A fuzzy based secure QoS routing protocol using ant colony optimization for mobile Ad hoc network
Ensuring secure communication in mobile ad hoc network (MANET) is the main challenging task due to the network characteristics. In this paper, we apply fuzzy logic method and method of ant colony optimization (ACO) to establish a secure routing path with minimum delay for mobile ad hoc network. The...
        Saved in:
      
    
          | Published in | Journal of intelligent & fuzzy systems Vol. 27; no. 1; pp. 317 - 329 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        London, England
          SAGE Publications
    
        01.01.2014
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1064-1246 1875-8967  | 
| DOI | 10.3233/IFS-130999 | 
Cover
| Abstract | Ensuring secure communication in mobile ad hoc network (MANET) is the main challenging task due to the network characteristics. In this paper, we apply fuzzy logic method and method of ant colony optimization (ACO) to establish a secure routing path with minimum delay for mobile ad hoc network. The ACO algorithm is used to establish a virtual backbone connecting cluster heads (CHs). The general ACO algorithm is modified to allow selection of routing path, based on trust value of the nodes lying in the routing path and delaying experienced in the path. The procedure uses a fuzzy logic controller to evaluate the trust value of the nodes based on node's QoS parameters: energy drain rate, lifetime of the node, packet drop rate and packet forwarding status of the node. The behavior of the protocol under various attacks is analyzed. Experimentation shows that the algorithm results in secure shortest routing path for data communication. Additionally, the packet drop rate and routing delay of the proposed routing protocol in presence of malicious nodes is fewer compared to secure cluster based routing protocol (SCBRP) and Fuzzy Logic based Security Level routing protocol (FLSL). | 
    
|---|---|
| AbstractList | Ensuring secure communication in mobile ad hoc network (MANET) is the main challenging task due to the network characteristics. In this paper, we apply fuzzy logic method and method of ant colony optimization (ACO) to establish a secure routing path with minimum delay for mobile ad hoc network. The ACO algorithm is used to establish a virtual backbone connecting cluster heads (CHs). The general ACO algorithm is modified to allow selection of routing path, based on trust value of the nodes lying in the routing path and delaying experienced in the path. The procedure uses a fuzzy logic controller to evaluate the trust value of the nodes based on nodes QoS parameters: energy drain rate, lifetime of the node, packet drop rate and packet forwarding status of the node. The behavior of the protocol under various attacks is analyzed. Experimentation shows that the algorithm results in secure shortest routing path for data communication. Additionally, the packet drop rate and routing delay of the proposed routing protocol in presence of malicious nodes is fewer compared to secure cluster based routing protocol (SCBRP) and Fuzzy Logic based Security Level routing protocol (FLSL). Ensuring secure communication in mobile ad hoc network (MANET) is the main challenging task due to the network characteristics. In this paper, we apply fuzzy logic method and method of ant colony optimization (ACO) to establish a secure routing path with minimum delay for mobile ad hoc network. The ACO algorithm is used to establish a virtual backbone connecting cluster heads (CHs). The general ACO algorithm is modified to allow selection of routing path, based on trust value of the nodes lying in the routing path and delaying experienced in the path. The procedure uses a fuzzy logic controller to evaluate the trust value of the nodes based on node's QoS parameters: energy drain rate, lifetime of the node, packet drop rate and packet forwarding status of the node. The behavior of the protocol under various attacks is analyzed. Experimentation shows that the algorithm results in secure shortest routing path for data communication. Additionally, the packet drop rate and routing delay of the proposed routing protocol in presence of malicious nodes is fewer compared to secure cluster based routing protocol (SCBRP) and Fuzzy Logic based Security Level routing protocol (FLSL).  | 
    
| Author | Pushpa Lakshmi, R. Vincent Antony Kumar, A.  | 
    
| Author_xml | – sequence: 1 givenname: R. surname: Pushpa Lakshmi fullname: Pushpa Lakshmi, R. organization: Department of Information Technology, PSNA College of Engineering and Technology, Tamilnadu, India – sequence: 2 givenname: A. surname: Vincent Antony Kumar fullname: Vincent Antony Kumar, A. organization: Department of Information Technology, PSNA College of Engineering and Technology, Tamilnadu, India  | 
    
| BookMark | eNptkE9LAzEQxYNUsK1e_AS5KcJq_rTZ3WMpVgsFkep5ySaTmrpNapJF2k_v1nqSnmYe_N4w7w1Qz3kHCF1Tcs8Z5w_z2TKjnJRleYb6tMjHWVGKvNftRIwyykbiAg1iXBNC8zEjfSQn2LT7_Q7XMoLGEVQbAL_6JQ6-Tdat8Db45JVvcBsPUrqEO-XdDvttshu7l8l6h40PeONr2wCeaPzhFXaQvn34vETnRjYRrv7mEL3PHt-mz9ni5Wk-nSwyxUqRMiBCMCHqwtTACNcgRkZDrqgWnOe6FAxYzrUxWjJVl1ITyselVkxBoU1R8yG6Pd7tHv5qIaZqY6OCppEOfBsrOhY5KUY0Zx16d0RV8DEGMNU22I0Mu4qS6tBj1fVYHXvsYPIPVjb9Zk5B2ua05eZoiXIF1dq3wXXJT5E_9p-FQA | 
    
| CitedBy_id | crossref_primary_10_1007_s11276_014_0780_4 crossref_primary_10_1007_s11277_018_5360_y  | 
    
| ContentType | Journal Article | 
    
| Copyright | IOS Press. All rights reserved | 
    
| Copyright_xml | – notice: IOS Press. All rights reserved | 
    
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D  | 
    
| DOI | 10.3233/IFS-130999 | 
    
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts  Academic Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitleList | Technology Research Database CrossRef  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISSN | 1875-8967 | 
    
| EndPage | 329 | 
    
| ExternalDocumentID | 10_3233_IFS_130999 10.3233_IFS-130999  | 
    
| GroupedDBID | .4S .DC 29K 4.4 5GY 6TJ 8VB AAGLT AAOTM ABCQX ABDBF ABEFU ABJNI ABUBZ ABUJY ACGFS ACPQW ACUHS ADMLS ADZMO AEMOZ AENEX AFRHK AHDMH AHQJS AJNRN AKVCP ALMA_UNASSIGNED_HOLDINGS AMVHM ARCSS ARTOV ASPBG AVWKF CAG COF D-I DU5 EAD EAP EBA EBR EBS EBU EDO EJD EMK EPL EST ESX FEDTE H13 HZ~ I-F IL9 IOS K1G L7B MET MIO MK~ MV1 NGNOM O9- P2P QWB TH9 TUS ZL0 0R~ AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D  | 
    
| ID | FETCH-LOGICAL-c296t-e066266b8fbe203de64fde7c1d6337d962e273dffda2cb9ad01359dc2ce8df8b3 | 
    
| ISSN | 1064-1246 | 
    
| IngestDate | Sun Sep 28 12:02:42 EDT 2025 Thu Apr 24 23:13:09 EDT 2025 Wed Oct 01 08:32:25 EDT 2025 Sun Jul 13 06:01:57 EDT 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 1 | 
    
| Keywords | Fuzzy logic mobile ad hoc network clustering ant colony optimization trust value  | 
    
| Language | English | 
    
| LinkModel | OpenURL | 
    
| MergedId | FETCHMERGED-LOGICAL-c296t-e066266b8fbe203de64fde7c1d6337d962e273dffda2cb9ad01359dc2ce8df8b3 | 
    
| Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23  | 
    
| PQID | 1567084172 | 
    
| PQPubID | 23500 | 
    
| PageCount | 13 | 
    
| ParticipantIDs | proquest_miscellaneous_1567084172 crossref_primary_10_3233_IFS_130999 crossref_citationtrail_10_3233_IFS_130999 sage_journals_10_3233_IFS_130999  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2014-01-01 | 
    
| PublicationDateYYYYMMDD | 2014-01-01 | 
    
| PublicationDate_xml | – month: 01 year: 2014 text: 2014-01-01 day: 01  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | London, England | 
    
| PublicationPlace_xml | – name: London, England | 
    
| PublicationTitle | Journal of intelligent & fuzzy systems | 
    
| PublicationYear | 2014 | 
    
| Publisher | SAGE Publications | 
    
| Publisher_xml | – name: SAGE Publications | 
    
| SSID | ssj0017520 | 
    
| Score | 1.9740907 | 
    
| Snippet | Ensuring secure communication in mobile ad hoc network (MANET) is the main challenging task due to the network characteristics. In this paper, we apply fuzzy... | 
    
| SourceID | proquest crossref sage  | 
    
| SourceType | Aggregation Database Enrichment Source Index Database Publisher  | 
    
| StartPage | 317 | 
    
| SubjectTerms | Ad hoc networks Algorithms Ant colony optimization Clusters Computer networks Delay Fuzzy logic Routing (telecommunications)  | 
    
| Title | A fuzzy based secure QoS routing protocol using ant colony optimization for mobile Ad hoc network | 
    
| URI | https://journals.sagepub.com/doi/full/10.3233/IFS-130999 https://www.proquest.com/docview/1567084172  | 
    
| Volume | 27 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 1875-8967 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017520 issn: 1064-1246 databaseCode: ABDBF dateStart: 19980201 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVEBS databaseName: EBSCOhost Mathematics Source - HOST customDbUrl: eissn: 1875-8967 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017520 issn: 1064-1246 databaseCode: AMVHM dateStart: 19980201 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/mathematics-source providerName: EBSCOhost – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1875-8967 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017520 issn: 1064-1246 databaseCode: ADMLS dateStart: 19980201 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELZK9wIHxFOUBWQEF2SlJHHjJMcIURXEIsE-tLcosR11BU1Wm0Sr7a9nnHHabFXE4xJVrhNZns_jmfHMZ0LeZrEnXR3mTpj5EhwUKWHNuaGjNM8CEUntqi5B9qtYnM4-nwfno9H1sLqkyadyvbeu5H-kCm0gV1Ml-w-S3XwUGuA3yBeeIGF4_pWME1a06_UNM1uRYrUJnWv2rTpmV1XbYJl51VQgatbWWIzYMMNSXd6wClTFytZgdqmGqyoHBcESxZaVZCVmh__GdL3Y8Hg2HXRwFPWA_Nwo27ZeXmbsS_ajXq66nIHv0_6_s4vSZIUa6gIzmE2edzIdRiG82U4UAo-_9gYawec0zIg20KixDbwkJ4rxIo5eDyNHwC28oVLlWN1p92eOEZJd1c99E5qef5ofO7Atx3jr0g6Vtu2WbjvdIQc-bAfumBwkR2eLo80BVBj4SGRhB4_Mtubt99u3b9syWwdlkBPYmSknD8h9KySaIFgekpEuH5F7A9bJxyRLaCcw2sGGImwowIZa2NAeNrSDDQXYUIQNHcKGAmwowoYmigJsqIXNE3I6_3jyYeHYmzYc6ceicbS5B0CIPCpy7btcaTErlA6lpwTnoYqFr8HMVUWhYEXncabAcQhiJX2pI1VEOX9KxmVV6meECk97rnQzN1Aalr6KODcuAuwluQxkoSfkXT9nqbQ09OY2lJ8puKO9dFKc3wl5s-l7ieQre3u97qc-Bd1oDryyUldtnXqBCN1oBjb6hFAjk9Qu3nrPZ57_ucshubvF_gsybq5a_RJs0iZ_ZfHzCycXjow | 
    
| linkProvider | EBSCOhost | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+fuzzy+based+secure+QoS+routing+protocol+using+ant+colony+optimization+for+mobile+Ad+hoc+network&rft.jtitle=Journal+of+intelligent+%26+fuzzy+systems&rft.au=Pushpa+Lakshmi%2C+R.&rft.au=Vincent+Antony+Kumar%2C+A.&rft.date=2014-01-01&rft.pub=SAGE+Publications&rft.issn=1064-1246&rft.eissn=1875-8967&rft.volume=27&rft.issue=1&rft.spage=317&rft.epage=329&rft_id=info:doi/10.3233%2FIFS-130999&rft.externalDocID=10.3233_IFS-130999 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1064-1246&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1064-1246&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1064-1246&client=summon |