Secure and efficient trust enabled routing in mobile ad hoc network using game theory and grey wolf optimisation techniques

IF 1.5 Q3 TELECOMMUNICATIONS
Ujwala Ravale, Gautam M. Borkar
{"title":"Secure and efficient trust enabled routing in mobile ad hoc network using game theory and grey wolf optimisation techniques","authors":"Ujwala Ravale,&nbsp;Gautam M. Borkar","doi":"10.1049/wss2.12095","DOIUrl":null,"url":null,"abstract":"<p>Mobile Ad hoc Networks (MANETs) are crucial wireless networks for military, corporate, and emergency use, yet they are vulnerable to disruptions from malicious nodes. The presence of malicious nodes can lead to message transmission and routing disorganisation, and network performance is effectively compromised. Game theory-based fuzzy secure clustering (GTFSC) improves performance metrics in low-scale and high-scale networks. This protocol's novel ability to dynamically scale performance measures as nodes expand improves efficiency and adaptability. While improving performance metrics, the proposed algorithm also efficiently identifies malicious nodes and re-routes the transmission, excluding the found malicious nodes. For any MANET system, secure and successful data transmission is paramount. The proposed protocol integrates various algorithms to fulfil its aim of customised EGT, GWO, and fuzzy clustering. Black hole attacks, grey hole attacks, Sybil attacks, and data tampering attacks are all considered to provide comprehensive attacks on MANET. Every node is assigned trust values, which get updated on data transmission. Fuzzy Clustering is employed to identify malicious nodes. Evolutionary Game Theory (EGT) optimises network organisation by designating cluster heads and clusters as nodes. Additionally, the proposed protocol leverages the Grey Wolf Optimisation Routing Algorithm (GWO), which establishes efficient routes from the source to the sink node. The analysis result shows maximum performance with a packet delivery ratio of around 98%, throughput of 90% end-to-end delay reduced by 15%, and energy consumption reduced by 18%, respectively, compared to an existing protocol.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":"14 6","pages":"451-476"},"PeriodicalIF":1.5000,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12095","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Wireless Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/wss2.12095","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Mobile Ad hoc Networks (MANETs) are crucial wireless networks for military, corporate, and emergency use, yet they are vulnerable to disruptions from malicious nodes. The presence of malicious nodes can lead to message transmission and routing disorganisation, and network performance is effectively compromised. Game theory-based fuzzy secure clustering (GTFSC) improves performance metrics in low-scale and high-scale networks. This protocol's novel ability to dynamically scale performance measures as nodes expand improves efficiency and adaptability. While improving performance metrics, the proposed algorithm also efficiently identifies malicious nodes and re-routes the transmission, excluding the found malicious nodes. For any MANET system, secure and successful data transmission is paramount. The proposed protocol integrates various algorithms to fulfil its aim of customised EGT, GWO, and fuzzy clustering. Black hole attacks, grey hole attacks, Sybil attacks, and data tampering attacks are all considered to provide comprehensive attacks on MANET. Every node is assigned trust values, which get updated on data transmission. Fuzzy Clustering is employed to identify malicious nodes. Evolutionary Game Theory (EGT) optimises network organisation by designating cluster heads and clusters as nodes. Additionally, the proposed protocol leverages the Grey Wolf Optimisation Routing Algorithm (GWO), which establishes efficient routes from the source to the sink node. The analysis result shows maximum performance with a packet delivery ratio of around 98%, throughput of 90% end-to-end delay reduced by 15%, and energy consumption reduced by 18%, respectively, compared to an existing protocol.

Abstract Image

利用博弈论和灰狼优化技术在移动自组织网络中实现安全高效的信任路由
移动自组织网络(manet)是军事、企业和应急使用的关键无线网络,但它们很容易受到恶意节点的破坏。恶意节点的存在会导致消息传输和路由混乱,从而严重影响网络性能。基于博弈论的模糊安全聚类(GTFSC)提高了小规模和大规模网络的性能指标。该协议在节点扩展时动态扩展性能度量的新能力提高了效率和适应性。在提高性能指标的同时,该算法还可以有效地识别恶意节点并重新路由传输,排除发现的恶意节点。对于任何MANET系统,安全和成功的数据传输是至关重要的。该协议集成了多种算法,实现了自定义EGT、GWO和模糊聚类的目标。黑洞攻击、灰洞攻击、Sybil攻击和数据篡改攻击都被认为是对MANET的综合攻击。为每个节点分配信任值,并在数据传输时更新信任值。采用模糊聚类方法识别恶意节点。进化博弈论(EGT)通过指定簇头和簇作为节点来优化网络组织。此外,该协议还利用了灰狼优化路由算法(GWO),该算法建立了从源节点到汇聚节点的有效路由。分析结果表明,与现有协议相比,该协议的最大性能约为98%,吞吐量为90%,端到端延迟降低15%,能耗降低18%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Wireless Sensor Systems
IET Wireless Sensor Systems TELECOMMUNICATIONS-
CiteScore
4.90
自引率
5.30%
发文量
13
审稿时长
33 weeks
期刊介绍: IET Wireless Sensor Systems is aimed at the growing field of wireless sensor networks and distributed systems, which has been expanding rapidly in recent years and is evolving into a multi-billion dollar industry. The Journal has been launched to give a platform to researchers and academics in the field and is intended to cover the research, engineering, technological developments, innovative deployment of distributed sensor and actuator systems. Topics covered include, but are not limited to theoretical developments of: Innovative Architectures for Smart Sensors;Nano Sensors and Actuators Unstructured Networking; Cooperative and Clustering Distributed Sensors; Data Fusion for Distributed Sensors; Distributed Intelligence in Distributed Sensors; Energy Harvesting for and Lifetime of Smart Sensors and Actuators; Cross-Layer Design and Layer Optimisation in Distributed Sensors; Security, Trust and Dependability of Distributed Sensors. The Journal also covers; Innovative Services and Applications for: Monitoring: Health, Traffic, Weather and Toxins; Surveillance: Target Tracking and Localization; Observation: Global Resources and Geological Activities (Earth, Forest, Mines, Underwater); Industrial Applications of Distributed Sensors in Green and Agile Manufacturing; Sensor and RFID Applications of the Internet-of-Things ("IoT"); Smart Metering; Machine-to-Machine Communications.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信