{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T16:12:09Z","timestamp":1770307929468,"version":"3.49.0"},"reference-count":35,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T00:00:00Z","timestamp":1575504000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,2,6]]},"abstract":"<jats:p>The nature of mobile nodes are affects the performance of MANET. The main requirement of secured MANET is use of secure protocols which ensure the network integrity, confidentiality, availability and authenticity. Recently, the secure protocols have been used to resists such attacks in MANET. Spoofing attack is one of them, which affects network by an attacker program successfully acts on another node behalf by impersonating data. In this paper, we investigate the spoofing attack problems in MANET and propose an optimal intrusion detection system (OIDS) using hybrid optimization algorithm (HOA) named as OIDS-HOA. Here, we propose an improved whale optimization (IWO) algorithm for efficient cluster formation and a cluster chain weight metrics approach (CCWW) for trust degree computation of each mobile node. Moreover, the intrusion detection system (IDS) is done by the condition check algorithm and the intrusion response action (IRA) is performed by average route trust with three different responses are: No Punishment (NP), Route Change (RC) and Route Isolate (RI). The simulation results show that the effectiveness of proposed OIDS-HOA scheme in terms of packet delivery fraction, end-end-delay, energy consumption, overhead and packet drop ratio.<\/jats:p>","DOI":"10.3233\/jifs-182881","type":"journal-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T11:21:36Z","timestamp":1575631296000},"page":"1691-1704","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":6,"title":["Detection and prevention of spoofing attacks in mobile adhoc networks using hybrid optimization algorithm"],"prefix":"10.1177","volume":"38","author":[{"given":"P.","family":"Visalakshi","sequence":"first","affiliation":[{"name":"Department of CSE, SRM University, Kattankulathur, Chennai, India"}]},{"given":"S.","family":"Prabakaran","sequence":"additional","affiliation":[{"name":"Department of CSE, SRM University, Kattankulathur, Chennai, India"}]}],"member":"179","published-online":{"date-parts":[[2019,12,5]]},"reference":[{"issue":"1","key":"e_1_3_1_2_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/TSMCA.2004.838486","article-title":"Energy-efficient deployment of intelligent mobile sensor networks","volume":"35","author":"Heo N.","year":"2005","unstructured":"HeoN., VarshneyP., Energy-efficient deployment of intelligent mobile sensor networks, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 35(1) (2005), 78\u201392.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans"},{"issue":"3","key":"e_1_3_1_3_2","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1109\/JSAC.2004.842555","article-title":"An efficient key predistribution scheme for ad hoc network security","volume":"23","author":"Ramkumar M.","year":"2005","unstructured":"RamkumarM., MemonN., An efficient key predistribution scheme for ad hoc network security, IEEE Journal on Selected Areas in Communications 23(3) (2005), 611\u2013621.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"e_1_3_1_4_2","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1109\/JSAC.2004.837356","article-title":"Pricing for enabling forwarding in self-configuring ad hoc networks","volume":"23","author":"Ileri O.","year":"2005","unstructured":"IleriO., MauS.-C., MandayamN., Pricing for enabling forwarding in self-configuring ad hoc networks, IEEE Journal on Selected Areas in Communications 23(1) (2005), 151\u2013162.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"e_1_3_1_5_2","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/JSAC.2004.842539","article-title":"PACMAN: Passive autoconfiguration for mobile ad hoc networks","volume":"23","author":"Weniger K.","year":"2005","unstructured":"WenigerK., PACMAN: Passive autoconfiguration for mobile ad hoc networks, IEEE Journal on Selected Areas in Communications 23(3) (2005), 507\u2013519.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"e_1_3_1_6_2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MNET.2006.1580914","article-title":"Quality of service for packet telephony over mobile ad hoc networks","volume":"20","author":"Giacomazzi P.","year":"2006","unstructured":"GiacomazziP., MusumeciL., CaizzoneG., VerticaleG., LiggieriG., ProiettiA., SabatiniS., Quality of service for packet telephony over mobile ad hoc networks, IEEE Network 20(1) (2006), 12\u201320.","journal-title":"IEEE Network"},{"issue":"2","key":"e_1_3_1_7_2","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1109\/JSAC.2005.861391","article-title":"Security and Cooperation in clustered mobile ad hoc networks with centralized supervision","volume":"24","author":"Vassilaras S.","year":"2006","unstructured":"VassilarasS., VogiatzisD., YovanofG., Security and Cooperation in clustered mobile ad hoc networks with centralized supervision, IEEE Journal on Selected Areas in Communications 24(2) (2006), 329\u2013342.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"e_1_3_1_8_2","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JSAC.2005.861394","article-title":"Wormhole attacks in wireless networks","volume":"24","author":"Hu Y.-C.","year":"2006","unstructured":"HuY.-C., PerrigA., JohnsonD., Wormhole attacks in wireless networks, IEEE Journal on Selected Areas in Communications 24(2) (2006), 370\u2013380.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"e_1_3_1_9_2","doi-asserted-by":"crossref","first-page":"1320","DOI":"10.1109\/TVT.2006.877707","article-title":"H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks","volume":"55","author":"Lou W.","year":"2006","unstructured":"LouW., KwonY., H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks, IEEE Transactions on Vehicular Technology 55(4) (2006), 1320\u20131330.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.165"},{"issue":"8","key":"e_1_3_1_11_2","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1109\/TMC.2007.1021","article-title":"An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks","volume":"6","author":"Kong J.","year":"2007","unstructured":"KongJ., HongX., GerlaM., An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks, IEEE Transactions on Mobile Computin 6(8) (2007), 888\u2013902.","journal-title":"IEEE Transactions on Mobile Computin"},{"issue":"14","key":"e_1_3_1_12_2","doi-asserted-by":"crossref","first-page":"2484","DOI":"10.1002\/sec.1484","article-title":"Intrusion detection in mobile ad hoc networks: Techniques, systems, and future challenges","volume":"9","author":"Kumar S.","year":"2016","unstructured":"KumarS., DuttaK., Intrusion detection in mobile ad hoc networks: Techniques, systems, and future challenges, Security and Communication Networks 9(14) (2016), 2484\u20132556.","journal-title":"Security and Communication Networks"},{"issue":"3","key":"e_1_3_1_13_2","article-title":"A survey on attacks and defense metrics of routing mechanism in mobile ad hoc networks","volume":"2","author":"P K.","year":"2011","unstructured":"PK., A survey on attacks and defense metrics of routing mechanism in mobile ad hoc networks, International Journal of Advanced Computer Science and Applications 2(3) (2011).","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"2","key":"e_1_3_1_14_2","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/LCOMM.2008.071384","article-title":"Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks","volume":"12","author":"Nam J.","year":"2008","unstructured":"NamJ., PaikJ., KimU.M., WonD., Security enhancement to a password-authenticated group key exchange protocol for mobile Ad-hoc networks, IEEE Communications Letters 12(2) (2008), 127\u2013129.","journal-title":"IEEE Communications Letters"},{"issue":"5","key":"e_1_3_1_15_2","doi-asserted-by":"crossref","first-page":"2406","DOI":"10.1109\/TVT.2008.2005990","article-title":"Protection against mobile tracing through motion-MIX for mobile wireless nodes","volume":"58","author":"Kong J.","year":"2009","unstructured":"KongJ., HongX., WuD., Protection against mobile tracing through motion-MIX for mobile wireless nodes, IEEE Transactions on Vehicular Technology 58(5) (2009), 2406\u20132416.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"3","key":"e_1_3_1_16_2","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TDSC.2010.11","article-title":"A policy enforcing mechanism for trusted ad hoc networks","volume":"8","author":"Xu G.","year":"2011","unstructured":"XuG., BorceaC., IftodeL., A policy enforcing mechanism for trusted ad hoc networks, IEEE Transactions on Dependable and Secure Computing 8(3) (2011), 321\u2013336.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"e_1_3_1_17_2","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/JSYST.2010.2095910","article-title":"FACES: Friend-based ad hoc routing using challenges to establish security in MANETs systems","volume":"5","author":"Dhurandher S.","year":"2011","unstructured":"DhurandherS., ObaidatM., VermaK., GuptaP., DhurandherP., FACES: Friend-based ad hoc routing using challenges to establish security in MANETs systems, IEEE Systems Journal 5(2) (2011), 176\u2013188.","journal-title":"IEEE Systems Journal"},{"issue":"8","key":"e_1_3_1_18_2","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/TMC.2010.210","article-title":"On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks","volume":"10","author":"Boppana R.","year":"2011","unstructured":"BoppanaR., SuX., On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks, IEEE Transactions on Mobile Computing 10(8) (2011), 1162\u20131174.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"e_1_3_1_19_2","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1049\/iet-ifs.2010.0160","article-title":"Light-weight trust-based routing protocol for mobile ad hoc networks","volume":"6","author":"Marchang N.","year":"2012","unstructured":"MarchangN., DattaR., Light-weight trust-based routing protocol for mobile ad hoc networks, IET Information Security 6(2) (2012), 77.","journal-title":"IET Information Security"},{"issue":"3","key":"e_1_3_1_20_2","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1109\/TIE.2012.2196010","article-title":"EAACK\u2014 a secure intrusion-detection system for MANETs","volume":"60","author":"Shakshuki E.","year":"2013","unstructured":"ShakshukiE., KangN., SheltamiT., EAACK\u2014 a secure intrusion-detection system for MANETs, IEEE Transactions on Industrial Electronics 60(3) (2013), 1089\u20131098.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"2","key":"e_1_3_1_21_2","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/JSYST.2012.2221912","article-title":"Lightweight sybil attack detection in MANETs","volume":"7","author":"Abbas S.","year":"2013","unstructured":"AbbasS., MerabtiM., Llewellyn-JonesD., KifayatK., Lightweight sybil attack detection in MANETs, IEEE Systems Journal 7(2) (2013), 236\u2013248.","journal-title":"IEEE Systems Journal"},{"issue":"2","key":"e_1_3_1_22_2","doi-asserted-by":"crossref","first-page":"1684","DOI":"10.1109\/TVT.2016.2557808","article-title":"A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks","volume":"66","author":"Marchang N.","year":"2017","unstructured":"MarchangN., DattaR., DasS., A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks, IEEE Transactions on Vehicular Technology 66(2) (2017), 1684\u20131695.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"2","key":"e_1_3_1_23_2","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1016\/j.jestch.2015.11.001","article-title":"Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation","volume":"19","author":"Subba B.","year":"2016","unstructured":"SubbaB., BiswasS., KarmakarS., Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation, Engineering Science and Technology, an International Journal 19(2) (2016), 782\u2013799.","journal-title":"Engineering Science and Technology, an International Journal"},{"key":"e_1_3_1_24_2","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1016\/j.future.2016.07.010","article-title":"A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks","volume":"68","author":"Khan F.","year":"2017","unstructured":"KhanF., ImranM., AbbasH., DuradM., A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks, Future Generation Computer Systems 68 (2017), 416\u2013427.","journal-title":"Future Generation Computer Systems"},{"key":"e_1_3_1_25_2","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.compeleceng.2016.12.002","article-title":"Dynamic anomaly detection using cross layer security in MANET","volume":"59","author":"Usha G.","year":"2017","unstructured":"UshaG., Rajesh BabuM. and KumarS., Dynamic anomaly detection using cross layer security in MANET, Computers & Electrical Engineering 59 (2017), 231\u2013241.","journal-title":"Computers & Electrical Engineering"},{"key":"e_1_3_1_26_2","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.cose.2018.02.018","article-title":"An efficient intrusion detection in resource-constrained mobile ad-hoc networks","volume":"76","author":"Bouhaddi M.","year":"2018","unstructured":"BouhaddiM., RadjefM., AdiK., An efficient intrusion detection in resource-constrained mobile ad-hoc networks, Computers & Security 76 (2018), 156\u2013177.","journal-title":"Computers & Security"},{"key":"e_1_3_1_27_2","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.jisa.2017.08.001","article-title":"Design of a proficient hybrid protocol for efficient route discovery and secure data transmission in CEAACK MANETs","volume":"36","author":"Sathiamoorthy J.","year":"2017","unstructured":"SathiamoorthyJ., RamakrishnanB. and U.M, Design of a proficient hybrid protocol for efficient route discovery and secure data transmission in CEAACK MANETs, Journal of Information Security and Applications 36 (2017), 43\u201358.","journal-title":"Journal of Information Security and Applications"},{"key":"e_1_3_1_28_2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.cose.2017.04.012","article-title":"An enhanced optimization based algorithm for intrusion detection in SCADA network","volume":"70","year":"2017","unstructured":"S.S and P.D, An enhanced optimization based algorithm for intrusion detection in SCADA network, Computers & Security 70 (2017), 16\u201326.","journal-title":"Computers & Security"},{"key":"e_1_3_1_29_2","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.jpdc.2018.07.013","article-title":"A fog-based privacy-preserving approach for distributed signature-based intrusion detection","volume":"122","author":"Wang Y.","year":"2018","unstructured":"WangY., MengW., LiW., LiJ., LiuW., XiangY., A fog-based privacy-preserving approach for distributed signature-based intrusion detection, Journal of Parallel and Distributed Computing 122 (2018), 26\u201335.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2835166"},{"key":"e_1_3_1_31_2","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.cose.2018.01.003","article-title":"Multi-source fusion-based security detection method for heterogeneous networks","volume":"74","author":"Wu H.","year":"2018","unstructured":"WuH., WangZ., Multi-source fusion-based security detection method for heterogeneous networks, Computers & Security 74 (2018), 55\u201370.","journal-title":"Computers & Security"},{"issue":"2","key":"e_1_3_1_32_2","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1007\/s11277-016-3229-5","article-title":"A novel honeypot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in MANET","volume":"90","author":"Rajesh Babu M.","year":"2016","unstructured":"Rajesh BabuM. and UshaG., A novel honeypot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in MANET, Wireless Personal Communications 90(2) (2016), 831\u2013845.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"e_1_3_1_33_2","article-title":"Whale optimization algorithm for optimal sizing of renewable resources for loss reduction in distribution systems","volume":"4","author":"Reddy P.","year":"2017","unstructured":"ReddyP., ReddyV., ManoharT., Whale optimization algorithm for optimal sizing of renewable resources for loss reduction in distribution systems, Renewables: Wind, Water, and Solar 4(1) (2017).","journal-title":"Renewables: Wind, Water, and Solar"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2017.2752709"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/iecon.2017.8217242"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/icphys.2018.8387666"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-182881","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-182881","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-182881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T12:22:20Z","timestamp":1770121340000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-182881"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,5]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2,6]]}},"alternative-id":["10.3233\/JIFS-182881"],"URL":"https:\/\/doi.org\/10.3233\/jifs-182881","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,5]]}}}