Secure and efficient trust enabled routing in mobile ad hoc network using game theory and grey wolf optimisation techniques

IF 1.5 Q3 TELECOMMUNICATIONS
Ujwala Ravale, Gautam M. Borkar
{"title":"Secure and efficient trust enabled routing in mobile ad hoc network using game theory and grey wolf optimisation techniques","authors":"Ujwala Ravale,&nbsp;Gautam M. Borkar","doi":"10.1049/wss2.12095","DOIUrl":null,"url":null,"abstract":"<p>Mobile Ad hoc Networks (MANETs) are crucial wireless networks for military, corporate, and emergency use, yet they are vulnerable to disruptions from malicious nodes. The presence of malicious nodes can lead to message transmission and routing disorganisation, and network performance is effectively compromised. Game theory-based fuzzy secure clustering (GTFSC) improves performance metrics in low-scale and high-scale networks. This protocol's novel ability to dynamically scale performance measures as nodes expand improves efficiency and adaptability. While improving performance metrics, the proposed algorithm also efficiently identifies malicious nodes and re-routes the transmission, excluding the found malicious nodes. For any MANET system, secure and successful data transmission is paramount. The proposed protocol integrates various algorithms to fulfil its aim of customised EGT, GWO, and fuzzy clustering. Black hole attacks, grey hole attacks, Sybil attacks, and data tampering attacks are all considered to provide comprehensive attacks on MANET. Every node is assigned trust values, which get updated on data transmission. Fuzzy Clustering is employed to identify malicious nodes. Evolutionary Game Theory (EGT) optimises network organisation by designating cluster heads and clusters as nodes. Additionally, the proposed protocol leverages the Grey Wolf Optimisation Routing Algorithm (GWO), which establishes efficient routes from the source to the sink node. The analysis result shows maximum performance with a packet delivery ratio of around 98%, throughput of 90% end-to-end delay reduced by 15%, and energy consumption reduced by 18%, respectively, compared to an existing protocol.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"14 6","pages":"451-476"},"PeriodicalIF":1.5000,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12095","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Wireless Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/wss2.12095","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Mobile Ad hoc Networks (MANETs) are crucial wireless networks for military, corporate, and emergency use, yet they are vulnerable to disruptions from malicious nodes. The presence of malicious nodes can lead to message transmission and routing disorganisation, and network performance is effectively compromised. Game theory-based fuzzy secure clustering (GTFSC) improves performance metrics in low-scale and high-scale networks. This protocol's novel ability to dynamically scale performance measures as nodes expand improves efficiency and adaptability. While improving performance metrics, the proposed algorithm also efficiently identifies malicious nodes and re-routes the transmission, excluding the found malicious nodes. For any MANET system, secure and successful data transmission is paramount. The proposed protocol integrates various algorithms to fulfil its aim of customised EGT, GWO, and fuzzy clustering. Black hole attacks, grey hole attacks, Sybil attacks, and data tampering attacks are all considered to provide comprehensive attacks on MANET. Every node is assigned trust values, which get updated on data transmission. Fuzzy Clustering is employed to identify malicious nodes. Evolutionary Game Theory (EGT) optimises network organisation by designating cluster heads and clusters as nodes. Additionally, the proposed protocol leverages the Grey Wolf Optimisation Routing Algorithm (GWO), which establishes efficient routes from the source to the sink node. The analysis result shows maximum performance with a packet delivery ratio of around 98%, throughput of 90% end-to-end delay reduced by 15%, and energy consumption reduced by 18%, respectively, compared to an existing protocol.

Abstract Image

求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Wireless Sensor Systems
IET Wireless Sensor Systems TELECOMMUNICATIONS-
CiteScore
4.90
自引率
5.30%
发文量
13
审稿时长
33 weeks
期刊介绍: IET Wireless Sensor Systems is aimed at the growing field of wireless sensor networks and distributed systems, which has been expanding rapidly in recent years and is evolving into a multi-billion dollar industry. The Journal has been launched to give a platform to researchers and academics in the field and is intended to cover the research, engineering, technological developments, innovative deployment of distributed sensor and actuator systems. Topics covered include, but are not limited to theoretical developments of: Innovative Architectures for Smart Sensors;Nano Sensors and Actuators Unstructured Networking; Cooperative and Clustering Distributed Sensors; Data Fusion for Distributed Sensors; Distributed Intelligence in Distributed Sensors; Energy Harvesting for and Lifetime of Smart Sensors and Actuators; Cross-Layer Design and Layer Optimisation in Distributed Sensors; Security, Trust and Dependability of Distributed Sensors. The Journal also covers; Innovative Services and Applications for: Monitoring: Health, Traffic, Weather and Toxins; Surveillance: Target Tracking and Localization; Observation: Global Resources and Geological Activities (Earth, Forest, Mines, Underwater); Industrial Applications of Distributed Sensors in Green and Agile Manufacturing; Sensor and RFID Applications of the Internet-of-Things ("IoT"); Smart Metering; Machine-to-Machine Communications.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信