Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Packet Forwarding Misbehaviour Isolation using Fuzzy Trust-based Secure Routing in MANET

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 3
Year of Publication: 2015
Jenish R. Gandhi
Rutvij H. Jhaveri

Jenish R.gandhi and Rutvij H Jhaveri. Article: Packet Forwarding Misbehaviour Isolation using Fuzzy Trust-based Secure Routing in MANET. International Journal of Computer Applications 122(3):30-35, July 2015. Full text available. BibTeX

	author = {Jenish R.gandhi and Rutvij H. Jhaveri},
	title = {Article: Packet Forwarding Misbehaviour Isolation using Fuzzy Trust-based Secure Routing in MANET},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {3},
	pages = {30-35},
	month = {July},
	note = {Full text available}


MANETs are much more susceptible to various attacks because of openness in network topology and being away of a centralized administration in management. As an outcome of that, more malicious nodes are often comes in and goes out without being detected from the network topology. Hence, MANET needs very specialized security methods to isolate the false entrance. As well as there is no single solution that fitting in different types of the network where the nodes can be behave like any apparatuses. The networks works well if the nodes are trusty and act rightly cooperatively. In order to improve the security of the network, this paper gets started the new interesting approach to evaluate the trustworthiness of the nodes. Fuzzy Trust-based Secured Routing (FTSR) approach provides a flexible and feasible approach to choose trusted route to meet the requirement of the security of the data transmission. In this, fuzzy logic rule prediction mechanism is adopted to notice the future behavior of node by updating the node's trust. We have also analyzed the performance metrics such as packet delivery ratio, end-to-end delay and average throughput which can also increased accordingly through newest approach.


  • Bansal, Meenakshi, Rachna Rajput, and Gaurav Gupta, "Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations", The Internet Society, 1999.
  • Neetesh Saxena, Narendra S. Chaudhari, "Message Security in Wireless Networks: Infrastructure based vs. Infrastructureless Networks", IEEE, 2012.
  • Yu, Shuyao, Youkun Zhang, Chuck Song, and Kai Chen, "A security architecture for mobile ad hoc networks. ", In Proceedings of APAN Network Research Workshop, Cairns, Australia, 2003.
  • Gandhi, Jenish R. , and Rutvij H. Jhaveri, "Addressing packet forwarding misbehaviour using trust-based approach in Ad-hoc networks: A survey. ", In Signal Processing And Communication Engineering Systems (SPACES), 2015 International Conference on, IEEE, pp. 391-396, 2015.
  • Sethi, Srinivas, and Siba K. Udgata, "Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks", Multi-disciplinary Trends in Artificial Intelligence, Springer Berlin Heidelberg, Pp. 112-123, 2011.
  • Marchang, Ningrinla, and Raja Datta, "Light-weight trust-based routing protocol for mobile ad hoc networks", Information Security, IET 6, no. 2, Pp. 77-83, 2012.
  • Xia, Hui, Zhiping Jia, Xin Li, Lei Ju, and Edwin H-M. Sha, "Trust prediction and trust-based source routing in mobile ad hoc networks", Ad Hoc Networks 11, no. 7, Pp. 2096-2114, 2013.
  • Bar, Radha Krishna, Jyotsna Kumar Mandal, and Moirangthem Marjit Singh, "QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack", Procedia Technology 10, 530-537, 2013.
  • Biswas, Suparna, Tanumoy Nag, and Sarmistha Neogy, "Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET", In Applications and Innovations in Mobile Computing (AIMoC), IEEE, Pp. 157-164, 2014.
  • Xia, Hui, Zhiping Jia, and Edwin H-M. Sha, "Research of trust model based on fuzzy theory in mobile ad hoc networks", IET Information Security 8, no. 2, Pp. 88-103, 2013.
  • Gandhi, Jenish, and Rutvij Jhaveri, "Energy Efficient Routing Approaches in Ad hoc Networks: A Survey. ", In Information Systems Design and Intelligent Applications, Springer India, pp. 751-760, 2015.