Blockchain-Based Secure Routing Protocol for Mobile Ad Hoc Networks over Dynamic Wireless Channels
DOI:
https://doi.org/10.31838/NJAP/08.01.02Keywords:
Blockchain, MANET, Secure Routing, Wireless Channels, Smart Contracts, Trust Management, Blackhole Attack, Sybil AttackAbstract
MANETs are ad-hoc networks in which there are no fixed nodes or a structure and they are highly mobile, have changing topologies, and open communication environment through wireless media thus prompting them to be susceptible to a wide range of security attacks which include but are not limited to black hole, Sybil and route tampering. Conventional routing such as AODV and DSR do not provide the mechanisms required to provide robust trust, integrity and security within such volatile networks. The paper suggests a new Blockchain-Based Secure Routing Protocol (BSRP) which is specifically designed to support MANETs to operate on dynamic wireless channels. BSRP combines the simplicity of a lightweight blockchain architecture in the routing stack that supports tamper-proof route information logging, decentralized trust and robust authentication of nodes. The consensus mechanism Proof-of-Authentication (PoA) guarantees that the potential overhead is kept to the minimum and the nodes can verify transactions and information on the routing services without involving the centralized sources. Smart contracts are implemented to automate the most important security activities including neighbor trust checks, rout verification and detection of malicious patterns based on history. Routes are discovered, acked and node reputations are kept within a local blockchain ledger at each node and routing is made transparency and secure. There are extensive simulations over the NS-3 protocol in a realistic wireless channel configuration in terms of Rayleigh fading and mobility models. Important performance indicators like packet delivery ratio, end-to-end delay, control overhead and attack resistance are discussed and their values compared with traditional routing protocols. Findings show that BSRP outsmarts baseline protocols in the area of data delivery assuredness and countering attacks by significant margins (up to 35 percent and well resistant to blackhole and Sybil attacks). The results verify that the use of blockchain integration is scalable and secure because it could be used to support routing in MANETs, especially on mission-critical and adversarial networks. This paper defines BSRP as effective and feasible security enhanced routing framework, which provides the basis of decentralized trust-type approaches in future mobile wireless networks.
References
1. Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, 90–100.
2. Zhang, Y., Chen, L., & Xu, G. (2019). Blockchain-based secure routing protocol for wireless sensor networks.
Sensors, 19(7), 1706. https://doi.org/10.3390/s19071706
3. Liu, Y., Ning, P., & Dai, H. (2005). Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures. Proceedings of the IEEE Symposium on Security and Privacy, 286–301.
https://doi.org/10.1109/SP.2005.20
4. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, 255–265. https://doi.org/10.1145/345910.345955
5. Peng, G., Leung, N., & Lechowicz, R. (2025). Applications of artificial intelligence for telecom signal processing. Innovative Reviews in Engineering and Science, 3(1), 26–31. https://doi.org/10.31838/INES/03.01.04
6. Sikarwar, T. S., Chauhan, A. S., Jain, N., & Mathur, H. (2025). Application of predictive analytics in IOT data processing. Indian Journal of Information Sources and Services, 15(2), 340–348. https://doi.org/10.51983/ijiss2025.IJISS.15.2.42
7. Rahim, R. (2024). Optimizing reconfigurable architectures for enhanced performance in computing. SCCTS Transactions on Reconfigurable Computing, 1(1), 11–15. https://doi.org/10.31838/RCC/01.01.03
8. Singh, M., & Kim, S. (2018). Blockchain-based intelligent IoT architecture with edge computing. IEEE Communications Magazine, 56(9), 52–57. https://doi.org/10.1109/MCOM.2018.1700660
9. Ibrahim, M. S., & Shanmugaraja, P. (2023). Mobility based routing protocol performance oriented comparative analysis in the ADHOC networks FANET, MANET and VANET using OPNET modeler for FTP and web applications. International Academic Journal of Innovative Research, 10(1),14–24.https://doi.org/10.9756/IAJIR/V10I1/IAJIR1003
10. Min, A. K., Thandar, N. H., & Htun, Z. T. (2025). Smart sensors embedded systems for environmental monitoring system integration. Journal of Integrated VLSI, Embedded and Computing Technologies, 2(3), 1–11. https://doi.org/10.31838/JIVCT/02.03.01
11. Pragadeswaran, S., Vasanthi, M., Boopathy, E. V., Suthakaran, S., Madhumitha, S., Ragupathi, N., Nikesh, R., & Devi, R. P. (2024). Optimizing VLSI architecture with carry look ahead technology based high-speed, inexact speculative adder. Archives for Technical Sciences, 2(31), 220–229. https://doi.org/10.70102/afts.2024.1631.220
12. Rahim, R. (2023). Effective 60 GHz signal propagation in complex indoor settings. National Journal of RF Engineering and Wireless Communication, 1(1), 23–29. https://doi.org/10.31838/RFMW/01.01.03
13. Balakrishnan, R., Khadouri, S. S. S. A., Arokiasamy, A. R. A., Louis S. A., & Raman, A. (2024). A machine learning-based
secured and energy-efficient data transmission in mobile Ad-Hoc networks (MANET). Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 15(3), 253–261. https://doi.org/10.58346/JOWUA.2024.I3.017
14. Asif, M., Barnaba, M., Rajendra Babu, K., Om Prakash, P., & KHamuruddeen, S. K. (2021). Detection and tracking of theft vehicle. International Journal of Communication and Computer Technologies, 9(2), 6–11.
15. Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2009). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. IEEE INFOCOM 2008, 1229–1237. https://doi.org/10.1109/INFOCOM.2008.195
16. Jouyandeh, N., & EbrahimiAtani, R. (2018). A Review of data aggregation protocols in VANET and providing proposed protocol. International Academic Journal of Science and Engineering, 5(1), 134–144. https://doi.org/10.9756/IAJSE/V5I1/1810012
17. Megha, N., Shetty, P., Kudtarkar, R. R., Naik, S. U., & Abhilash, A. L. (2024). Design and VLSI implementation of SAR analog to digital converter using analog mixed signal. Journal of VLSI Circuits and Systems, 6(1), 55–60. https://doi.org/10.31838/jvcs/06.01.09
18. Gomez, A., Fallah, M. H., Kulmuradov, D., Sapaev, I. B., Khodjaev, N., & Udayakumar, R. (2025). Resource aware traffic shaping in high speed vehicular networks. Journal of Internet Services and Information Security, 15(2), 65–74. https://doi.org/10.58346/JISIS.2025.I2.005




