{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T21:47:00Z","timestamp":1773870420139,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T00:00:00Z","timestamp":1708646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T00:00:00Z","timestamp":1708646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Flying Ad hoc Networks have emerged as a promising technology for number of real-time applications. However, the flexible and unstructured characteristics of these networks make them vulnerable to security threats posed by malicious nodes, such as denial of service attacks, node impersonation, and information breaches. Another major issue is the consideration of those nodes being unable to prove their trustworthiness due to factors like hardware or software failure, or by link interruptions, during the processing of detection of false nodes in the network. The existing mechanisms encompassing encryption, authentication, and intrusion detection highlight limitations to secure real-time applications and services due to the high speed of flying nodes and the absence of fixed network structures. To overcome these constraints, this research paper incorporates a novel framework for evaluating and improving the security of network by introducing an innovative cluster-based approach. Moreover, it presents a fuzzy model that dynamically estimates the trust levels of both individual nodes and clusters, by assigning weight to the parameters to address vulnerabilities. Additionally, a trust reconfiguration mechanism is further proposed to address the issue of nodes unable to substantiate their trust by providing them with additional chances based on the collective trust from previous evaluations. Further, the paper incorporates a dynamic reputation system to proficiently identify and separate malicious and selfish nodes from the network. Simulation results indicate a significant improvement in performance metrics, with a considerable reduction in delay and drop ratio by 41.46% and 36.37%, respectively, while the sufficient rise of 54.71% and 46.05% in throughput and coverage, respectively, comparing with the considered state-of-art.<\/jats:p>","DOI":"10.1007\/s40747-024-01348-9","type":"journal-article","created":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T04:37:01Z","timestamp":1708663021000},"page":"3743-3762","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["SCFS-securing flying ad hoc network using cluster-based trusted fuzzy scheme"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8707-3872","authenticated-orcid":false,"given":"Shikha","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Neetu","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"issue":"2","key":"1348_CR1","first-page":"13","volume":"9","author":"I Bekmezci","year":"2016","unstructured":"Bekmezci I, Senturk E, Turker T (2016) Security issues in Flying Ad-hoc Networks (FANETs). J Aeronaut Space Technol 9(2):13\u201321","journal-title":"J Aeronaut Space Technol"},{"key":"1348_CR2","doi-asserted-by":"publisher","first-page":"59891","DOI":"10.1109\/ACCESS.2018.2875739","volume":"6","author":"MY Arafat","year":"2018","unstructured":"Arafat MY, Moh S (2018) Location-aided delay tolerant routing protocol in UAV networks for post-disaster operation. IEEE Access 6:59891\u201359906. https:\/\/doi.org\/10.1109\/ACCESS.2018.2875739","journal-title":"IEEE Access"},{"key":"1348_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2019.106877","volume":"163","author":"A Chriki","year":"2019","unstructured":"Chriki A, Touati Snoussi H, Kamoun F (2019) FANET: communication, mobility models and security issues. Comput Netw 163:1\u201317. https:\/\/doi.org\/10.1016\/j.comnet.2019.106877","journal-title":"Comput Netw"},{"issue":"7","key":"1348_CR4","first-page":"276","volume":"12","author":"D Gupta","year":"2021","unstructured":"Gupta D, Rathi R, Gupta S, Sharma N (2021) Multiple relay nodes selection scheme using exit time variation for efficient data dissemination in VANET. Int J Adv Comput Sci Appl 12(7):276\u2013286","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"1","key":"1348_CR5","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/MCOM.2017.1700323","volume":"56","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Sangaiah AK, Wang T (2018) Adaptive communication protocols in Flying Ad Hoc Network. IEEE Commun Mag 56(1):136\u2013142","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"1348_CR6","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/MWC.2018.1700152","volume":"25","author":"Z Kaleem","year":"2018","unstructured":"Kaleem Z, Rehmani MH (2018) Amateur drone monitoring: state-of-the-art architectures, key enabling technologies, and future research directions. IEEE Wirel Commun 25(2):150\u2013159","journal-title":"IEEE Wirel Commun"},{"issue":"17","key":"1348_CR7","doi-asserted-by":"publisher","first-page":"ew18(17)\u2013ew16","DOI":"10.4108\/eai.10-4-2018.155884","volume":"5","author":"IA Sumra","year":"2018","unstructured":"Sumra IA, Sellappan P, Abdullah A, Ali A (2018) Security issues and challenges in MANET\u2013VANET\u2013FANET: a survey. EAI Endorsed Trans Energy Web 5(17):ew18(17)-ew16. https:\/\/doi.org\/10.4108\/eai.10-4-2018.155884","journal-title":"EAI Endorsed Trans Energy Web"},{"key":"1348_CR8","doi-asserted-by":"publisher","unstructured":"Lateef S, Rizwan M, Hassan MA (2022) Security threats in Flying Ad Hoc Network (FANET). In: Ouaissa M, Khan IU, Ouaissa M, Boulouard Z, Hussain Shah SB (eds) Computational intelligence for unmanned aerial vehicles communication networks. Studies in computational intelligence, vol 1033. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-97113-7_5","DOI":"10.1007\/978-3-030-97113-7_5"},{"key":"1348_CR9","doi-asserted-by":"publisher","unstructured":"Goumiri S, Riahla MA, Hamadouche M (2022) Security issues in self-organized Ad-Hoc networks (MANET, VANET, and FANET): a survey. In: Lejdel B, Clementini E, Alarabi L (eds) Artificial intelligence and its applications. AIAP 2021. Lecture notes in networks and systems, vol 413, pp 312\u2013324. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-96311-8_29","DOI":"10.1007\/978-3-030-96311-8_29"},{"key":"1348_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102894","volume":"133","author":"KY Tsao","year":"2022","unstructured":"Tsao KY, Girdler T, Vassilakis VG (2022) A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Netw 133:102894. https:\/\/doi.org\/10.1016\/j.adhoc.2022.102894","journal-title":"Ad Hoc Netw"},{"key":"1348_CR11","doi-asserted-by":"publisher","first-page":"3173","DOI":"10.1007\/s11277-020-07523-8","volume":"114","author":"K Singh","year":"2020","unstructured":"Singh K, Verma AK (2020) TBCS: a trust based clustering scheme for secure communication in flying ad-hoc networks. Wirel Pers Commun 114:3173\u20133196","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"1348_CR12","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1007\/s11277-021-08515-y","volume":"120","author":"M Namdev","year":"2021","unstructured":"Namdev M, Goyal S, Agarwal R (2021) An optimized communication scheme for energy efficient and secure flying ad-hoc network (FANET). Wirel Pers Commun 120(2):1291\u20131312","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"1348_CR13","doi-asserted-by":"publisher","first-page":"1979","DOI":"10.1007\/s12083-022-01330-7","volume":"15","author":"X Du","year":"2022","unstructured":"Du X, Li Y, Zhou S, Zhou Y (2022) ATS-LIA: a lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks. Peer-to-peer Netw Appl 15(4):1979\u20131993","journal-title":"Peer-to-peer Netw Appl"},{"key":"1348_CR14","doi-asserted-by":"publisher","unstructured":"Buksh W, Guo Y, Iqbal S, Qureshi KN, Lloret J (2022) Trust-oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks. Trans Emerg Telecommun Technol, e4489. https:\/\/doi.org\/10.1002\/ett.4489","DOI":"10.1002\/ett.4489"},{"issue":"2","key":"1348_CR15","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1002\/acs.3529","volume":"37","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Song X, Sun X, Stojanovic V (2023) Hybrid-driven-based fuzzy secure filtering for nonlinear parabolic partial differential equation systems with cyber attacks. Int J Adapt Control Signal Process 37(2):380\u2013398. https:\/\/doi.org\/10.1002\/acs.3529","journal-title":"Int J Adapt Control Signal Process"},{"key":"1348_CR16","doi-asserted-by":"publisher","first-page":"8997","DOI":"10.1007\/s11063-023-11189-1","volume":"55","author":"X Song","year":"2023","unstructured":"Song X, Wu N, Song S, Stojanovic V (2023) Switching-like event-triggered state estimation for reaction\u2013diffusion neural networks against DoS attacks. Neural Process Lett 55:8997\u20139018. https:\/\/doi.org\/10.1007\/s11063-023-11189-1","journal-title":"Neural Process Lett"},{"key":"1348_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126498","volume":"550","author":"X Song","year":"2023","unstructured":"Song X, Wu N, Song S, Zhang Y, Stojanovic V (2023) Bipartite synchronization for cooperative\u2013competitive neural networks with reaction\u2013diffusion terms via dual event-triggered mechanism. Neurocomputing 550:126498. https:\/\/doi.org\/10.1016\/j.neucom.2023.126498","journal-title":"Neurocomputing"},{"key":"1348_CR18","doi-asserted-by":"publisher","unstructured":"Zhang G, Wy Q, Cui M, Zang R (2017) Securing UAV communications via trajectory optimization. In: GLOBECOM IEEE global communications conference, Singapore, 04\u201308 December 2017. https:\/\/doi.org\/10.1109\/GLOCOM.2017.8254971","DOI":"10.1109\/GLOCOM.2017.8254971"},{"key":"1348_CR19","doi-asserted-by":"crossref","unstructured":"Gupta S, Sharma N, Rathi R, Gupta D (2021) Dual detection procedure to secure Flying Ad Hoc Networks: a trust-based framework. In: Saha SK, Pang PS, Bhattacharyya D (eds) Smart technologies in data science and communication. Lecture notes in networks and systems, vol 210, pp 83\u201395. Springer, Berlin","DOI":"10.1007\/978-981-16-1773-7_7"},{"key":"1348_CR20","doi-asserted-by":"publisher","unstructured":"Pandey A, Shukla PK, Agarwal R (2020) Cuttlefish optimization based clustering approach (COCA) to improve the quality of service (QoS) for Flying Ad-Hoc Network (FANET). In: 2020 2nd international conference on data, engineering and applications (IDEA), February 2020, Bhopal, India. https:\/\/doi.org\/10.1109\/IDEA49133.2020.9170667","DOI":"10.1109\/IDEA49133.2020.9170667"},{"issue":"1","key":"1348_CR21","doi-asserted-by":"publisher","first-page":"253","DOI":"10.35940\/ijitee.A4010.119119","volume":"9","author":"D Sharma","year":"2019","unstructured":"Sharma D, Jameel A (2019) Enhancement of security in Flying Ad-hoc Network using a trust based routing mechanism. Int J Innov Technol Exploring Eng 9(1):253\u2013257","journal-title":"Int J Innov Technol Exploring Eng"},{"issue":"6","key":"1348_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.3517","volume":"31","author":"K Singh","year":"2018","unstructured":"Singh K, Verma AK (2018) A fuzzy-based trust model for Flying Ad-hoc Network (FANETs). Int J Commun Syst 31(6):1\u201317","journal-title":"Int J Commun Syst"},{"key":"1348_CR23","doi-asserted-by":"publisher","unstructured":"Singh K Verma AK, Aggarwal P (2018) Analysis of various trust computation methods: a step towards secure FANETs, 1st edn. Computer and Cyber Security, Taylor & Francis, November 2018, chap 7, pp 171\u2013193. https:\/\/doi.org\/10.1201\/9780429424878","DOI":"10.1201\/9780429424878"},{"key":"1348_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/7475357","volume":"2018","author":"E Barka","year":"2018","unstructured":"Barka E, Kerrache CA, Lagraa N, Lakas A, Calafate CT, Cano JC (2018) UNION: a trust model distinguishing intentional and unintentional misbehavior in inter-UAV communication. J Adv Transp 2018:1\u201312. https:\/\/doi.org\/10.1155\/2018\/7475357","journal-title":"J Adv Transp"},{"issue":"8","key":"1348_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s18082683","volume":"18","author":"E Barka","year":"2018","unstructured":"Barka E, Kerrache CA, Hussain R, Lagraa N, Lakas A, Bouk S (2018) A trusted lightweight communication strategy for flying named data networking. Sensors 18(8):1\u201318. https:\/\/doi.org\/10.3390\/s18082683","journal-title":"Sensors"},{"issue":"3","key":"1348_CR26","first-page":"1","volume":"11","author":"A Zardari","year":"2018","unstructured":"Zardari A, He Z, Zhu J, Mohammadani N, Pathan K, Hussain M, Memon M (2018) A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet 11(3):1\u201317","journal-title":"Future Internet"},{"key":"1348_CR27","doi-asserted-by":"publisher","unstructured":"Condomines J, Zang R, Larrieu N (2019) Network intrusion detection system for UAV Ad-hoc communication from methodology design to real test validation. Ad Hoc Netw 90:1\u201314, 101759. https:\/\/doi.org\/10.1016\/j.adhoc.2018.09.004","DOI":"10.1016\/j.adhoc.2018.09.004"},{"key":"1348_CR28","doi-asserted-by":"publisher","first-page":"36807","DOI":"10.1109\/ACCESS.2020.2974381","volume":"8","author":"MA Khan","year":"2020","unstructured":"Khan MA, Ullah I, Nisar S, Noor F, Qureshi MI, Khanzada FU, Amin NU (2020) An efficient and provably secure certificateless key-encapsulated signcryption scheme for Flying Ad-hoc Network. IEEE Access 8:36807\u201336828","journal-title":"IEEE Access"},{"key":"1348_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/8405879","volume":"2017","author":"C Zhou","year":"2017","unstructured":"Zhou C, Zhao Z, Zhou W, Mei Y (2017) Certificateless key-insulated generalized signcryption scheme without bilinear pairings. Secur Commun Netw 2017:1\u201317. https:\/\/doi.org\/10.1155\/2017\/8405879","journal-title":"Secur Commun Netw"},{"key":"1348_CR30","doi-asserted-by":"publisher","first-page":"3721","DOI":"10.1109\/ACCESS.2017.2684128","volume":"5","author":"J Won","year":"2017","unstructured":"Won J, Seo SH, Bertino E (2017) Certificateless cryptographic protocols for efficient drone-based smart city applications. IEEE Access 5:3721\u20133749","journal-title":"IEEE Access"},{"issue":"2","key":"1348_CR31","first-page":"101","volume":"9","author":"SH Seo","year":"2016","unstructured":"Seo SH, Won J, Bertino E (2016) pCLSC-TKEM: a pairing-free certificateless signcryption-tag key encapsulation mechanism for a privacy preserving IoT. Trans Data Priv ACM 9(2):101\u2013130","journal-title":"Trans Data Priv ACM"},{"key":"1348_CR32","unstructured":"Liu W, Strangio MA, Wang S (2015) Efficient certificateless signcryption tag-KEMs for resource constrained devices. Ph.D. dissertation, Cornell Univ., Ithaca, NY, USA. arXiv1510.01446"},{"issue":"10","key":"1348_CR33","first-page":"1211","volume":"33","author":"V Reddy","year":"2021","unstructured":"Reddy V, Babu AR, Gayathri NB (2021) Efficient and secure identity based strong key-insulated signature scheme without pairings. J King Saud Univ Comput Inform Sci 33(10):1211\u20131218","journal-title":"J King Saud Univ Comput Inform Sci"},{"issue":"1","key":"1348_CR34","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/JSYST.2018.2890126","volume":"14","author":"H Xiong","year":"2019","unstructured":"Xiong H, Mei Q, Zhao Y (2019) Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Sys J 14(1):310\u2013320","journal-title":"IEEE Sys J"},{"key":"1348_CR35","doi-asserted-by":"publisher","unstructured":"Bacanin N, Arnaut U, Zivkovic M, Bezdan T, Rashid TA (2021) Energy efficient clustering in wireless sensor networks by opposition-based initialization bat algorithm. In: Computer networks and inventive communication technologies: proceedings of fourth ICCNCT 2021, pp 1\u201316. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-16-3728-5_1","DOI":"10.1007\/978-981-16-3728-5_1"},{"issue":"4","key":"1348_CR36","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.3390\/s22041618","volume":"22","author":"P Mohan","year":"2022","unstructured":"Mohan P, Subramani N, Alotaibi Y, Alghamdi S, Khalaf OI, Ulaganathan S (2022) Improved metaheuristics-based clustering with multihop routing protocol for underwater wireless sensor networks. Sensors 22(4):1618. https:\/\/doi.org\/10.3390\/s22041618","journal-title":"Sensors"},{"key":"1348_CR37","doi-asserted-by":"publisher","unstructured":"Bacanin N, Antonijevic M, Bezdan T, Zivkovic M, Rashid TA (2022) Wireless sensor networks localization by improved whale optimization algorithm. In: 2nd international conference on artificial intelligence: advances and applications: ICAIAA 2021, pp 769\u2013783, February 2022, Singapore. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-981-16-6332-1_62","DOI":"10.1007\/978-981-16-6332-1_62"},{"key":"1348_CR38","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1007\/s00500-017-2815-0","volume":"23","author":"PS Mann","year":"2019","unstructured":"Mann PS, Singh S (2019) Improved metaheuristic-based energy-efficient clustering protocol with optimal base station location in wireless sensor networks. Soft Comput 23:1021\u20131037. https:\/\/doi.org\/10.1007\/s00500-017-2815-0","journal-title":"Soft Comput"},{"key":"1348_CR39","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.engappai.2016.10.014","volume":"57","author":"PS Mann","year":"2017","unstructured":"Mann PS, Singh S (2017) Improved metaheuristic based energy-efficient clustering protocol for wireless sensor networks. Eng Appl Artif Intell 57:142\u2013152","journal-title":"Eng Appl Artif Intell"},{"key":"1348_CR40","doi-asserted-by":"publisher","unstructured":"Zivkovic M, Bacanin N, Tuba E, Strumberger I, Bezdan T, Tuba M (2020) Wireless sensor networks life time optimization based on the improved firefly algorithm. In: International wireless communications and mobile computing (IWCMC), pp 1176\u20131181, June, 2020. IEEE, New York. https:\/\/doi.org\/10.1109\/IWCMC48107.2020.9148087","DOI":"10.1109\/IWCMC48107.2020.9148087"},{"key":"1348_CR41","doi-asserted-by":"publisher","unstructured":"Singh K, Verma A (2018) A trust model for effective cooperation in Flying Ad Hoc networks using genetic algorithm. In: 2018 international conference on communication and signal processing (ICCSP), November 2018, Chennai, India. https:\/\/doi.org\/10.1109\/ICCSP.2018.8524558","DOI":"10.1109\/ICCSP.2018.8524558"},{"key":"1348_CR42","doi-asserted-by":"publisher","unstructured":"Chen R, Guo J (2014) Dynamic hierarchical trust management of mobile groups and its application to misbehaving node detection. In: 2014 IEEE 28th international conference on advanced information networking and applications, May 2014, Victoria, BC, Canada. https:\/\/doi.org\/10.1109\/AINA.2014.13","DOI":"10.1109\/AINA.2014.13"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01348-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01348-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01348-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T18:17:55Z","timestamp":1715883475000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01348-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,23]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1348"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01348-9","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,23]]},"assertion":[{"value":"3 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors do not have any conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}