An entirely new and trendy peer-to-peer modern communications graph is called a Mobile Ad-hoc Network (MANET). The MANETs form their network without any infrastructure facilities, whenever needed. Military activities frequently need the quick and secure transfer of large quantities of data. The radio spectrum has been used by the military up until now for good communication but might have a chance to impact security problems. The security of data transfer is a major issue given the natural component of wireless networks in real-time situations. The main challenge is confirming trust across MANET nodes, as well as dealing with bandwidth, energy, and changing topology. By degrading the trust level between nodes, the malicious attitude increases poor data transmission, increases energy use, and reduces the duration of the network. To address this issue, we proposed a new protocol, Trust-based Secure and Reliable Routing Protocol (TSRRP), to increase the trust between nodes in MANETs and predict anomalous activity. This is done with the help of certain Quality of Service (QoS) metrics, such as the result analysis phase. NS2 is used to simulate the result. The simulation outcomes demonstrate how the suggested protocol performs better than the existing protocols.
Keywords
MANETs, Security, TSRRP, Military Communication, QoS Metrics.
M.S.Usha, K.C.Ravishankar. Implementation of trust-based novel approach for security enhancements in MANETs. SN Computer Science (2021)2:257.
G.M.Levchuk, F.Yu, K.R. Pattipati and Y.Levchk, “From hierarchies to heterarchies: Application of network optimization to design of organizational structures”, in proc. Command control Res.Technol.Symp.,Washington,DC,USA,Jun.2003,pp. 1-11.
C.Park, K.R. Pattipati, W. An, and D.L.Kleinman, “Quantifying the impact of information and organizational structures via distributed aunction algorithm: point-to-point communication structure,”IEEE Trans.Syst., man,cybern.A.Syst.Humans, vol.42, no.1, pp.68-86,vjanv2012.
T.Maseng and C. Nissen, “Network centric military communication”, IEEE Commun, Mag., vol. 44, no. 11,p.36, nov. 2006.
Dhananjayan G.Subbiah J. T2AR: trust-aware ad-hoc routing protocol for MANET. Springerplus. 2016; 5:1-16.
Jayamkumari A, Sakthivel M. Trust management model observation towards security enhancements and QoS in MANET’s. Int J Innov Res Comput Commun Eng.2015; 3:1994-7.
Sharma N,Popli R. A literary review of MANET security. Int J Adv Res Ideas Innov Technol. 2019;5(2):1237-9.
Renu and Sharma S, Energy Efficient secure routing framework based on multidimentional trust evaluation for MANET. J Netw Inform Secur.2019;7(1):20-4.
Raju RL, Reddy CRK. Security Improvisation through node trust prediction approach in mobile Ad Hoc network. Int J Interact Mob Technol. 2019; 13(9):40-51.
Anjum SS. Noor RM, Anisi MH. Review on MANET based communication for search and rescue operations.Wirel Pers Commun.2015;94:31-52.
Batham G, Sejwar V.Implementation of Dempster-shafer theory for trust based communication in MANET. Int J Comput Appl.2016;150(11):27-32.
Sahadevaiah K, Prasad Reddy PVGD, Narasimha G. A new security protocol for mobile. Ad Hoc Netw. 2012;3:9-15.
Desai AM, Jhaveri RH.secure routing in mobile ad Hoc Networks: a predictive approach. Int J Inf Technol.2018;11:345-56.
Saadoune M,Hajami A and Allali H. Distance quantification algorithm in AODV protocol, Networking and Internet Architecture, Cornell University, 1-12(2014).
Yadav P and Gaur M. A survey on formal modelling for secure routing in mobile Ad Hoc networks. In: International conference on distributed computing and internet Technology. 2015: 18-23.
Dangare N.N and Mangrulkar RS.Design and development of trust based approach to mitigate various attacks in mobile Ad hoc network. In: international conference on quality up-gradation in Engineering, science and technology (ICQUEST2015).2015;27-32.
Geetha D and Revathi B.AOMDV routing based enhanced security for black hole attack in MANETs. In: International Conference on Research Trends in Computer technologies (ICRTCT-2013).2013; 20-24.
Bruzgiene R,Narbutaite L, Adomkus T.Manet network in internet of things system, peer-reviewed chapter. Ad-hoc networks, INTECH Open Sci.2017.http://doi.org/10.5772/66408.
Kothandaraman D, Chellappan C.Energy efficient node rank based routing algorithm in mobile ad-hoc networks.Int J Comp Netw Commu.2019; 11(1):45-61.
Swetha MS, Thangamani M. A novel approach to secure mysterious location-based routing for MANET. Int J Innov Technol Explor Eng. 2019; 8(7): 2587-91.
Mangrulkar RS.Chavan PV,Dagadkar SN. Improving route selection mechanism using trust factor in AODV protocol for MANET. Int J Comput Appl.2010; 7(10):36-9.
Kaur J,Singh T. A secured data transmission method using enhanced secret sharing scheme to prevent black hole attack in MENETs-a review. Int J Comput Appl.2015; 119 (10):20-8.
Liu W,Yu M.AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans Veh Technol.2014; 63(9).
Suma CC,Gururaj HL, Ramesh M. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks. Computat Methods Soc Sci. 2016; 4(2): 5-11.
Deafawy KE, Tsudik G. Privacy preserving location-based on-demand routing in MANETs. IEEE J select Areas Commun 2011; 29(10): 1926-1934.
Acknowledgements
Authors thank Reviewers for taking the time and effort necessary to review the manuscript.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
No data available for above study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Uma Maheswari Arumugam, Suganthi Perumal, “Trust based Secure and Reliable Routing Protocol of Military Communication on MANETs”, Journal of Machine and Computing, pp. 047-057, January 2023. doi: 10.53759/7669/jmc202303006.