Abstract
MANET wireless network changes network topology continuously and dynamically due to the absence of infrastructure and central control. Typically, this network used for areas where unavailable basic communications services such as battlefield, emergency relief, and virtual classes. However, ad hoc networks exposed to different attacks as in malicious or selfish nodes that impede packets delivery. A new algorithm proposed of the MANET using a fuzzy logic system to solve malicious nodes problem. The routing algorithm relies on two main principles as trust level and shortest path (hops count). The finding obtained from three key parameters as high packet delivery fraction with low end-to-end delay and normalized routing load in this study. These results calculated based on the comparison between the FLTS algorithm with AODV protocol and without a drop.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Computing, M.: An overview of MANET: applications, attacks and challenges abstract. Int. J. Comp. Sci. Mobile Comput. 3(1), 408–417 (2014)
Kaid, A., Ali, S., Kulkarni, U.V.: Characteristics, applications and challenges in mobile ad-hoc networks (MANET): overview. Wirel. Netw. 3(12), 6–12 (2015)
Eldein, D., Ahmed, M., Khalifa, O.O.: An overview of MANETs: applications, characteristics, challenges and recent issues. IJEAT 3, 128–133 (2017)
Patel, D.N., Patel, S.B., Hemangi, R.: A survey of reactive routing protocols in MANET. In: International Conference on Information Communication and Embedded Systems (ICICES 2014), pp. 1–6. IEEE (2014)
Kaur, H., Sahni, V., Bala, M.: A survey of reactive, proactive and hybrid routing protocols in MANET: a review. Network 4(3), 498–500 (2013)
Hinds, A., Ngulube, M., Zhu, S., Al-aqrabi, H.: A review of routing protocols for mobile ad-hoc networks (MANET). Int. J. Inf. Educ. Technol. 3(1), 1–5 (2013)
Alslaim, M.N., Alaqel, H.A., Zaghloul, S.S.: A comparative study of MANET routing protocols. In: The Third International Conference on e-Technologies and Networks for Development (ICeND 2014), pp. 178–182. IEEE (2014)
Kerrache, C.A., Lagraa, N., Calafate, C.T., Lakas, A.: TROUVE : a trusted routing protocol for urban vehicular environments. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 260–267. IEEE (2015)
Khalaf, M., et al.: A data science methodology based on machine learning algorithms for flood severity prediction. In 2018 IEEE Congress on Evolutionary Computation (CEC), pp. 1–8. IEEE (2015)
Yas, Q.M., Khalaf, M.: Reactive routing algorithm based trustworthy with less hop counts for mobile ad-hoc networks using fuzzy logic system. J. Southwest Jiaotong Univ. 54(3), 1–11 (2019)
Inaba, T., Sakamoto, S., Kulla, E., Caballe, S.: An integrated system for wireless cellular and ad-hoc networks using fuzzy logic. In: 2014 International Conference on Intelligent Networking and Collaborative Systems, pp. 157–162. IEEE (2014)
Balan, E.V., Priyan, M.K., Gokulnath, C., Devi, G.U.: Fuzzy based intrusion detection systems in MANET. Procedia Comput. Sci. 50, 109–114 (2015)
Yas, Q.M., Zadain, A.A., Zaidan, B.B., Lakulu, M.B., Rahmatullah, B.: Towards on develop a framework for the evaluation and benchmarking of skin detectors based on artificial intelligent models using multi-criteria decision-making techniques. Int. J. Pattern Recogn. Artif. Intell. 31(03), 1759002 (2017)
Yas, Q.M., Zaidan, A.A., Zaidan, B.B., Rahmatullah, B., Karim, H.A.: Comprehensive insights into evaluation and benchmarking of real-time skin detectors: review, open issues & challenges, and recommended solutions. Measurement 114, 243–260 (2017)
Jassim, H.S., Yussof, S., Kiong, T.S., Koh, S.P., Ismail, R.: A routing protocol based on trusted and shortest path selection for mobile ad hoc network. In: 2009 IEEE 9th Malaysia International Conference on Communications (MICC), pp. 547–554. IEEE (2009)
Vlpduhpduh, K., et al.: Performance analysis of optimized trust AODV using ant algorithm. In: 2014 IEEE International Conference on Communications (ICC), pp. 1843–1848. IEEE (2014)
Xia, H., Jia, Z., Ju, L., Li, X., Sha, E.H.: Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Comput. Commun. 36(9), 1078–1093 (2013)
Chaudhary, A., Kumar, A., Tiwari, V.N.: A reliable solution against packet dropping attack due to malicious nodes using fuzzy logic in MANETs. In: 2014 International Conference on Reliability Optimization and Information Technology (ICROIT), pp. 178–181. IEEE (2014). C. Science, E. Communication, and C. Science
Anuradha, M., Mala, G.S.A.: Cross-layer based congestion detection and routing protocol using fuzzy logic for MANET. Wirel. Netw. 23(5), 1373–1385 (2016)
Robinson, Y.H., Rajaram, M., Julie, E.G., Balaji, S.: Detection of black holes in MANET using collaborative watchdog with fuzzy logic. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 10(3), 622–628 (2016)
Kumar, K.V., Sankar, T.J., Prabhakaran, M., Srinivasan, V.: Fuzzy logic based efficient multipath routing for mobile adhoc networks. Appl. Math. Inf. Sci. 11(2), 449–455 (2017)
Sarkar, A.: Application of fuzzy logic in transport. Int. J. Soft Comput. 3(2), 1–21 (2012)
Ghasemnezhad, S., Ghaffari, A.: Fuzzy logic based reliable and real-time routing protocol for mobile ad hoc networks. Wirel. Pers. Commun. 98(1), 593–611 (2017)
Sambariya, D.K., Prasad, R.: A novel fuzzy rule matrix design for fuzzy logic-based power system stabilizer. Electr. Power Compon. Syst. 45(1), 34–48 (2016)
Chettibi, S., Chikhi, S.: Dynamic fuzzy logic and reinforcement learning for adaptive energy-efficient routing in mobile ad-hoc networks. Appl. Soft Comput. 38, 321–328 (2016)
Pouyan, A.A., Tabari, M.Y.: FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile ad hoc network. Int. J. Commun Syst 30(1), 1–14 (2015)
Jia, X.L.Z., Zhang, P.Z.R.: Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf. Secur. 4(4), 212–232 (2010)
Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.H.: Ad hoc networks trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)
Keerthi, T.D.S., Venkataram, P.: AODV route maintenance using honeypots in MANETs. In: 2015 World Congress on Internet Security (WorldCIS), pp. 105–112 (2015)
Kumar, R.S.: A review and design study of cross-layer scheme based algorithm to reduce the link break in MANETs. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 139–143. IEEE (2013)
Patel, R., Patel, N., Kamboj, P.: A comparative study and simulation of AODV MANET routing protocol in NS2 & NS3. In: 2014 International Conference on Computing for Sustainable Global Development (INDIACom), pp. 889–894. IEEE (2014)
Bouras, C., Charalambides, S., Drakoulelis, M., Kioumourtzis, G.: Simulation modelling practice and theory a tool for automating network simulation and processing tracing data files. Stimul. Model. Pract. Theory 1–21 ( 2012)
Acknowledgement
The author would like to thank the University of Diyala\Scientific Research Center (SRC) for supporting this major research project and also to some friends who gave me advice during working this research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Yas, Q.M., Khalaf, M. (2020). A Trusted MANET Routing Algorithm Based on Fuzzy Logic. In: Khalaf, M., Al-Jumeily, D., Lisitsa, A. (eds) Applied Computing to Support Industry: Innovation and Technology. ACRIT 2019. Communications in Computer and Information Science, vol 1174. Springer, Cham. https://doi.org/10.1007/978-3-030-38752-5_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-38752-5_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38751-8
Online ISBN: 978-3-030-38752-5
eBook Packages: Computer ScienceComputer Science (R0)