A Novel and Enhanced Routing Protocol for Large Scale Disruption Tolerant Mobile Ad hoc Networks


  • Hamid Ali Abed Al-Asadi
  • Huda A. Ahmed
  • Abdul-Hadi Al-Hassani
  • N A M Ahmad Hambali




MANET, Hole Attacks, Trust Based Routing, Evolutionary, Routing Protocol


Because of the lack of fixed infrastructures, the existence of open media and diverse network topologies, internetworking networks and mobile ad hoc networks (MANET’s), the design of MANET protocols is complicated. In this paper, we propose an evolutionary trust mechanism imitating cognitive processes that uses sensitive information to avoid routing. Moreover, we propose an Enhanced Self-organizing Cooperation and Trust based (ESCT) Protocol, where the mobile nodes share self-reliance and interpret information from a cognitive point of view. Each node develops its information dynamically to eradicate malicious entities. The most attractive attribute of the proposed ESCT protocol, even if domestic attackers know how it operates, is to prevent infringements. In this paper, the efficiency of the proposed ESCT protocol is assessed for different routing disturbances and varying number of attackers. The results of a simulation show that, the proposed ESCT protocol supports diverse network platforms and provides an efficient routing method for MANET routers. The proposed ESCT protocol displays increased throughput, reduction in end-to-end delay and increase in packet delivery ratio when compared to the peers that were taken for comparison.


A. Bujari, L. De Giovanni, C. E. Palazzi, & D. Ronzani, “Location dynamic tabu routing protocol for MANETs,” Mobile Networks and Applications, vol. 26, pp. 2055–2065, 2021. https://doi.org/10.1007/s11036-021-01744-2.

V. Kulathumani, M. Nakagawa, & A. Arora, “EZ-AG: structure-free data aggregation in MANETs using push-assisted self-repelling random walks,” Journal of Internet Services and Applications, vol. 9, article number 5, 2018. https://doi.org/10.1186/s13174-018-0077-4.

A. P. Patil, K. Rajanikant, Sabarish, Madan, & Surabi, “Enabling self-organizing behavior in MANETs: An experimental study,” In: Satapathy S., Avadhani P., Udgata S., Lakshminarayana S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Advances in Intelligent Systems and Computing, vol 248. Springer, Cham. https://doi.org/10.1007/978-3-319-03107-1_48.

A. K. Gautam, & R. Kumar, “A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks,” SN Applied Sciences, vol. 3, issue 1, article 50, 2021. https://doi.org/10.1007/s42452-020-04089-9.

M. Carlos-Mancilla, E. López-Mellado, & M. Siller, “Wireless sensor networks formation: approaches and techniques,” Journal of Sensors, 1–18, 2016. https://doi.org/10.1155/2016/2081902.

S. Shukry, “Stable routing and energy-conserved data transmission over wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, article number 36, 2021. https://doi.org/10.1186/s13638-021-01925-3.

V. K. Quy, V. H. Nam, D. M. Linh, N. T. Ban, & N. D. Han, “A survey of QoS-aware routing protocols for the MANET-WSN convergence scenarios in IoT networks,” Wireless Personal Communications, vol. 120, issue 1, pp. 49–62. 2021. https://doi.org/10.1007/s11277-021-08433-z.

I. Banerjee, M. Warnier, & F. M. T. Brazier, “Self-organizing topology for energy-efficient ad-hoc communication networks of mobile devices,” Complex Adaptive Systems Modeling, vol. 8, article number 7, 2020. https://doi.org/10.1186/s40294-020-00073-7.

Y. Fang, X. Zhu, & Y. Zhang, “Securing resource-constrained wireless ad hoc networks,” IEEE Wireless Communications, vol. 16, issue 2, pp. 24–30, 2009. https://doi.org/10.1109/MWC.2009.4907556.

M. Noura, M. Atiquzzaman, & M. Gaedke, “Interoperability in internet of things: Taxonomies and open challenges,” Mobile Networks and Applications, vol. 24, pp. 796–809, 2019. https://doi.org/10.1007/s11036-018-1089-9.

C. Ran, S. Yan, L. Huang, & L. Zhang, “An improved AODV routing security algorithm based on blockchain technology in ad hoc network,” EURASIP Journal on Wireless Communications and Networking, 2021, 1, 2021. https://doi.org/10.1186/s13638-021-01938-y.

M. A. Al-Absi, A. A. Al-Absi, M. Sain, & H. Lee, “Moving ad hoc networks – A comparative study,” Sustainability, vol. 13, issue 11, 6187, 2021. https://doi.org/10.3390/su13116187.

C. Ran, S. Yan, L. Huang, & L. Zhang, “An improved AODV routing security algorithm based on blockchain technology in ad hoc network,” EURASIP Journal on Wireless Communications and Networking, 2021, 1, 2021. https://doi.org/10.1186/s13638-021-01938-y.

M. Shukla, B. K. Joshi, & U. Singh, “Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET,” Wireless Personal Communications, vol. 121, pp. 503–526, 2021. https://doi.org/10.1007/s11277-021-08647-1.

H. Xu, H. Si, H. Zhang, L. Zhang, Y. Leng, J. Wang, & D. Li, “Trust-based probabilistic broadcast scheme for mobile ad hoc networks,” IEEE Access, vol. 8, pp. 21380–21392, 2020. https://doi.org/10.1109/ACCESS.2020.2969447.

B. U. I. Khan, F. Anwar, R. F. Olanrewaju, B. R. Pampori, & R. N. Mir, “A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic mobile adhoc networks,” IEEE Access, 1–1, 2020. https://doi.org/10.1109/ACCESS.2020.3006043.

R. Skaggs-Schellenberg, N. Wang, & D. Wright, “Performance evaluation and analysis of proactive and reactive MANET protocols at varied speeds,” Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), 2020, pp. 1-5. https://doi.org/10.1109/CCWC47524.2020.9031233.

X. Zhang, C. Lyu, Z. Shi, D. Li, N. N. Xiong, & C. Chi, “Reliable multiservice delivery in fog-enabled VANETs: Integrated misbehavior detection and tolerance,” IEEE Access, vol. 7, pp. 95762-95778, 2019. https://doi.org/10.1109/ACCESS.2019.2928365.

M. Karthigha, L. Latha, & K. Sripriyan, “A comprehensive survey of routing attacks in wireless mobile ad hoc networks,” Proceedings of the 2020 International Conference on Inventive Computation Technologies (ICICT), 2020, pp. 396-402, https://doi.org/10.1109/ICICT48043.2020.9112588.

M. Mohamed Musthafa, K. Vanitha, A. M. J. M. Zubair Rahman, & K. Anitha, “An efficient approach to identify selfish node in MANET,” Proceedings of the 2020 International Conference on Computer Communication and Informatics (ICCCI), 2020, pp. 1-3. https://doi.org/10.1109/ICCCI48352.2020.9104076.

T. Chen, L. Wu, F. Wu, & S. Zhong, “Stimulating cooperation in vehicular ad hoc networks: A coalitional game theoretic approach,” IEEE Transactions on Vehicular Technology, vol. 60, issue 2, pp. 566–579, 2011. https://doi.org/10.1109/TVT.2010.2093587.

S. Daud, S. M. M. Gilani, M. S. Riaz, & A. Kabir, “DSDV and AODV protocols performance in internet of things environment,” Proceedings of the 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), 2019, pp. 466-470. https://doi.org/10.1109/ICCSN.2019.8905256.

S. Behera, & G. Das, “Dynamic routing and spectrum allocation in elastic optical networks with minimal disruption,” Proceedings of the 2020 National Conference on Communications (NCC), 2020, pp. 1-5. https://doi.org/10.1109/NCC48643.2020.9056071

A. Ilavendhan, & K. Saruladha, “Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs,” ICT Express, vol. 4, issue 1, pp. 46–50, 2018. https://doi.org/10.1016/j.icte.2017.12.002.

R. F. Olanrewaju, B. ul Islam Khan, F. Anwar, R. N. Mir, M. Yaacob, & T. Mehraj, “Bayesian signaling game based efficient security model for MANETs,” Advances in Biochemical Engineering/Biotechnology, Lecture Notes in Networks and Systems series, Publisher: Springer, Cham, pp. 1106–1122, 2019. https://doi.org/10.1007/978-3-030-12385-7_75.

L. Guaya-Delgado, E. Pallarès-Segarra, A. M. Mezher, & J. Forné, “A novel dynamic reputation-based source routing protocol for mobile ad hoc networks,” EURASIP Journal on Wireless Communications and Networking, 2019, 1, 2019. https://doi.org/10.1186/s13638-019-1375-7.

A. A. Mahamune, & M. M. Chandane, “An efficient trust-based routing scheme against malicious communication in MANET,” International Journal of Wireless Information Networks, vol. 28, issue 3, pp. 344–361, 2021. https://doi.org/10.1007/s10776-021-00523-w.

V. S. Janani, & M. S. K. Manikandan, “Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks,” EURASIP Journal on Wireless Communications and Networking, 2018, Article number: 25, 2018. https://doi.org/10.1186/s13638-017-1001-5.




How to Cite

Al-Asadi, H. A. A., Ahmed, H. A., Al-Hassani, A.-H., & Ahmad Hambali, N. A. M. (2022). A Novel and Enhanced Routing Protocol for Large Scale Disruption Tolerant Mobile Ad hoc Networks. International Journal of Computing, 21(3), 325-332. https://doi.org/10.47839/ijc.21.3.2688