Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Trusted MANET Routing Algorithm Based on Fuzzy Logic

  • Conference paper
  • First Online:
Applied Computing to Support Industry: Innovation and Technology (ACRIT 2019)

Abstract

MANET wireless network changes network topology continuously and dynamically due to the absence of infrastructure and central control. Typically, this network used for areas where unavailable basic communications services such as battlefield, emergency relief, and virtual classes. However, ad hoc networks exposed to different attacks as in malicious or selfish nodes that impede packets delivery. A new algorithm proposed of the MANET using a fuzzy logic system to solve malicious nodes problem. The routing algorithm relies on two main principles as trust level and shortest path (hops count). The finding obtained from three key parameters as high packet delivery fraction with low end-to-end delay and normalized routing load in this study. These results calculated based on the comparison between the FLTS algorithm with AODV protocol and without a drop.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Computing, M.: An overview of MANET: applications, attacks and challenges abstract. Int. J. Comp. Sci. Mobile Comput. 3(1), 408–417 (2014)

    Google Scholar 

  2. Kaid, A., Ali, S., Kulkarni, U.V.: Characteristics, applications and challenges in mobile ad-hoc networks (MANET): overview. Wirel. Netw. 3(12), 6–12 (2015)

    Google Scholar 

  3. Eldein, D., Ahmed, M., Khalifa, O.O.: An overview of MANETs: applications, characteristics, challenges and recent issues. IJEAT 3, 128–133 (2017)

    Google Scholar 

  4. Patel, D.N., Patel, S.B., Hemangi, R.: A survey of reactive routing protocols in MANET. In: International Conference on Information Communication and Embedded Systems (ICICES 2014), pp. 1–6. IEEE (2014)

    Google Scholar 

  5. Kaur, H., Sahni, V., Bala, M.: A survey of reactive, proactive and hybrid routing protocols in MANET: a review. Network 4(3), 498–500 (2013)

    Google Scholar 

  6. Hinds, A., Ngulube, M., Zhu, S., Al-aqrabi, H.: A review of routing protocols for mobile ad-hoc networks (MANET). Int. J. Inf. Educ. Technol. 3(1), 1–5 (2013)

    Google Scholar 

  7. Alslaim, M.N., Alaqel, H.A., Zaghloul, S.S.: A comparative study of MANET routing protocols. In: The Third International Conference on e-Technologies and Networks for Development (ICeND 2014), pp. 178–182. IEEE (2014)

    Google Scholar 

  8. Kerrache, C.A., Lagraa, N., Calafate, C.T., Lakas, A.: TROUVE : a trusted routing protocol for urban vehicular environments. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 260–267. IEEE (2015)

    Google Scholar 

  9. Khalaf, M., et al.: A data science methodology based on machine learning algorithms for flood severity prediction. In 2018 IEEE Congress on Evolutionary Computation (CEC), pp. 1–8. IEEE (2015)

    Google Scholar 

  10. Yas, Q.M., Khalaf, M.: Reactive routing algorithm based trustworthy with less hop counts for mobile ad-hoc networks using fuzzy logic system. J. Southwest Jiaotong Univ. 54(3), 1–11 (2019)

    Article  Google Scholar 

  11. Inaba, T., Sakamoto, S., Kulla, E., Caballe, S.: An integrated system for wireless cellular and ad-hoc networks using fuzzy logic. In: 2014 International Conference on Intelligent Networking and Collaborative Systems, pp. 157–162. IEEE (2014)

    Google Scholar 

  12. Balan, E.V., Priyan, M.K., Gokulnath, C., Devi, G.U.: Fuzzy based intrusion detection systems in MANET. Procedia Comput. Sci. 50, 109–114 (2015)

    Article  Google Scholar 

  13. Yas, Q.M., Zadain, A.A., Zaidan, B.B., Lakulu, M.B., Rahmatullah, B.: Towards on develop a framework for the evaluation and benchmarking of skin detectors based on artificial intelligent models using multi-criteria decision-making techniques. Int. J. Pattern Recogn. Artif. Intell. 31(03), 1759002 (2017)

    Article  Google Scholar 

  14. Yas, Q.M., Zaidan, A.A., Zaidan, B.B., Rahmatullah, B., Karim, H.A.: Comprehensive insights into evaluation and benchmarking of real-time skin detectors: review, open issues & challenges, and recommended solutions. Measurement 114, 243–260 (2017)

    Article  Google Scholar 

  15. Jassim, H.S., Yussof, S., Kiong, T.S., Koh, S.P., Ismail, R.: A routing protocol based on trusted and shortest path selection for mobile ad hoc network. In: 2009 IEEE 9th Malaysia International Conference on Communications (MICC), pp. 547–554. IEEE (2009)

    Google Scholar 

  16. Vlpduhpduh, K., et al.: Performance analysis of optimized trust AODV using ant algorithm. In: 2014 IEEE International Conference on Communications (ICC), pp. 1843–1848. IEEE (2014)

    Google Scholar 

  17. Xia, H., Jia, Z., Ju, L., Li, X., Sha, E.H.: Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Comput. Commun. 36(9), 1078–1093 (2013)

    Article  Google Scholar 

  18. Chaudhary, A., Kumar, A., Tiwari, V.N.: A reliable solution against packet dropping attack due to malicious nodes using fuzzy logic in MANETs. In: 2014 International Conference on Reliability Optimization and Information Technology (ICROIT), pp. 178–181. IEEE (2014). C. Science, E. Communication, and C. Science

    Google Scholar 

  19. Anuradha, M., Mala, G.S.A.: Cross-layer based congestion detection and routing protocol using fuzzy logic for MANET. Wirel. Netw. 23(5), 1373–1385 (2016)

    Article  Google Scholar 

  20. Robinson, Y.H., Rajaram, M., Julie, E.G., Balaji, S.: Detection of black holes in MANET using collaborative watchdog with fuzzy logic. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 10(3), 622–628 (2016)

    Google Scholar 

  21. Kumar, K.V., Sankar, T.J., Prabhakaran, M., Srinivasan, V.: Fuzzy logic based efficient multipath routing for mobile adhoc networks. Appl. Math. Inf. Sci. 11(2), 449–455 (2017)

    Article  Google Scholar 

  22. Sarkar, A.: Application of fuzzy logic in transport. Int. J. Soft Comput. 3(2), 1–21 (2012)

    Article  Google Scholar 

  23. Ghasemnezhad, S., Ghaffari, A.: Fuzzy logic based reliable and real-time routing protocol for mobile ad hoc networks. Wirel. Pers. Commun. 98(1), 593–611 (2017)

    Article  Google Scholar 

  24. Sambariya, D.K., Prasad, R.: A novel fuzzy rule matrix design for fuzzy logic-based power system stabilizer. Electr. Power Compon. Syst. 45(1), 34–48 (2016)

    Article  Google Scholar 

  25. Chettibi, S., Chikhi, S.: Dynamic fuzzy logic and reinforcement learning for adaptive energy-efficient routing in mobile ad-hoc networks. Appl. Soft Comput. 38, 321–328 (2016)

    Article  Google Scholar 

  26. Pouyan, A.A., Tabari, M.Y.: FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile ad hoc network. Int. J. Commun Syst 30(1), 1–14 (2015)

    Google Scholar 

  27. Jia, X.L.Z., Zhang, P.Z.R.: Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf. Secur. 4(4), 212–232 (2010)

    Article  MathSciNet  Google Scholar 

  28. Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.H.: Ad hoc networks trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)

    Article  Google Scholar 

  29. Keerthi, T.D.S., Venkataram, P.: AODV route maintenance using honeypots in MANETs. In: 2015 World Congress on Internet Security (WorldCIS), pp. 105–112 (2015)

    Google Scholar 

  30. Kumar, R.S.: A review and design study of cross-layer scheme based algorithm to reduce the link break in MANETs. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 139–143. IEEE (2013)

    Google Scholar 

  31. Patel, R., Patel, N., Kamboj, P.: A comparative study and simulation of AODV MANET routing protocol in NS2 & NS3. In: 2014 International Conference on Computing for Sustainable Global Development (INDIACom), pp. 889–894. IEEE (2014)

    Google Scholar 

  32. Bouras, C., Charalambides, S., Drakoulelis, M., Kioumourtzis, G.: Simulation modelling practice and theory a tool for automating network simulation and processing tracing data files. Stimul. Model. Pract. Theory 1–21 ( 2012)

    Google Scholar 

Download references

Acknowledgement

The author would like to thank the University of Diyala\Scientific Research Center (SRC) for supporting this major research project and also to some friends who gave me advice during working this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qahtan M. Yas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yas, Q.M., Khalaf, M. (2020). A Trusted MANET Routing Algorithm Based on Fuzzy Logic. In: Khalaf, M., Al-Jumeily, D., Lisitsa, A. (eds) Applied Computing to Support Industry: Innovation and Technology. ACRIT 2019. Communications in Computer and Information Science, vol 1174. Springer, Cham. https://doi.org/10.1007/978-3-030-38752-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-38752-5_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-38751-8

  • Online ISBN: 978-3-030-38752-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics