Trust-Aware Clustering for Enhanced Routing Security and Performance in Sensor-Enabled Mobile Ad Hoc Networks
DOI:
https://doi.org/10.63665/IJMEC.1103.01Keywords:
Trust-Aware Clustering, Mobile Ad Hoc Networks (MANETs), Sensor-Enabled Networks, Secure Routing, Intrusion Detection, Cluster Head Selection, Network Performance, NS-3 SimulationAbstract
Mobile Ad Hoc Networks (MANETs) play a vital role in sensor-based and Internet of Things (IoT) applications operating in infrastructure-less and dynamically changing environments such as disaster recovery, military operations, and remote monitoring. However, frequent topology variations, limited node energy, and the absence of centralized control make MANETs highly vulnerable to routing inefficiencies and security threats, leading to degraded sensor data delivery performance. This paper proposes a trust-aware clustering-based routing framework for sensor-enabled MANETs aimed at enhancing both routing security and network performance. The proposed approach employs a hybrid cluster head (CH) election mechanism that integrates node degree, mobility, residual energy, and a dynamically computed trust value to ensure stable, energy-efficient, and secure cluster formation. The trust model evaluates node behavior based on packet forwarding reliability and communication consistency, enabling the identification and isolation of malicious or selfish nodes. Secure inter-cluster communication is further strengthened through lightweight symmetric encryption and authentication mechanisms, while a trust-assisted intrusion detection component at the CH level facilitates early threat detection. The proposed protocol is evaluated using NS-3 simulations under varying node densities and mobility conditions. Performance analysis demonstrates significant improvements in packet delivery ratio, routing overhead, end-to-end delay, and malicious node detection accuracy compared to AODV, CBRP, and Secure-AODV protocols. The results indicate that integrating trust-aware clustering with lightweight security mechanisms provides an effective and scalable solution for reliable and secure data transmission in sensor-enabled MANET and IoT environments.
Downloads
References
[1] M. Gupta and K. Jain, “A comprehensive survey of aerial mesh networks (AMN): Characteristics, application, open issues, challenges, and research directions,” Wireless Personal Communications, vol. 138, no. 1, pp. 333–368, 2024.
[2] N. H. Hussein, S. P. Koh, C. T. Yaw, S. K. Tiong, F. Benedict, T. Yusaf, K. Kadirgama, and T. C. Hong, “SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges,” IEEE Access, 2024.
[3] D. Zenati, T. Maimon, and K. Cohen, “RRO: A regularized routing optimization algorithm for enhanced throughput and low latency with efficient complexity,” IEEE Journal on Selected Areas in Communications, 2025.
[4] R. Mohandas, N. Sivapriya, and K. K. Vaigandla, “Detection and mitigation of attacks in MANETs: A comprehensive survey of security techniques,” in Proc. 4th Int. Conf. Ubiquitous Computing and Intelligent Information Systems (ICUIS), 2024, pp. 1478–1485.
[5] S. I. Hamim and A. B. Ab Rahman, “Optimizing wireless sensor networks: A survey of clustering strategies and algorithms,” Int. J. Computer Networks and Applications, vol. 11, no. 5, pp. 673–689, 2024.
[6] T. Machakaire, “Enhancing MANETs for military applications: A comprehensive review of innovations, challenges, and research gaps,” i-Manager’s Journal on Wireless Communication Networks, vol. 13, no. 2, 2025.
[7] V. S. Devi and C. N. Kumar, “Bio-inspired and trust based clustering routing protocol for hybrid MANETs,” Wireless Personal Communications, pp. 1–21, 2024.
[8] A. Behura, A. Kumar, and P. K. Jain, “A multi-objective approach for secure cluster based routing and attack classification in VANETs,”Peer-to-Peer Networking and Applications, vol. 18, no. 3, pp. 1–40, 2025.
[9] K. Mahanta and H. B. Maringanti, “Machine learning approaches for intrusion detection: Enhancing cybersecurity and threat mitigation,” in Cognitive Machine Intelligence. Boca Raton, FL, USA: CRC Press, 2024, pp. 199–218.
[10] K. T. Ahmed, T. K. Godder, and T. H. Al Mahmud, “Assessing MANET routing protocols: Comparative analysis of proactive and reactive approaches with NS3,” Indonesian Journal of Electrical Engineering and Informatics, vol. 12, no. 4, pp. 780–801, 2024.
[11] X. Tao, D. Monaco, A. Sacco, S. Silvestri, and G. Marchetto, “Delay-aware routing in software-defined networks via network tomography and reinforcement learning,” IEEE Transactions on Network Science and Engineering, vol. 11, no. 4, pp. 3383–3397, 2024.
[12] I. M. A. Wikantyasa, T. Ahmad, and R. M. Ijtihadie, “Centralized control approach in managing zone based routing to improve MANET performance,” in Proc. 10th Int. Conf. Smart Computing and Communication (ICSCC), 2024, pp. 571–575.
[13] A. Babaei Goushlavandani, P. Bayat, and G. Ekbatanifard, “Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain,” Cluster Computing, vol. 28, no. 4, p. 226, 2025.
[14] A. Sajithabegam and T. Menakadevi, “An enhanced energy and distance based optimized clustering and dynamic adaptive cluster-based routing in software defined vehicular network,” Telecommunication Systems, vol. 87, no. 4, pp. 917–937, 2024.
[15] A. Aleem and R. Thumma, "Hybrid energy-efficient clustering with reinforcement learning for IoT-WSNs using knapsack and K-means," IEEE Sensors Journal, 2025, doi: 10.1109/JSEN.2025.3582381.
[16] M. K. Hasan, A. Ahmed, and A. H. Sadiq, “Software-defined networking for vehicular ad hoc networks: A survey,” IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2653–2685, 2020, doi:10.1109/COMST.2020.2992099.
[17] X. Wang, L. Duan, and J. Chen, “Latency-aware traffic engineering using SDN-based routing optimization,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1834–1847, 2021, doi:10.1109/TNSM.2021.3050164.
[18] R. Mohandas, N. Sivapriya, and K. K. Vaigandla, “Detection and mitigation of attacks in MANETs: A comprehensive survey,” in Proc. 4th Int. Conf. Ubiquitous Computing and Intelligent Information Systems (ICUIS), 2024, pp. 1478–1485.
[19] S. I. Hamim and A. B. Ab Rahman, “Optimizing wireless sensor networks: A survey of clustering strategies and algorithms,” Int. J. Computer Networks and Applications, vol. 11, no. 5, pp. 673–689, 2024.
[20] T. Machakaire, “Enhancing MANETs for military applications: Innovations, challenges, and research gaps,” i-Manager’s Journal on Wireless Communication Networks, vol. 13, no. 2, pp. 1–15, 2025.
[21] V. S. Devi and C. N. Kumar, “Bio-inspired trust-based clustering routing protocol for hybrid MANETs,” Wireless Personal Communications, vol. 134, no. 2, pp. 1–21, 2024.
[22] A. Behura, A. Kumar, and P. K. Jain, “A multi-objective secure cluster-based routing and attack classification approach for VANETs,” Peer-to-Peer Networking and Applications, vol. 18, no. 3, pp. 1–40, 2025.
[23] K. Mahanta and H. B. Maringanti, “Machine learning approaches for intrusion detection: Enhancing cybersecurity and threat mitigation,” in Cognitive Machine Intelligence. Boca Raton, FL, USA: CRC Press, 2024, pp. 199–218.
[24] K. T. Ahmed, T. K. Godder, and T. H. Al Mahmud, “Comparative analysis of proactive and reactive MANET routing protocols using NS-3,” Indonesian Journal of Electrical Engineering and Informatics, vol. 12, no. 4, pp. 780–801, 2024.
[25] X. Tao, D. Monaco, A. Sacco, S. Silvestri, and G. Marchetto, “Delay-aware routing in software-defined networks using reinforcement learning,” IEEE Transactions on Network Science and Engineering, vol. 11, no. 4, pp. 3383–3397, 2024.
[26] I. M. A. Wikantyasa, T. Ahmad, and R. M. Ijtihadie, “Centralized control approach for zone-based routing in MANETs,” in Proc. 10th Int. Conf. Smart Computing and Communication (ICSCC), 2024, pp. 571–575.
[27] A. Babaei Goushlavandani, P. Bayat, and G. Ekbatanifard, “Detecting attacks in IoT networks using clustering and blockchain-based embedded learning,” Cluster Computing, vol. 28, no. 4, pp. 1–18, 2025.
[28] A. Sajithabegam and T. Menakadevi, “Energy- and distance-based optimized clustering and adaptive routing in software-defined vehicular networks,” Telecommunication Systems, vol. 87, no. 4, pp. 917–937, 2024.
[29] L. Wang, “Trust models in wireless sensor networks for defending denial-of-service attacks: A survey,” Applied Sciences, vol. 15, no. 6, pp. 1–25, 2025.
[30] M. Selvi, R. Karthikeyan, and P. R. Kumar, “Energy-efficient trust-aware secure routing with lightweight encryption for wireless sensor networks,” Scientific Reports, vol. 15, no. 1, pp. 1–18, 2025
[31] Tabassum, Shaikh Zeba, Amairullah Khan Lodhi, M. S. S. Rukmini, and Syed Abdulsattar. "Lifetime and performance enhancement in WSN by energy-buffer residual status of nodes and the multiple mobile sink." TEST Engineering and Management 82 (2020): 3835-3845.
[32] Lodhi, A. K., M. S. S. Rukmini, Syed Abdulsattar, M. Khan, and S. Z. Tabassum. "Design technique for head selection in WSNs to enhance the network performance based on nodes residual status: An extension to EBRS method." International Journal of Advanced Science and Technology 29, no. 5 (2020): 3562-3575.
[33] Krishna, R. K., and Amairullah Khan Lodhi. "Deer Optimization Technique based on Clustering and Routing for Lifetime Enhancement in Wireless Sensor Networks." Mathematical Statistician and Engineering Applications 72, no. 1 (2023): 432-442.
[34] Krishna, R. K., Amairullah Khan Lodhi, Zainulabedin Hasan Mohammed, Mohammed Abdul Matheen, Ahmed Sawy Khaled, and C. Altaf. "Original research article hybrid energy balancer for clustering and routing techniques to enhance the lifetime and energy-efficiency of wireless sensor networks." J Auton Intell 7, no. 2 (2024).
[35] Tazeen, N., Baseer, M.A., Almunif, A., Lodhi, A.K., Khan, I. (2026). Smart Optimization of Renewable Energy Systems Using Artificial Intelligence and Internet of Things Technologies. In: Kumar, A., Ghinea, G., Merugu, S. (eds) Proceedings of the 4th International Conference on Cognitive and Intelligent Computing—Volume 1. ICCIC 2024. Cognitive Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-95-0140-3_30
