Open Access

ARTICLE

An Enhanced Trust-Based Secure Route Protocol for Malicious Node Detection

S. Neelavathy Pari1,*, K. Sudharson2
1 Department of Computer Technology, Anna University, Chennai, 600025, India
2 Department of Information Technology, Velammal Institute of Technology, Chennai, 601204, India
* Corresponding Author: S. Neelavathy Pari. Email:

Intelligent Automation & Soft Computing 2023, 35(2), 2541-2554. https://doi.org/10.32604/iasc.2023.030284

Received 23 March 2022; Accepted 26 April 2022; Issue published 19 July 2022

Abstract

The protection of ad-hoc networks is becoming a severe concern because of the absence of a central authority. The intensity of the harm largely depends on the attacker’s intentions during hostile assaults. As a result, the loss of Information, power, or capacity may occur. The authors propose an Enhanced Trust-Based Secure Route Protocol (ETBSRP) using features extraction. First, the primary and secondary trust characteristics are retrieved and achieved routing using a calculation. The complete trust characteristic obtains by integrating all logical and physical trust from every node. To assure intermediate node trustworthiness, we designed an ETBSRP, and it calculates and certifies each mobile node's reputation and sends packets based on that trust. Connection, honesty, power, and capacity are the four trust characteristics used to calculate node reputation. We categorize Nodes as trustworthy or untrustworthy according to their reputation values. Fool nodes are detached from the routing pathway and cannot communicate. Then, we use the cryptographic functions to ensure more secure data transmission. Finally, we eliminate the untrustworthy nodes from the routing process, and the datagram from the origin are securely sent to the target, increasing throughput by 93.4% and minimizing delay.

Keywords

Ad-hoc network; wireless security; trust management; data Mining; cryptography

Cite This Article

S. Neelavathy Pari and K. Sudharson, "An enhanced trust-based secure route protocol for malicious node detection," Intelligent Automation & Soft Computing, vol. 35, no.2, pp. 2541–2554, 2023.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 398

    View

  • 236

    Download

  • 0

    Like

Share Link

WeChat scan