{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:53:00Z","timestamp":1775069580936,"version":"3.50.1"},"reference-count":35,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,8,24]]},"abstract":"<jats:p>This paper focuses on achieving high-level security in Mobile Adhoc Networks (MANET) by incorporating Blockchain technology-based Intrusion Detection systems (IDS). The existing works on MANET security focus on either security prevention or detection. Thus, the security level attained by the prior works is unable to cope with the increasing attacks. To resolve this main issue, this research paper introduces Lightweight Blockchain assisted Intrusion Detection System (LB-IDS) which jointly prevents and detects the attacks held on mobile networks. Initially, the network nodes are authenticated by a lightweight Blockchain-based Multi-Factor Authentication (LBMFA) scheme. This procedure prevents the malicious nodes entry to the network. Then, data packets are transmitted through the optimal route which is selected by Multi-Objective Strawberry Optimization (MOSO) algorithm. The collected data packets are fed into IDS which classifies the data into normal and malicious packets. For IDS, we proposed Deep Q-Learning (DQL) algorithm which takes actions by learning the environment. As the mitigation step, the Blockchain is updated with the trust value according to the data packet classification. For such continuous monitoring, K-Mode Clustering (KMC) algorithm is proposed. On the whole, the proposed work improves the network security in MANET through Prevention, Detection, and Mitigation. The results of the presented work attains better security level, packet delivery ratio (PDR), energy efficiency, delay, and detection accuracy.<\/jats:p>","DOI":"10.3233\/jifs-231340","type":"journal-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T10:52:25Z","timestamp":1686912745000},"page":"4261-4276","source":"Crossref","is-referenced-by-count":20,"title":["Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs"],"prefix":"10.1177","volume":"45","author":[{"given":"V.R.","family":"Sugumaran","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, E.G.S Pillay Engineering College, Nagapattinam, Tamilnadu, India"}]},{"given":"A.","family":"Rajaram","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, E.G.S Pillay Engineering College, Nagapattinam, Tamilnadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-231340_ref1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s11277-021-08433-z","article-title":"A Survey of QoS-aware Routing Protocols for the MANET-WSN Convergence Scenarios in IoT Networks","volume":"120","author":"Quy","year":"2021","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-231340_ref2","doi-asserted-by":"crossref","first-page":"3501","DOI":"10.1007\/s11277-022-09722-x","article-title":"Routing Algorithms for MANET-IoT Networks: A Comprehensive Survey","volume":"125","author":"Quy","year":"2022","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-231340_ref3","unstructured":"Mohamed, Hossam El-Din et al. Using MANET in IoT Healthcare Applications: A Survey, (2021)."},{"key":"10.3233\/JIFS-231340_ref4","doi-asserted-by":"crossref","first-page":"215","DOI":"10.3991\/ijim.v14i09.13939","article-title":"A Survey of State-of-the-Art Energy Efficiency Routing Protocols for MANET","volume":"14","author":"Quy","year":"2020","journal-title":"Int. J. Interact. Mob. Technol."},{"key":"10.3233\/JIFS-231340_ref5","doi-asserted-by":"crossref","first-page":"109771","DOI":"10.1016\/j.measurement.2021.109771","article-title":"Tuned classification approach for efficient heterogeneous fault diagnosis in IoT-enabled WSN applications","volume":"183","author":"Lavanya","year":"2021","journal-title":"Measurement"},{"key":"10.3233\/JIFS-231340_ref6","first-page":"1","article-title":"A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks","author":"Vazhuthi","year":"2023","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"10.3233\/JIFS-231340_ref7","doi-asserted-by":"crossref","unstructured":"Mohammed, Salma Saeed et al. A new clustering technique based on replication for MANET routing protocols, TELKOMNIKA Telecommunication Computing Electronics and Control 18 (2020), 3339\u20133345.","DOI":"10.12928\/telkomnika.v18i6.15998"},{"key":"10.3233\/JIFS-231340_ref8","first-page":"1172","article-title":"Acceptability Based Clustering Routing Protocol in MANET, IEEE 9th Annual Information Technology","author":"Saha","year":"2018","journal-title":"Electronics and Mobile Communication Conference (IEMCON)"},{"key":"10.3233\/JIFS-231340_ref9","unstructured":"Salama A.A. et al. Using Biological Techniques for Manet Security Based on Fuzzy Classification. viXra, (2020) n. pag."},{"key":"10.3233\/JIFS-231340_ref10","first-page":"1","article-title":"Fuzzy enhanced secure multicast routing for improving authentication in MANET","author":"Brindha","year":"2018","journal-title":"Cluster Computing"},{"key":"10.3233\/JIFS-231340_ref11","doi-asserted-by":"crossref","first-page":"27","DOI":"10.14445\/22312803\/IJCTT-V49P105","article-title":"Approach for Enhancing Data Availability in MANET","volume":"49","author":"Sainwar","year":"2017","journal-title":"International Journal of Computer Trends and Technology"},{"key":"10.3233\/JIFS-231340_ref12","unstructured":"Praveena, A.K. Rachel and Nithya L.M. Dr. , CLUSTER ENHANCED SECURE AUTHENTICATION SCHEME FOR DATA INTEGRITY IN MANET, (2014)."},{"key":"10.3233\/JIFS-231340_ref13","doi-asserted-by":"crossref","unstructured":"Vasudev S. , IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET, (2015).","DOI":"10.5121\/ijcsa.2015.5504"},{"key":"10.3233\/JIFS-231340_ref14","first-page":"185","article-title":"Probabilistic Key Pre-Distribution for Heterogeneous Mobile Ad Hoc Networks Using Subjective Logic","author":"Ahmadi","year":"2015","journal-title":"IEEE 29th International Conference on Advanced Information Networking and Applications"},{"key":"10.3233\/JIFS-231340_ref15","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s12243-020-00754-7","article-title":"Blockchain and artificial intelligence for network security","volume":"75","author":"Mattos","year":"2020","journal-title":"Annals of Telecommunications"},{"key":"10.3233\/JIFS-231340_ref16","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s12243-020-00754-7","article-title":"Blockchain and artificial intelligence for network security","volume":"75","author":"Mattos","year":"2020","journal-title":"Annals of Telecommunications"},{"key":"10.3233\/JIFS-231340_ref17","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/CCAA.2016.7813776","article-title":"Literature review of routing attacks in MANET","author":"Singh","year":"2016","journal-title":"International Conference on Computing, Communication and Automation (ICCCA)"},{"key":"10.3233\/JIFS-231340_ref18","doi-asserted-by":"crossref","unstructured":"Malik, Kamal and Bhasin Anshu , A survey of mitigation techniques of packet drop attacks in MANET, SSRN Electronic Journal (2022), n. pag.","DOI":"10.2139\/ssrn.4031965"},{"key":"10.3233\/JIFS-231340_ref19","unstructured":"Rao, A. Arjuna et al. Survey of Routing Protocols and Routing Attacks in MANET with Different Security Technique in Cryptography for Network Security, (2018)."},{"key":"10.3233\/JIFS-231340_ref20","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/ICCMC53470.2022.9753829","article-title":"Authentication based Associate Neighbor Selection for Reliable Routing in MANET","author":"Suresh","year":"2022","journal-title":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)"},{"key":"10.3233\/JIFS-231340_ref21","doi-asserted-by":"crossref","first-page":"34276","DOI":"10.1109\/ACCESS.2021.3054891","article-title":"An Active-Routing Authentication Scheme in MANET","volume":"9","author":"Tu","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-231340_ref22","doi-asserted-by":"crossref","unstructured":"Thiyagarajan, Kirubadevi et al. Device Authentication and Secure Routing in MANET for Internet of Things, (2020).","DOI":"10.3233\/APC200159"},{"key":"10.3233\/JIFS-231340_ref23","doi-asserted-by":"crossref","unstructured":"Rajasekaran, Arunkumar et al. Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET, Drones (2022), n. pag.","DOI":"10.3390\/drones6010014"},{"key":"10.3233\/JIFS-231340_ref24","unstructured":"Mukhedkar, M. Moresh , Hybrid PSGWO Algorithm for Trust-Based Secure Routing in MANET, Journal of Networking and Communication Systems (JNACS) (2019), n. pag."},{"issue":"08","key":"10.3233\/JIFS-231340_ref25","doi-asserted-by":"crossref","first-page":"2050129","DOI":"10.1142\/S0218126620501297","article-title":"Implementation of efficient intra-and inter-zone routing for extending network consistency in wireless sensor networks","volume":"29","author":"Prasanth","year":"2020","journal-title":"Journal of Circuits, Systems and Computers"},{"key":"10.3233\/JIFS-231340_ref26","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s11277-021-09359-2","article-title":"An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution","volume":"124","author":"Lakshmi","year":"2022","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-231340_ref27","first-page":"1","article-title":"Enhanced Secure Routing in MANET using Collaborative Machine Learning Approach","author":"Kumar","year":"2022","journal-title":"2000 8th International Conference on Smart Structures and Systems (ICSSS)"},{"key":"10.3233\/JIFS-231340_ref28","unstructured":"Fuzzy based Combined Trust Scheme for Secure Routing in MANET (FCTRS), International Journal of Innovative Technology and Exploring Engineering (2020), n. pag."},{"key":"10.3233\/JIFS-231340_ref29","first-page":"1","article-title":"Mitigation of black hole attacks using firefly and artificial neural network","volume":"34","author":"Rani","year":"1510","journal-title":"Neural Computing and Applications"},{"key":"10.3233\/JIFS-231340_ref30","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1109\/ICESC48915.2020.9155770","article-title":"Blackhole Attack Detection Using Machine Learning Approach on MANET","author":"Pandey","year":"2020","journal-title":"International Conference on Electronics and Sustainable Communication Systems (ICESC)"},{"key":"10.3233\/JIFS-231340_ref31","unstructured":"Revathi P.B. et al. ASSERTIVE SEARCH OPTIMIZATION ROUTING BASED RECURRENT NEURAL NETWORK (RNN) FOR INTRUSION DETECTION IN MANET, (2020)."},{"key":"10.3233\/JIFS-231340_ref32","unstructured":"Doss, R. Chellappa et al. Intrusion Detection in MANET using Neural Networks and ZSBT, (2020)."},{"key":"10.3233\/JIFS-231340_ref33","unstructured":"Suma , L1-Regulated Feature Selection and Deep Learning based Classification for Intrusion Detection System in MANET, (2020)."},{"key":"10.3233\/JIFS-231340_ref34","first-page":"852","article-title":"A Time Interval based Blockchain Model for Detection of Malicious Nodes in MANET Using Network Block Monitoring Node","author":"Narayana","year":"2020","journal-title":"Second International Conference on Inventive Research in Computing Applications (ICIRCA)"},{"key":"10.3233\/JIFS-231340_ref35","first-page":"1","article-title":"Lightweight Blockchain-Based System for Internet of Things Security","volume":"2","author":"Alsaafin","year":"2020","journal-title":"2020 SoutheastCon"}],"updated-by":[{"DOI":"10.3233\/jifs-219434","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"record-id":"65246"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-231340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T05:51:42Z","timestamp":1769665902000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-231340"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,24]]},"references-count":35,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/jifs-231340","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,24]]}}}