Improving Secure Routing Performance Using Reputation Based On Weighted Hub Selection Model in Manet

Authors

  • Dhanabal S Professor/ CSE, Kalaignar Karunanidhi Institute Of Technology, Pappampatti Rd, Pallapalayam, Kannampalayam, Tamil Nadu 641402
  • Kirti H. Wanjale Professor, Dept. of Computer Engineering, Vishwakarma Institute of Technology, Pune
  • Geetha.S Assistant professor , St Francis college Koramangala Bangalore-34
  • Drishya Darwin Assistant Professor of Information Technology, Dr.M.G.R.Educational and Research Institute, Chennai, Tamilnadu.
  • A.Raja Assistant professor of Computer Science and Engineering (Cyber Security), United Institute of Technology, Coimbatore,Tamilnadu, India
  • R.Rajesh Assistant Professor, Department of Computer Science and Engineering, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Avadi, Chennai.

DOI:

https://doi.org/10.31838/NJAP/08.02.06

Keywords:

Abnormal node identification, CA-free key exchange, reputation-based weighted hub selection, and aggressive forward infinite dimensional entangled pair state.

Abstract

There are several security concerns with mobile ad hoc networks (MANETs). A MANET should ideally not have all of its nodes work together to forward packets. Malicious intent is not the cause of this. MANETs must constantly rely on wireless connectivity and have restricted capabilities. They consist of MANETs and mobile radio transmission nodes, which may be set up anywhere. Because it lessens the strain on centralized access and infrastructure, every element of an ad-hoc network is therefore effective. MANETs are extensively utilized in many different areas, including crisis response, mobile telephony, and military applications. In this article, we first present Aggressive Forward Infinite Dimensional Entangled Pair State (AFIDEPS), which initiates a pair state by assigning a key to a server and forwarding the key to its nodes. When mapping keys to hubs, the value can be instantly mapped to the key through the use of scope management and standard naming conventions. Second, one method for route selection—the process of figuring out the optimal way from a source to a destination in a network—is Reputation-Based Weighted Hub Selection (RWHS). Any protocol's performance is greatly influenced by its parameter settings. The nodes that allow packets to be sent from the source to the destination are chosen by the route selection procedure. Data transport integrity is improved when nodes exchange keys without the use of CAs. DSN inspections of nodes that produce excessive network traffic during data transmission are used to identify aberrant nodes in order to increase routing efficiency. In order to maintain constant network performance even in the presence of malicious nodes, this research proposes a technique that guarantees not only secure data transmission but also node trust evaluation and path creation between nodes. Comparative testing on packet delivery ratio, end-to-end delay time, number of control packets, network performance, and average path length verified the efficacy of the suggested trust-based model security routing technology.

References

1. Reehanaparveen, M., and C. Sunitha. "Research Into And Assessment Of Clustering-Based Routing Techniques For Manets." International Journal of Advanced Research in Computer Science 15, no. 5 (2024).

2. Anbarasan, M., S. Prakash, M. Anand, and Arokiasamy Antonidoss. "Improving performance in mobile ad hoc networks by reliable path selection routing using RPS-LEACH." Concurr Comput Pract Exper 31, no. 7 (2019): e4984.

3. Devarayasamudram, Venkatesh, Rakesh Chandrashekar, Chandra Mohan Chetla, Kumar Raja Depa Ramachandraiah, Purushotham Nimmala, and Singaravelan Arumugam. "An Energy-Aware Cluster Head Selection and Optimal Route Selection Algorithm for Maximizing Network Lifetime in MANETs." Mathematical Modelling of Engineering Problems 11, no. 3 (2024).

4. Suresh Kumar, R., P. Manimegalai, P. T. Vasanth Raj, R. Dhanagopal, and A. Johnson Santhosh. "Cluster Head Selection and Energy Efficient Multicast Routing Protocol‐Based Optimal Route Selection for Mobile Ad Hoc Networks." Wireless Communications and Mobile Computing 2022, no. 1 (2022): 5318136.

5. Sankaran, K. Sakthidasan, and Seng-Phil Hong. "Trust Aware Secured Data Transmission Based Routing Strategy Using Optimal Ch Selection in Mobile Ad-Hoc Network." Mobile Networks and Applications 29, no. 2 (2024): 385-397.

6. Muneeswari, B., and M. S. K. Manikandan. "Energy efficient clustering and secure routing using reinforcement learning for three‐dimensional mobile ad hoc networks." IET Communications 13, no. 12 (2019): 1828-1839.

7. Trivedi, Rajvi, and Pimal Khanpara. "Robust and secure routing protocols for MANET-based internet of things systems—A survey." In Emergence of Cyber Physical System and IoT in Smart Automation and Robotics: Computer Engineering in Automation, pp. 175-188. Cham: Springer International Publishing, 2021.

8. Rajashanthi, Mariappan, and Krishnasamy Valarmathi. "A secure trusted multipath routing and optimal fuzzy logic for enhancing QoS in MANETs." Wireless Personal Communications 112, no. 1 (2020): 75-90.

9. Muruganandam, S., and J. Arokia Renjit. "A node quality based cluster header selection algorithm for improving security in MANET." In Emerging Research in Computing, Information, Communication and Applications: ERCICA 2020, Volume 1, pp. 119-134. Springer Singapore, 2022.

10. Sankaran, K. Sakthidasan, Natarajan Vasudevan, K. R. Devabalaji, Thanikanti Sudhakar Babu, Hassan Haes Alhelou, and T. Yuvaraj. "A recurrent reward based learning technique for secure neighbor selection in mobile AD-HOC networks." IEEE Access 9 (2021): 21735-21745.

11. Suresh Kumar, R., P. Manimegalai, P. T. Vasanth Raj, R. Dhanagopal, and A. Johnson Santhosh. "Cluster Head Selection and Energy Efficient Multicast Routing Protocol‐Based Optimal Route Selection for Mobile Ad Hoc Networks." Wireless Communications and Mobile Computing 2022, no. 1 (2022): 5318136.

12. Sankaran, K. Sakthidasan, and Seng-Phil Hong. "Trust Aware Secured Data Transmission Based Routing Strategy Using Optimal Ch Selection in Mobile Ad-Hoc Network." Mobile Networks and Applications 29, no. 2 (2024): 385-397.

13. Devarayasamudram, Venkatesh, Rakesh Chandrashekar, Chandra Mohan Chetla, Kumar Raja Depa Ramachandraiah, Purushotham Nimmala, and Singaravelan Arumugam. "An Energy-Aware Cluster Head Selection and Optimal Route Selection Algorithm for Maximizing Network Lifetime in MANETs." Mathematical Modelling of Engineering Problems 11, no. 3 (2024).

14. Kalime, Srinivas, and K. Sagar. "A review: secure routing protocols for mobile adhoc networks (MANETs)." Journal of Critical Reviews 7, no. 19 (2021): 8385-8393.

15. Rashid, Sami Abduljabbar, Lukman Audah, Mustafa Maad Hamdi, and Sameer Alani. "Prediction based efficient multi-hop clustering approach with adaptive relay node selection for VANET." J. Commun. 15, no. 4 (2020): 332-344.

16. Ravale, Ujwala, and Gautam M. Borkar. "Secure and efficient trust enabled routing in mobile ad hoc network using game theory and grey wolf optimisation techniques." IET Wireless Sensor Systems 14, no. 6 (2024): 451-476.

17. Gunasekaran, K., G. Suresh, V. Kavitha, and S. Lekashri. "Resourceful and reliable routing selection scheme in MANET." In 2020 7th International Conference on Smart Structures and Systems (ICSSS), pp. 1-5. IEEE, 2020.

18. Chintalapalli, Ram Mohan, and Venugopal Reddy Ananthula. "M‐LionWhale: multi‐objective optimisation model for secure routing in mobile ad‐hoc network." IET Communications 12, no. 12 (2018): 1406-1415.

19. Kumar, C. Satya, N. Sambasiva Rao, and G. Venkata Rami Reddy. "A study on routing metrics to improve the quality of service in MANET environment." In MATEC Web of Conferences, vol. 392, p. 01162. EDP Sciences, 2024.

20. Sankaran, K. Sakthidasan, Natarajan Vasudevan, K. R. Devabalaji, Thanikanti Sudhakar Babu, Hassan Haes Alhelou, and T. Yuvaraj. "A recurrent reward-based learning technique for secure neighbor selection in mobile AD-HOC networks." IEEE Access 9 (2021): 21735-21745.

21. Darraji, Eqbal. "Secure opportunistic routing protocol based on reputation systems in VANETs." PhD diss., Loughborough University, 2021.

22. Kumar, Manish, Rahul Bhandari, Ajay Rupani, and Jakir Hussain Ansari. "Trust-based performance evaluation of routing protocol design with security and QoS over MANET." In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 139-142. IEEE, 2018.

23. Kumar, Manish, Rahul Bhandari, Ajay Rupani, and Jakir Hussain Ansari. "Trust-based performance evaluation of routing protocol design with security and QoS over MANET." In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 139-142. IEEE, 2018.

24. Darraji, Eqbal. "Secure opportunistic routing protocol based on reputation systems in VANETs." PhD diss., Loughborough University, 2021.

25. YM, Mahaboob John. "Retracted: Multi constrained network feature approximation based secure routing for improved quality of service in mobile ad‐hoc network." Computational Intelligence 40, no. 1 (2024): e12489.

26. Ilakkiya, N., and A. Rajaram. "A novel DAG-blockchain structure for trusted routing in secure MANET-IoT environment." Journal of Intelligent & Fuzzy Systems Preprint (2024): 1-20.

27. Kaur, Manpreet, Sarabjit Kaur, and Anshu Sharma. "AN OPTIMISED WEIGHT BASED CLUSTERING ROUTING PROTOCOL SCHEME IN MANETS FOR IMPROVED QOS." International Journal of Engineering Applied Sciences and Technology 1, no. 1 (2016).

28. Kalimuthu, Vinoth Kumar, and Gopinath Samydurai. "Fuzzy logic based DSR trust estimation routing protocol for MANET using evolutionary algorithms." Tehnički vjesnik 28, no. 6 (2021): 2006-2014.

29. Lenka, Rakesh Kumar, Manjur Kolhar, Hitesh Mohapatra, Fadi Al-Turjman, and Chadi Altrjman. "Cluster-based routing protocol with static hub (CRPSH) for WSN-assisted IoT networks." Sustainability 14, no. 12 (2022): 7304.

30. Rashid, Sami Abduljabbar, Lukman Audah, Mustafa Maad Hamdi, and Sameer Alani. "Prediction based efficient multi-hop clustering approach with adaptive relay node selection for VANET." J. Commun. 15, no. 4 (2020): 332-344.

31. Thamilarasi , V. et al. 2025. Cloud-Native Framework for Urban Noise and Air Pollution Analysis. International Journal of Basic and Applied Sciences. 14, 7 (Nov. 2025), 466–475. DOI:https://doi.org/10.14419/r3hw5f22

32. V. Thamilarasi, P. K. Naik, I. Sharma, V. Porkodi, M. Sivaram and M. Lawanyashri, "Quantum Computing - Navigating the Frontier with Shor's Algorithm and Quantum Cryptography," 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies, Pune, India, 2024, pp. 1-5, doi: 10.1109/TQCEBT59414.2024.10545283.

Downloads

Published

2026-03-31

Issue

Section

Articles

How to Cite

Dhanabal S, Kirti H. Wanjale, Geetha.S, Drishya Darwin, A.Raja, & R.Rajesh. (2026). Improving Secure Routing Performance Using Reputation Based On Weighted Hub Selection Model in Manet. National Journal of Antennas and Propagation, 73-82. https://doi.org/10.31838/NJAP/08.02.06

Similar Articles

1-10 of 216

You may also start an advanced similarity search for this article.