A Trust-Based Secure Neuro Fuzzy Clustering Technique for Mobile Ad Hoc Networks

被引:4
|
作者
Rajeswari, Alagan Ramasamy [1 ]
Lai, Wen-Cheng [2 ,3 ]
Kavitha, C. [4 ]
Balasubramanian, Prabhu Kavin [5 ]
Srividhya, S. R. [4 ]
机构
[1] Rohini Coll Engn & Technol, Dept Comp Sci & Engn, Kanayakumari 629401, Tamil Nadu, India
[2] Natl Yunlin Univ Sci & Technol, Bachelor Program Ind Projects, Touliu 640301, Yunlin, Taiwan
[3] Natl Yunlin Univ Sci & Technol, Dept Elect Engn, Touliu 640301, Yunlin, Taiwan
[4] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
[5] SRM Inst Sci & Technol, Dept Data Sci & Business Syst, Kattankulathur 603203, Tamil Nadu, India
关键词
MANETs; clustering; cluster leader; security; trust; residual energy level; mobility; ANFIS; fuzzy logic; ALGORITHM; LOGIC; SYSTEM;
D O I
10.3390/electronics12020274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A MANET consists of a group of mobile nodes. In a MANET, scalability and mobility have a greater influence on routing performance. The clustering technique plays a vital role in enhancing the routing mechanism and improving the network lifetime of a large-scale network like a MANET. The clustering process will degrade network performance if the malicious node is chosen as the Cluster Leader (CL). Thus, the secure clustering process in a MANET is a very challenging task. To overcome this problem, the following key factors like Trust Value (TV), Residual Energy Level (REL), and Mobility (M) of the node are used as decision-making parameters to elect a Cluster Leader (CL). In this work, we have proposed a soft computing-based neuro-fuzzy model, ANFIS-based Energy-Efficient Secure Clustering Model (ANFIS-EESC), with a primary objective of forming energy-aware stable trust-based clustering in a MANET. Moreover, we have proposed two working novel algorithms: Weight-Based Trust Estimation (WBTE) algorithm and the Fuzzy-Based Clustering (FBC) algorithm. The primary objective of the WBTE algorithm is to measure the trustworthiness of the nodes and to mitigate the malicious nodes. Fuzzy-Based Clustering (FBC) algorithm is a fuzzy logic-based cluster formation algorithm. In our proposed work, each non-CL in the system applies the cluster density of CL and mobility for each CL node using the Mamdani Fuzzy Inference system, and makes the decision to join as a member with a CL that holds maximum value. Simulation results show that the proposed work enhances the network performance by electing a more stable trust-aware and energy-aware node as Cluster leader (CL). We compare the performance parameters of the proposed work, such as packet delivery rate, energy consumption, detection rate, and reaffiliation, with the existing work, Weighted Clustering Algorithm (WCA). The network lifetime is 39% greater in the proposed ANFIS-EESC model than in the other existing work, WCA. Moreover, ANFIS-EESC shows an enhancement of 22% to 32% in packet delivery ratio and 32% and 39% in throughput. From the above analysis, it has been proved that the proposed work gives a better performance in terms of reliability and stability when compared to the existing work, WCA.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Weighted Clustering Trust Model for Mobile Ad Hoc Networks
    Ashwin, M.
    Kamalraj, S.
    Azath, Mubarakali
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2203 - 2212
  • [32] Weighted Clustering Trust Model for Mobile Ad Hoc Networks
    M. Ashwin
    S. Kamalraj
    Mubarakali Azath
    Wireless Personal Communications, 2017, 94 : 2203 - 2212
  • [33] Energy-Efficient Secure Adaptive Neuro Fuzzy Based Clustering Technique for Mobile Adhoc Networks
    Srinivas, Maganti
    Patnaik, M. Ramesh
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1755 - 1768
  • [34] Trust-based routing for ad-hoc wireless networks
    Pirzada, AA
    Datta, A
    McDonald, C
    2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 326 - 330
  • [35] TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network
    Sirajuddin, Mohammad
    Rupa, Ch.
    Iwendi, Celestine
    Biamba, Cresantus
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [36] A trust enhanced secure clustering framework for wireless ad hoc networks
    Pushpita Chatterjee
    Uttam Ghosh
    Indranil Sengupta
    Soumya K. Ghosh
    Wireless Networks, 2014, 20 : 1669 - 1684
  • [37] A trust enhanced secure clustering framework for wireless ad hoc networks
    Chatterjee, Pushpita
    Ghosh, Uttam
    Sengupta, Indranil
    Ghosh, Soumya K.
    WIRELESS NETWORKS, 2014, 20 (07) : 1669 - 1684
  • [38] Trust-based security for wireless ad hoc and sensor networks
    Boukerch, A.
    Xu, L.
    El-Khatib, K.
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427
  • [39] An Efficient Trust-Based Opportunistic Routing for Ad Hoc Networks
    Wang, Bo
    Chen, Xunxun
    Chang, Weiling
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2012), 2012,
  • [40] Research of trust model based on fuzzy theory in mobile ad hoc networks
    Xia, Hui
    Jia, Zhiping
    Sha, Edwin H-M.
    IET INFORMATION SECURITY, 2014, 8 (02) : 88 - 103