1. Introduction
Wireless networks involve different nodes corresponding via a wireless path. Few networks are connected to Wi-Fi only with the last hop. Examples include mobile voice, data, and mobile IP networks. In the last half, a decade, Desktop Computers have changed to networked agents who rely primarily on connectivity from independent workstations [
1]. Email, cloud storage, and the international web are some of the specific educational and corporate services supplied. In addition, mobile device, tablet, and notebook computing is expanding every year [
2].
In recent decades, research has been conducted on mobile ad-hoc networks due to the large availability of wireless communication services and fast growing need for deployment [
3,
4,
5]. A MANET is an ongoing, self-configured mobile device network connected wirelessly by the infrastructure. MANETs are characterised by mobility, self-government, hurried exploitation, and low-cost facilities that make it possible for them to be deployed for different purposes, such as observing the environment, adversity assistance, and military communication. One key benefit of a decentralised network is that, because of the multi-hop style of data transmission, they are often more robust than centralised networks [
6].
For instance, the coverage decreases when a base station stops working in the cellular network configuration. The possibility of a single failure point in a MANET is significantly decreased because the data can traverse in several paths. Since MANET design develops over time, it has the ability to overcome problems such as network isolation or disconnection [
7]. Proper routing is critical to the desired service supply as well as better communication and security in such a collaborating communications environment [
8,
9]. However, MANET is faced with additional safety and performance issues with the dynamic network topology, the usage of open wireless media, and constrained resource limitations. Therefore, MANET has been very interested in inventing an efficient and secure routing protocol in the research community. The MANET structure is depicted in
Figure 1.
Different safe routing methods were developed throughout the years to protect WSNs against malicious and selfish behaviour. These routing protocols depend, however, principally on basic versions and authentication procedures. Most cryptographic algorithms require significant computational capability and energy consumption, in particular the asymmetrically encrypted procedure. The low cost sensor nodes, however, are generally resource-limited in memory, energy, and computer capabilities [
10]. Several authentications and encryption schemes in routing protocols need a central authority or centralised management, which in WSNs is frequently unworkable. Finally, adversaries may hack the sensor nodes in an intentioned area by physical means. All safety systems can become useless once the keys are released. In other words, standard safe cryptographic-based protocols can withstand some sorts of external attacks but do not guard against inside nodes bad behaviour.
MANET exchanges nodes or mobile node groups for a large number in a safety-critical environment with data and control messages. These messages must be adapted to the deployment scenario, time, and geographical area. In addition, in the presence of environmental limits, compliance with different performance measurements, different degrees of safety requirements, and robustness must be ensured [
11,
12]. Violations of security and performance may lead to major consequences, for example, erroneous information or delayed transmission of crucial communications. The main cause is serious damage to the assets of the nation. Inefficient and unsafe routing of ad hoc nodes may lead deliberately in MANET to evaluation-safety concerns [
12]. The rest of the study is structured as follows: An overview of the existing routing protocols for MANETs is given in
Section 2, followed by the literature survey in
Section 3. The proposed model is explained in
Section 4. The results are given in
Section 5 and the study is concluded in
Section 6.
2. Routing Protocol Types
In MANET, there are different routing mechanisms. Three sorts of routing systems are available: proactive, reactive, and hybrid. The MANET routing methods are used for dealing with a considerable number of limited-resource nodes. The true concern in routing is the entry/departure of the network nodes [
13,
14]. Despite the development of several mobile nodes, it is vital to reduce the overhead routing message. The measurement of the routing table is another critical concern. The extent of the routing technique is more significant than the control packets that are transmitted inside the system can affect. The routing procedure determines the optimal route to the destination and how and when courses are determined.
Figure 2 demonstrates the case of the kind of routing method.
A trust-based multi-authenticated routing protocol is a protocol in which a node considers a routing decision based on the behaviour of a candidate router and its validation status. This view is quantified and referred to as the Trusted Validation metric. The route from source to destination is determined based on trust metrics [
15]. Trust based routing is vital to ensure the information collected, to preserve network performance against inappropriate consumption and network resources. Most uses of WSN convey and provide very vital information and secrecy, such as for military and health purposes [
16]. WSN infected with misbehaving nodes is misrouting traffic to misrepresentation or is not transmitting packets towards the destination that cause information loss. A trustworthy protocol on routing can protect the interchange of data, provide safety information, and protect the value of the data. However, the classic routing methods based on trust have certain essential limitations [
17]. The trust based systems deal with threats inherent in wireless networks and also create additional hazards that need to be paid particular attention [
18]. In this manuscript, a trust based multi authenticated routing model is proposed to deal with the problems mentioned earlier. The routing algorithm in our system considers the characteristics of the trust measure and other path selection quality requirements.
3. Literature Survey
The Dynamic Learning System proposed by Muthusenthil et al. [
19] guarantees the number of sequences on the routing table of the node receiving the route reply packet. The packet is deleted or allowed if it is larger than in the route reply packet. The value of the sequence number should not exceed or be classified as an attacker node. Dynamically this value of the threshold varies. The simulation results demonstrate that the time limit is reduced, but the routing overhead is increased.
The method designed by Anand et al. [
20], based on the neighbourhood and the protocol on the rehabilitation route, has two phases: detection and response. To detect the first gathering of the information from the neighbour node, packets are analysed. This is done with the packet, which is unicast by the source node following receipt of the ack message. Destination D Secondly, the source compares the next set of information after receiving more than one message. If the difference exceeds the threshold, a node of the black hole is found [
16]. S delivers the MRE (Modified Route Entrance) packet to the destination after discovering the true destination. As a result, the output is raised; false positive probabilities and overhead routing are reduced.
Venkanna et al. [
21] have presented an agent based multi-cast routing scheme (ABMRS) in MANETs using mobile/static unit collecting. The new technique progresses accordingly: (1) Reliables nodes have been found; (2) intermediate nodes have been connected to reliable and intermediate nodes; (3) multicast backbones have been established; and (4) multi-cast groups members have been combined to backbones.
Malathi et al. [
22] offered the comparison between AODV, OLSR and HWMP in their study “energy and performance assessment of reactive, proactive and hybrid routing algorithms in the network wireless mesh.” They employed an NS3 simulator and the following measures: power consumption, transmission,
PDR, delay, e-transmission and e-PDR. The routing protocols were assessed using two topologies: grid topology and topology for mobile nodes. The results show that OLSR is the most effective in
PDR and reduced delay routing technique. However, mobility and scalability can greatly affect its performance [
23,
24].
In order to identify and safeguard the selfish nodes for network security improvement, Devi et al. [
25] developed the dynamic trust-based intrusion detection technique. The AODV was used here to generate the path from the source to the destination. Through the direct and indirect levels of trust, the selfish nodes were validly identified. Additionally, the direct and indirect trust degrees were analysed via neighbour’s direct communication exchanges and recommendations. Overhead was introduced during data transfer by the frequent network topology.
A protocol to secure On-Demand routing protocols that use broadcasting as their route query mechanism is the Secure Routing Protocol (SRP) created by Hammamouche et al. [
26]. They pointed out that a number of existing reactive routing protocols, notably the DSR, can be extended. Between a source node and a destination node, a security association (SA) is necessary. The SA will be defined by a common key between the two nodes. The SA is presumed [
27,
28].
The Ad-Hoc routing Security-aware (SAR) protocol is an ad-hoc routing solution that integrates security features as route discovery parameters. However, typical unprotected routing protocols identify the shortest way between two nodes, but SAR can identify a path with security features. For example, when each node on the route needs a particular shared key, the criterion for a valid route can be detected.
Authenticated Ad hoc Networks Routing (ARAN), as defined by Hammamouche et al. [
29], is a secure on-demand routing protocol. ARAN uses an encryption mechanism to provide authentication, message integrity, and non-repudiation security objectives. The first phase is the exploratory certification process requiring a trustworthy certificate authority. It consists of two different operating phases. All nodes wishing to connect to the network must contact the certifying body and ask for an address and a public key certificate. The certifying body gives its public key to all network nodes [
30,
31]. The second stage in the protocol’s operation is the route finding process, which supplies final authentication. This guarantees that the destination is reached.
4. Proposed Model
An autonomous framework consisting of separate nodes that can move about in its own direction is called MANET. This framework might be used as stand-alone, or could connect to a pre-existing system. The mobility nature of MANET makes the topology dynamic [
32]. It is possible for the source and destination to validly transfer data if they are either both inside the transmission range or if they are using transferring nodes that connect two of them. Other than being wired, MANETs have a few distinct features. The first point to consider is that MANETs utilise dynamic connections to transmit packets. Their susceptibility characterises wire-line connections to time and space; they may also be obstructed by reflection, refraction, diffraction, and distortion. Restricted data transfer capacity is another disadvantage of remote paths [
33,
34]. In MANETs, the topology can alter radically, and problems in routing can occur, whereas, in wired systems, the topology remains constant. as a result, in MANETs, conventions must adjust to avoid routing failures.
Because MANETs vary so much, components designed for wired systems cannot be properly mapped to MANETs. Quality of Service (QoS) arrangement in MANETs is made up of activities at different tiers, such as network and application layers, in which the network layer is given the primary role. In the network layer, the routing convention must be able to accommodate QoS requirements for the beginning of a session and respond to portability issues. A routing protocol should decide when many paths are available, and a secure path needs to be recognised to transmit data packets. When only certain paths are used, the performance of a routing protocol should always be the same as the shortest path routing protocol [
32,
35]. In the proposed model, neighbour feedback is considered by every node for availing the trust on the nodes, and only nodes with positive feedback are considered. Then every node undergoes multi-authentication to avoid malicious actions in the network. Initially, the node will be authenticated by the neighbour node. If the node exhibits any malicious operations, the node will not be authenticated and removed from the routing process. After successful authentication of the neighbour node, the node will be authenticated by the Network Head Node (
NHN), which is the node that monitors all the nodes and their behaviours during data transmission. Network Head Node (
NHN) consists of an organisational network that connects the cluster’s head node and other nodes in some cases. Most users connect to the workplace network via the public or organisation network to do their work. Unless a private network and, optionally, an application network connect the cluster nodes, all intra-cluster administration and deployment traffic is transmitted on the enterprise network. The proves of routing and using
NHN node is depicted in the
Figure 3.
Each node will be authenticated by its neighbour node and then by node in the figure. Multi-level authentication is performed, and also neighbour feedback is considered for establishing a strong and secure route for secure data transmission. Initially, during a dummy data transmission, the packet delivery rate, computational capability rate, packet loss rate, energy consumption, the behaviour of every node is calculated. A node with a high packet delivery rate, less energy consumption, and high computational capabilities is selected as node. The route identifier serves as the foundation for effective urban traffic planning and simulation. Each route within a feature class is given a unique ID. Any integer or character field in your route feature class can be used as the route identifier.
We consider coordinates
for each node with its node ID (
) to
node. The
node will broadcast the Route Identification Token (
) to all the nodes considered to be involved in data communication. The Nodes after receiving the
message, will get their neighbour IDs and transmit to
node as:
The distance between the node
n(
i) and neighbour node is calculated as:
The neighbour node
N(
i + 1) will send the feedback about the node
N(
i) to the
NHN node as:
Here,
PDR is the packet delivery rate,
is the neighbour node at nearest position. Based on the calculated neighbour feedback, the neighbour node will authenticate the node
N(
i) and mark with label. The Feedback
, so all Nodes will be authenticated and labelled as
and update this to
node. The node that is authenticated will send the label to the
node. The
node will verify and again authenticate with an extra label calculated as:
The
node calculates every node’s mobility speed ‘
S’ to calculate a new route if any failure occurs. The node speed is calculated as:
where
is the speed of a node, and
t is the time instance and is the change in the time in T seconds, where T is the threshold time. The process of route identification is performed using Algorithm 1.
5. Results
Due to features such as changeable topology and openness, MANET is vulnerable to many attacks. This leads to the exploitation of MANET in the presence of malevolent, or selfish nodes through many forms of assaults. Such nodes affect MANET routing performance, such as the delivery ratio of packets. The need for a factor of trust between nodes of communication is therefore justified in this proposed model. The proposed model is implemented in the NS2 simulator that establishes a MANET, and routing is performed on trusted nodes by considering the neighbour feedback. Every node undergoes multi authentication to strictly avoid malicious nodes so that the network’s performance will be increased. The proposed Neighbour Feedback-based Trusted Multi Authenticated Node (NFbTMAN) Routing Model is compared with the Novel Energy Efficient Trust Aware Routing (NETAR) model. The proposed model considers parameters such as Trust Factor Generation Time Levels, Route Identification Time Levels, Neighbour Feedback Assessment Level, Multi-Authentication Timed Levels, Packet Delivery Rate. The parameters considered for network formation are depicted in
Table 1.
Network trust evaluation is utilised to promote secure and trustworthy networking by helping nodes collaborate in a trustworthy manner. However, there are still many difficulties and flaws with many trust management models proposed for the MANET. The proposed model trust factor generation time levels are compared with the traditional model, and the results are depicted in the
Figure 4.
Table 2 represents trust factor generation time levels.
Changes in route topology occur because of node mobility and, because of this, the system’s architecture remains unforeseen for some time. Due to the decentralised nature of such networks, network communications must identify routes with high security. In the route discovery phase, the trust calculation is performed to include trusted nodes. The proposed model route identification time levels are compared with the traditional model, and the results are indicated in
Figure 5. Route identification time levels are shown in
Table 3.
The proposed model considers neighbour feedback to establish a route, and the feedback assessment levels are represented in
Figure 6. The feedback will help analyse the node behaviour for considering only trusted nodes in finalising the route for secure data transmission.
Table 4 express neighbour feedback assessment time level.
It is possible for MANETs to be targeted by numerous attacks. Eavesdropping, interference, impersonation, and denial of service are all possible techniques. Redundant transmission and robust authentication can be utilised to increase the security of a MANET. They are capable of handling only a fraction of the threat. The multi authentication time levels of the proposed and traditional models are indicated in
Figure 7.
Table 5 shows multi-authentication time levels.
The packet delivery rate is defined as the ratio of the number of packets transmitted by the source node to the number of packets received by the destination node. A route with trusted nodes is considered in the proposed paradigm. When compared to the traditional model, the proposed model has a high packet delivery rate. The packet delivery rates of the traditional and proposed models are depicted in
Figure 8.
Table 6 shows packet delivery rate.
6. Conclusions
MANET is a group of mobile nodes that can dynamically transfer positions in another network to share information. Mobility causes linkages to break down, lengthening the time it takes to retrace one’s steps. This study proposes a MANET routing algorithm that overcomes the constraints of existing routing protocols. The suggested routing strategy, in contrast to earlier work, uses node speed, direction, and residual energy to generate more stable routes between intermediate nodes in the source and destination node paths. Through extensive simulations, it has demonstrated that the approaches presented are effective in a variety of operational situations and scenarios. To construct a secure data transmission path, the suggested model takes into account the trust factor and neighbour feedback, as well as multi-level authentication. The suggested approach effectively determines the secure path by analysing authenticated nodes in order to avoid malicious network behaviours. The proposed model has a high packet delivery ratio, and the latency is decreased. When compared to typical models, the presented model has an extremely low packet loss rate. The multi-level authentication and trust factor computation processes can be modified in the future to decrease node overhead and increase performance.