Open Access
Open access
IET Wireless Sensor Systems, volume 14, issue 6, pages 451-476

Secure and efficient trust enabled routing in mobile ad hoc network using game theory and grey wolf optimisation techniques

Ujwala Ravale 1, 2
Gautam M. Borkar 3
1
 
Department of Computer Engineering Ramrao Adik Institute of Technology DY Patil Deemed to be University Navi Mumbai Maharashtra India
2
 
SIES Graduate School of Technology Navi Mumbai Maharashtra India
3
 
Department of Information Technology Ramrao Adik Institute of Technology DY Patil Deemed to be University Navi Mumbai Maharashtra India
Publication typeJournal Article
Publication date2024-10-07
scimago Q2
wos Q3
SJR0.404
CiteScore4.9
Impact factor1.5
ISSN20436386, 20436394
Abstract

Mobile Ad hoc Networks (MANETs) are crucial wireless networks for military, corporate, and emergency use, yet they are vulnerable to disruptions from malicious nodes. The presence of malicious nodes can lead to message transmission and routing disorganisation, and network performance is effectively compromised. Game theory‐based fuzzy secure clustering (GTFSC) improves performance metrics in low‐scale and high‐scale networks. This protocol's novel ability to dynamically scale performance measures as nodes expand improves efficiency and adaptability. While improving performance metrics, the proposed algorithm also efficiently identifies malicious nodes and re‐routes the transmission, excluding the found malicious nodes. For any MANET system, secure and successful data transmission is paramount. The proposed protocol integrates various algorithms to fulfil its aim of customised EGT, GWO, and fuzzy clustering. Black hole attacks, grey hole attacks, Sybil attacks, and data tampering attacks are all considered to provide comprehensive attacks on MANET. Every node is assigned trust values, which get updated on data transmission. Fuzzy Clustering is employed to identify malicious nodes. Evolutionary Game Theory (EGT) optimises network organisation by designating cluster heads and clusters as nodes. Additionally, the proposed protocol leverages the Grey Wolf Optimisation Routing Algorithm (GWO), which establishes efficient routes from the source to the sink node. The analysis result shows maximum performance with a packet delivery ratio of around 98%, throughput of 90% end‐to‐end delay reduced by 15%, and energy consumption reduced by 18%, respectively, compared to an existing protocol.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
Share
Cite this
GOST | RIS | BibTex | MLA
Found error?