. 313–322, 2018.
  • N. Bilandi, and K. Kaur. “Performance analysis of propagation structures on DSR routing protocol in mobile ad-hoc networks,” 2nd International Conference on Next Generation Computing Technologies (NGCT), pp. 445–449, 2016.
  • I. Woungang, S. K. Dhurandher, M. S. Obaidat, and R. D. Peddi, “A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks,” Security and Communication Networks, Vol. 9, no. 5, pp. 420–428, 2016.
  • B. Singh, and K. Kaur, “Performance analysis of propagation structures on DSR routing protocol in mobile ad-hoc networks,” International Journal of Grid and Distributed Computing, Vol. 9, no. 12, pp. 105–114, 2016.
  • S. Salari-Moghaddam, H. Taheri, and A. Karimi, “Trust based routing algorithm to improve quality of Service in DSR protocol,” Wirel. Pers. Commun., Vol. 109, no. 1, pp. 1–16, 2019.
  • V. Sharma, B. Alam, and M. N. Doja, “An improvement in DSR routing protocol of MANETs using ANFIS,” Applications of Artificial Intelligence Techniques in Engineering, Advances in Intelligent Systems and Computing, Vol. 697, pp. 569–576, 2018.
  • D.-g. Zhang, S. Liu, X.-h. Liu, T. Zhang, and Y.-y. Cui, “Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO),” Int. J. Commun Syst, Vol. 31, no. 18, 2018:e3824. https://doi.org/10.1002/dac.3824.
  • A. Lala, A. Bhaskar, P. Chakrabarti, and J. Srivastava, “A novel approach for optimizing energy and bandwidth issues in MANET using DSR protocol,” International Journal of Computer Networks and Communications, Vol. 9, no. 5, pp. 17–29, 2017.
  • A. Barve, A. Kini, O. Ekbote, and J. Abraham. “Optimization of DSR routing protocol in MANET using passive clustering,” 2nd International Conference on Communication Control and Intelligent Systems (CCIS), pp. 23–27, 2016.
  • D. Badal, and R. S. Kushwah. “Nodes energy aware modified DSR protocol for energy efficiency in MANET,” Annual IEEE India Conference (INDICON), pp. 1–5, 2015.
  • D. C. Lee, and D. H. Lee, “Novel routing protocol scheme for real-time applications in mobile Ad Hoc networks,” Cluster. Comput., Vol. 22, pp. 977–988, 2019.
  • J. Deepa, and J. Sutha, “A new energy based power aware routing method for MANETs,” Cluster. Comput., Vol. 22, pp. 13317–13324, 2019.
  • Y. Harold Robinson, R. Santhana Krishnan, E. Golden Julie, R. Kumar, L. H. Son, and P. H. Thong, “Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in mobile ad-hoc networks,” Ad. Hoc. Netw., Vol. 93, 2019:101896. https://doi.org/10.1016/j.adhoc.2019.101896.
  • S. Yadav, and T. Firdaus. “Congestion aware routing in AODV based mobile ad-hoc network (MANET),” International Conference on Computing, Power and Communication Technologies (GUCON), pp. 452-457, 2019.
  • B. H. Khudayer, M. Anbar, S. M. Hanshi, and T.-C. Wan, “Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks,” IEEE. Access., Vol. 8, pp. 24019–24032, 2020.
  • M. B. Dsouza, and D. H. Manjaiah. “Congestion free and bandwidth aware multipath protocol for MANET,” 1st International Conference on Advances in Information Technology (ICAIT), pp. 267–270, 2019.
  • H. Jhajj, Rijutha Datla, and Nan Wang, “Design and implementation of an efficient multipath AODV routing algorithm for MANETs,” IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0527–0531, 2019.
  • Z. Chen, W. Zhou, S. Wu, and L. Cheng, “An adaptive on-demand multipath routing protocol with QoS support for high-speed MANET,” IEEE. Access., Vol. 8, pp. 44760–44773, 2020.
  • N. Prasath, and J. Sreemathy, “Optimized dynamic source routing protocol for MANETs,” Cluster. Comput., Vol. 22, pp. 12397–12409, 2019.
  • S. Hasdemir, S. Yilmaz, and S. Sen, “A novel multi-featured metric for adaptive routing in mobile ad hoc networks,” Applied Intelligence, Vol. 49, pp. 2823–2841, 2019.
  • K. Murugan, and S. Shanmugavel, “Performance study and effects of route caching mechanisms in on-demand routing algorithms for MANET,” IETE. J. Res., Vol. 52, no. 2-3, pp. 153–167, 2006.
  • W. S. Alnumay, P. Chatterjee, and U. Ghosh, “Energy aware secure routing for wireless ad hoc networks,” IETE. J. Res., Vol. 60, no. 1, pp. 50–59, 2014.
  • K. Juneja, “DRI table based traffic-behaviour analysis approach for detection of blackhole attack,” International Journal of Sensors, Wireless Communications and Control, Vol. 10, no. 1, pp. 79–93, 2020.
  • M. Mohanapriya, and L. Krishnamurthi, “Modified DSR protocol for detection and removal of selective black hole attack in MANET,” Comput. Electr. Eng., Vol. 40, no. 2, pp. 530–538, 2014.
  • D. Kukreja, and D. K. Sharma, “T-SEA: trust based secure and energy aware routing protocol for mobile ad hoc networks,” Int. J. Inf. Technol., 2019. https://doi.org/10.1007/s41870-019-00392-w
  • A. Ghander, and E. Shaaban, “Power aware cooperation enforcement MANET routing protocols,” Procedia. Comput. Sci., Vol. 73, pp. 162–171, 2015.
  • M. A. Abdelshafy, and P. J. B. King. “Resisting blackhole attacks on MANETs,” in 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, 2016, pp. 1048–1053.
  • S. N. A. Bajpai. “Normalized scores for routes in MANET to analyze and detect collaborative blackhole attack,” in International Conference on Next Generation Computing Technologies, 2017, pp. 371–380.
  • N. G. Wakode. “Defending blackhole attack by using acknowledge based approach in MANETs,” in International Conference on IoT and Application (ICIOT), Nagapattinam, 2017, pp. 1–6.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.