A Trusted MANET Routing Algorithm Based on Fuzzy Logic

  • Qahtan M. YasEmail author
  • Mohammed Khalaf
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1174)


MANET wireless network changes network topology continuously and dynamically due to the absence of infrastructure and central control. Typically, this network used for areas where unavailable basic communications services such as battlefield, emergency relief, and virtual classes. However, ad hoc networks exposed to different attacks as in malicious or selfish nodes that impede packets delivery. A new algorithm proposed of the MANET using a fuzzy logic system to solve malicious nodes problem. The routing algorithm relies on two main principles as trust level and shortest path (hops count). The finding obtained from three key parameters as high packet delivery fraction with low end-to-end delay and normalized routing load in this study. These results calculated based on the comparison between the FLTS algorithm with AODV protocol and without a drop.


MANET Trusted routing Fuzzy logic Trust Hop count 



The author would like to thank the University of Diyala\Scientific Research Center (SRC) for supporting this major research project and also to some friends who gave me advice during working this research.


  1. 1.
    Computing, M.: An overview of MANET: applications, attacks and challenges abstract. Int. J. Comp. Sci. Mobile Comput. 3(1), 408–417 (2014)Google Scholar
  2. 2.
    Kaid, A., Ali, S., Kulkarni, U.V.: Characteristics, applications and challenges in mobile ad-hoc networks (MANET): overview. Wirel. Netw. 3(12), 6–12 (2015)Google Scholar
  3. 3.
    Eldein, D., Ahmed, M., Khalifa, O.O.: An overview of MANETs: applications, characteristics, challenges and recent issues. IJEAT 3, 128–133 (2017)Google Scholar
  4. 4.
    Patel, D.N., Patel, S.B., Hemangi, R.: A survey of reactive routing protocols in MANET. In: International Conference on Information Communication and Embedded Systems (ICICES 2014), pp. 1–6. IEEE (2014)Google Scholar
  5. 5.
    Kaur, H., Sahni, V., Bala, M.: A survey of reactive, proactive and hybrid routing protocols in MANET: a review. Network 4(3), 498–500 (2013)Google Scholar
  6. 6.
    Hinds, A., Ngulube, M., Zhu, S., Al-aqrabi, H.: A review of routing protocols for mobile ad-hoc networks (MANET). Int. J. Inf. Educ. Technol. 3(1), 1–5 (2013)Google Scholar
  7. 7.
    Alslaim, M.N., Alaqel, H.A., Zaghloul, S.S.: A comparative study of MANET routing protocols. In: The Third International Conference on e-Technologies and Networks for Development (ICeND 2014), pp. 178–182. IEEE (2014)Google Scholar
  8. 8.
    Kerrache, C.A., Lagraa, N., Calafate, C.T., Lakas, A.: TROUVE : a trusted routing protocol for urban vehicular environments. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 260–267. IEEE (2015)Google Scholar
  9. 9.
    Khalaf, M., et al.: A data science methodology based on machine learning algorithms for flood severity prediction. In 2018 IEEE Congress on Evolutionary Computation (CEC), pp. 1–8. IEEE (2015)Google Scholar
  10. 10.
    Yas, Q.M., Khalaf, M.: Reactive routing algorithm based trustworthy with less hop counts for mobile ad-hoc networks using fuzzy logic system. J. Southwest Jiaotong Univ. 54(3), 1–11 (2019)CrossRefGoogle Scholar
  11. 11.
    Inaba, T., Sakamoto, S., Kulla, E., Caballe, S.: An integrated system for wireless cellular and ad-hoc networks using fuzzy logic. In: 2014 International Conference on Intelligent Networking and Collaborative Systems, pp. 157–162. IEEE (2014)Google Scholar
  12. 12.
    Balan, E.V., Priyan, M.K., Gokulnath, C., Devi, G.U.: Fuzzy based intrusion detection systems in MANET. Procedia Comput. Sci. 50, 109–114 (2015)CrossRefGoogle Scholar
  13. 13.
    Yas, Q.M., Zadain, A.A., Zaidan, B.B., Lakulu, M.B., Rahmatullah, B.: Towards on develop a framework for the evaluation and benchmarking of skin detectors based on artificial intelligent models using multi-criteria decision-making techniques. Int. J. Pattern Recogn. Artif. Intell. 31(03), 1759002 (2017)CrossRefGoogle Scholar
  14. 14.
    Yas, Q.M., Zaidan, A.A., Zaidan, B.B., Rahmatullah, B., Karim, H.A.: Comprehensive insights into evaluation and benchmarking of real-time skin detectors: review, open issues & challenges, and recommended solutions. Measurement 114, 243–260 (2017)CrossRefGoogle Scholar
  15. 15.
    Jassim, H.S., Yussof, S., Kiong, T.S., Koh, S.P., Ismail, R.: A routing protocol based on trusted and shortest path selection for mobile ad hoc network. In: 2009 IEEE 9th Malaysia International Conference on Communications (MICC), pp. 547–554. IEEE (2009)Google Scholar
  16. 16.
    Vlpduhpduh, K., et al.: Performance analysis of optimized trust AODV using ant algorithm. In: 2014 IEEE International Conference on Communications (ICC), pp. 1843–1848. IEEE (2014)Google Scholar
  17. 17.
    Xia, H., Jia, Z., Ju, L., Li, X., Sha, E.H.: Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Comput. Commun. 36(9), 1078–1093 (2013)CrossRefGoogle Scholar
  18. 18.
    Chaudhary, A., Kumar, A., Tiwari, V.N.: A reliable solution against packet dropping attack due to malicious nodes using fuzzy logic in MANETs. In: 2014 International Conference on Reliability Optimization and Information Technology (ICROIT), pp. 178–181. IEEE (2014). C. Science, E. Communication, and C. ScienceGoogle Scholar
  19. 19.
    Anuradha, M., Mala, G.S.A.: Cross-layer based congestion detection and routing protocol using fuzzy logic for MANET. Wirel. Netw. 23(5), 1373–1385 (2016)CrossRefGoogle Scholar
  20. 20.
    Robinson, Y.H., Rajaram, M., Julie, E.G., Balaji, S.: Detection of black holes in MANET using collaborative watchdog with fuzzy logic. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 10(3), 622–628 (2016)Google Scholar
  21. 21.
    Kumar, K.V., Sankar, T.J., Prabhakaran, M., Srinivasan, V.: Fuzzy logic based efficient multipath routing for mobile adhoc networks. Appl. Math. Inf. Sci. 11(2), 449–455 (2017)CrossRefGoogle Scholar
  22. 22.
    Sarkar, A.: Application of fuzzy logic in transport. Int. J. Soft Comput. 3(2), 1–21 (2012)CrossRefGoogle Scholar
  23. 23.
    Ghasemnezhad, S., Ghaffari, A.: Fuzzy logic based reliable and real-time routing protocol for mobile ad hoc networks. Wirel. Pers. Commun. 98(1), 593–611 (2017)CrossRefGoogle Scholar
  24. 24.
    Sambariya, D.K., Prasad, R.: A novel fuzzy rule matrix design for fuzzy logic-based power system stabilizer. Electr. Power Compon. Syst. 45(1), 34–48 (2016)CrossRefGoogle Scholar
  25. 25.
    Chettibi, S., Chikhi, S.: Dynamic fuzzy logic and reinforcement learning for adaptive energy-efficient routing in mobile ad-hoc networks. Appl. Soft Comput. 38, 321–328 (2016)CrossRefGoogle Scholar
  26. 26.
    Pouyan, A.A., Tabari, M.Y.: FPN-SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile ad hoc network. Int. J. Commun Syst 30(1), 1–14 (2015)Google Scholar
  27. 27.
    Jia, X.L.Z., Zhang, P.Z.R.: Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf. Secur. 4(4), 212–232 (2010)MathSciNetCrossRefGoogle Scholar
  28. 28.
    Xia, H., Jia, Z., Li, X., Ju, L., Sha, E.H.: Ad hoc networks trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)CrossRefGoogle Scholar
  29. 29.
    Keerthi, T.D.S., Venkataram, P.: AODV route maintenance using honeypots in MANETs. In: 2015 World Congress on Internet Security (WorldCIS), pp. 105–112 (2015)Google Scholar
  30. 30.
    Kumar, R.S.: A review and design study of cross-layer scheme based algorithm to reduce the link break in MANETs. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 139–143. IEEE (2013)Google Scholar
  31. 31.
    Patel, R., Patel, N., Kamboj, P.: A comparative study and simulation of AODV MANET routing protocol in NS2 & NS3. In: 2014 International Conference on Computing for Sustainable Global Development (INDIACom), pp. 889–894. IEEE (2014)Google Scholar
  32. 32.
    Bouras, C., Charalambides, S., Drakoulelis, M., Kioumourtzis, G.: Simulation modelling practice and theory a tool for automating network simulation and processing tracing data files. Stimul. Model. Pract. Theory 1–21 ( 2012)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of DiyalaBaqubahIraq
  2. 2.Department of Computer ScienceAl-Maarif University CollegeRamadiIraq

Personalised recommendations