1 Introduction

With the rapid increase in wireless networks, in specific Mobile Ad Hoc Networks (MANETs), have gained significant attention in recent years. The MANET allows instantaneous communication with unrestricted mobile nodes in the absence of any predefined infrastructure. Hence, the MANETs are greatly put into practice for emergency communication in military and disaster management. The dynamic mobility paradigm of these networks makes a multi-hop framework, without any centralized maintenance. Unlike any fixed network, the autonomous nodes in MANET are vulnerable to attacks ranging from passive to active, owing to the differing topology. In other words, a MANET faces scalability issue due to their inherent mobility characteristics. On that account, it is difficult to provide a static security solution with single point dependency. Hence, a distributed security solution that can adapt the intrinsic features of MANET should be regulated.

The researches on distributed systems should therefore organize the mobile nodes with a hierarchical security solution to achieve performance guarantee in emergency applications. To manage these uncertain nodes, clustering has been widely applied as a typical hierarchical structure for solving the scalability problem in terms of topology control in MANETs [1,2,3]. A cluster configuration acts as a virtual backbone for routing, certificate management and key management with efficient spatial reuse, for deploying a Public Key Infrastructure (PKI) in MANET over a finite region [4, 5]. With the objective to co-ordinate and collaborate the dynamic nodes for establishing scalable system, the self-organization concept is integrated in the distributed clustering architecture. This eliminates the single point of failure of centralised methods and provides PKI system with self-organization, self- configuration and self-management attribute to adapt the changing network conditions.

Moreover, it is necessary that the distributed solution should provide the required security services and guarantees an invulnerable system, for co-operative information sharing in MANET. This can be practicable only if all the nodes behave in a trustworthy manner. In recent years, trust, has been suggested as an effective mechanism to encounter network challenges for constructing an optimized secured distributed self-organized system [6, 7]. The trust in MANET is the subjective appraisal on the behaviour of a node by its neighbouring nodes. It reflects the belief as well as expectations on the reliability of information sends by any node. Nevertheless, there are several drawbacks in establishing a distributed trust based PKI communication system to cluster the ad hoc networks. Some of them are:

  • The traditional clustering techniques usually assume that the position of nodes is known accurately, which is impractical in MANET.

  • The typical clustering techniques, in which the nodes are grouped depending on the physical position, requires additional computation steps whenever mobility changes. These clustering of uncertain nodes increases the complexities as well as the communication and computation cost for MANET.

  • The clustering methodologies in MANET are generally designed to handle node-valued data and thus cannot manage uncertainty of data, due to the dynamic mobility of nodes.

  • The information sharing among cluster nodes immensely depend on the location of mobile nodes. Therefore, the computation of distance between such nodes is significant for any co-operative communication, which is complicated in conventional clustering techniques.

  • It is hard to establish a complete resilient system with underlying self-organized trust based clustering with frequent link failures.

Therefore, it is clear that the drawbacks of the long-established clustering techniques should be minimized in order to make the PKI based security viable for node to node security deployment. On this pursuit, the proposed research work concentrated in developing a distributed security solution for self-organized PKI framework, which quantifies nodes behaviour in the form of trust.

The most dominant problem in distributed trust computation is how to combine the individual observations from multiple nodes to calculate the trust of any node. The primary objective of the proposed research work is to adapt the active topology with a hybrid trust computation model. This hybrid trust establishment follow the self organizing property that no trusted third party involved in the trust computation among the participating nodes. This is achieved by combining the direct observations and the recommendations obtained from the neighbouring nodes. The direct trust is evaluated and verified using Bayesian theory with beta distribution functions. Whereas, the Dempster–Shafer (DS) evidence Theory combines the multiple observations called recommendations, in order to calculate the indirect trust. Here the observations are considered as evidences which can also be in the form of misbehaviour (variation from expected trust behaviour).

The proposed clustering model guarantees better performance by improving the dynamic re-configurability, scalability and security. An optimal solution for various cluster inherent issues such as: size of the cluster, probability of node being clustered, node residence time, cluster age, cluster overhead and rate of control messages is achieved with the proposed model. A header is elected for each cluster to secure the intra-cluster and inter-cluster communication considering all the network functionalities and node mobility-instigated events. The popular geometric structure, Voronoi diagram, is used in the proposed clustering methodology to overcome the neighbour search problem in finding the number of nearest neighbouring nodes and reducing their expected distance computations [8, 9]. Unlike the conventional circular shape of clustering, a hexagonal shape is presented to partition the MANET area into adjacent and non-overlapping group of nodes with improved spatial reuse [10].

This paper is structured as follows. In Sect. 2, the relevant works on clustering and trust in MANET are described. Section 3 narrates the motivation of the research work. Section 4 the proposed trust management scheme followed by the detailed describtion of proposed clustering methodology with cluster formation and header section in Sect. 5. A misbehaviour verification mechanism to detect and revoke selfish or mischievous nodes is dscribed in Sect. 6. Section 7 presents the mobility adaptiveness of the proposed scheme followed by the system model in Sect. 8. The performance evaluation and simulations is illustrated in Sect. 9 and the concluding remarks appear in Sect. 10.

2 Related Works

Over the past several years there has been a significant amount of researches regarding clustering protocols and their issues in a PKI based MANET security system as done in [1,2,3]. This section considers the literature on MANET where the set of nodes need to form stable clusters to maintain scalability during secure communication and in case of link failures. It is difficult to provide a complete security to mobile networks due to its wireless connectivity, dynamic topology, and infrastructure-less features. Here, a brief outlook on the existing approaches for clustering; Trust and its importance and application of Voronoi diagram in ad hoc networks that form the supporting framework to enhance the security in MANET are specified.

2.1 Clustering Methodologies

Clustering in MANET has become a well-known hierarchical structure to improve the efficiency in a dynamic network. The idea of clustering was first applied for routing in ad hoc networks, for example Cluster Based Routing Protocol (CBRP) proposed [11]. Most of the traditional clustering techniques for wireless networks were based on the metrics such as: dominating set, cost, energy efficiency, load balancing, battery power, weighting factor etc. These clustering metrics set out to be a virtual backbone for routing protocols. In latter year, security based clustering models were proposed as two-hop acknowledgment (2ACK) protocol presented by [12]. To handle the mobility of ad hoc nodes, clusters are formed with respect to their physical position and closeness to the other mobile nodes. Generally, these clustering methods are categorized into Cluster-Head (CH) and non-CH-based clustering methods. In both the methodologies, the groups are reconstructed whenever nodes change their position.

Based on the diameter of the cluster, the protocols in the CH-based clustering can be further classified into one-hop and multi-hop clustering (k-hop) [13]. The Cluster Members (CMs) are assumed to be at one-hop distance from its corresponding CH in the former methodology. Whereas, in k-hop clustering, due to the random movement of nodes, the hop distance between the header node and its members are restricted at k-hop. To the down side, the cluster maintenance is extremely complex and problematic in the k-hop clustering, under high mobility environment.

In a high-density network, these conventional clustering methods probably create a huge number of overlapping clusters that make increase in CH intensity. Consequently, these overlapping groups enclose the same set of cluster members with two or more CHs. Therefore, the mobility of a single node can possibly result in the reconstruction of several clusters. This mobility issue and its consequences in cluster construction and maintenance when applied for MANET is studied in [14]. Recently some clustering algorithms were presented to MANET with location and neighbour based as the primary clustering metrics [15]. A mobility prediction based clustering algorithm was introduced by [16] to solve the relative node movement issue in MANET. The advantages of clustering techniques extended their application in the area of ad hoc networks as presented in [17,18,19,20]. The most common problem in all these existing clustering methodologies is the nearest neighbour search in which the distance metric computation is significant.

2.2 Trust in Clustering

The security solution are introduced to provide the security services and to revoke attackers. Trust, in recent years, is considered as a critical aspect in the design of a secure distributed system. The nodes in the network setup a trust relationship among themselves by evaluating the trust value. Trust-based security schemes have been studied as an attacker detection technique in MANET [21,22,23,24,25].

In a mobility uncertain network like MANET, the degree of uncertainty (rate to which a node cannot predict accurately whether its neighbouring node is trustable or not) is considered to formulate trust as done by [26]. The DS theory has been used in multi agent systems, sensor networks and intrusion detection systems to predict uncertainty [27]. A Cluster based Trust-aware Routing Protocol (CBTRP) to protect forwarded packets from malicious attacks was proposed in [28]. Trust-based security systems are also presented in various network architectures [29]. To overcome the pitfalls of traditional security systems with no expectations, the uncertainty reasoning is considered as probabilistic technique in MANET where mobility adaptive characterization is of greater importance.

2.3 Voronoi Diagrams in Clustering

In most of the clustering methodologies, the distance between the nodes is measured with Euclidean distance calculation during cluster formation as presented by [30]. However, this method works well only for specific distance function [31].

A Voronoi geometric structure has been introduced to handle this distance calculation problem [32]. The Voronoi structure provides information on the nearest neighbour search queries in uncertain plane [33]. To increase the network capacity, spatial reuse techniques have been widely applied for wireless services. This is achieved by dividing the network area into congruent clusters. VD is applied as the space decomposition method to evaluate the distribution probability of distance between nodes in MANET with an assumption that nodes are distributed independently in the polygonal cluster. These remarkable features of Voronoi diagrams increased its contribution in various wireless ad hoc applications as in [34, 35].

A hexagonal geometric distribution of nodes was introduced by [36]. This partitioning technique has shown to increase the network capacity and throughput of the network. It was proven the regular hexagons have flexibility to be partitioned into smaller hexagonal shapes and grouped together to form larger ones as stated by [37]. Withal, these clustering models increases the control overhead of cluster construction, maintenance and cluster head selection. The comparison of different clustering, trust and Voronoi diagrams mentioned in the literature work are given in the Table 1 given below.

Table 1 Comparison of clustering, trust and voronoi mechanisms

3 Motivation of the Proposed Work

As discussed above, the merits and demerits of all the existing mechanisms are compared in order to choose and combine the best suited mechanisms to deploy PKI security framework in MANET. Owing to the absence of topology, providing a fully distributed self-organizing clustering framework security to the mobile nodes in MANET is difficult to achieve. An efficient solution for this hurdle should incorporate the promising features of all those mechanisms; clustering, trust and Voronoi diagram predominantly for managing the PKI framework, which is still unresolved. Such an optimal security solution is proposed in this paper for providing clustering security in MANET by overwhelming the following drawbacks in the existing mechanisms.

  • The traditional clustering techniques face Nearest-Neighbor Search (NNS) problem for which no exact solution is determined yet.

  • Numerous CHs and cluster gateways are needed to cover mobile nodes and inter-cluster connection respectively in a highly overlapping cluster structure, which increases the cluster construction complexities.

  • Whenever the cluster membership changes, the overhead and computation complexities for cluster re-construction get increased in traditional clustering methodologies.

Hence, the objective of this paper is to propose an efficient Hybrid Trust based Mobility Aware Clustering (HTMAC) strategy is proposed as the distributed hierarchical solution for uncertain MANET system, in order to secure and to reduce the complexities in the cluster construction. To partition the uncertain nodes of MANET, the Voronoi based clustering is performed in hexagon structured polygon to reduce region overlapping drawbacks that occur in traditional clustering shapes. In this research work, the self-organized framework is developed, which quantifies node’s behaviour in the form of trust. To encounter challenges in node cooperation and security, hybrid trust computation is calculated in the proposed HTMAC scheme, where cluster heads are selected with high trust degree. The originality of the proposed work combines different metrics for clustering with Voronoi structure and Bayesian-Evidence trust management to predict the distributed security solution.

Each node estimate its neighbour’s trustability based on hybrid trust which combines the direct observations and indirect recommendations. The evidence or direct observations are computed with Bayesian theorem with Beta distribution function. To compute the indirect trust and to cope with the uncertainty, DS theorem is used to provide a statistical measurement of belief degree about a node from multiple neighbours. This hybrid trust computation is proven to adapt the dynamic mobility of MANET nodes.

4 Proposed Trust Management

The distributed trust framework to adapt the active topology and to secure MANET is described in this section.

4.1 Distributed Hybrid Trust Model

Based on a hybrid method (i.e., the aggregation of direct and indirect trust factors or components), the distributed trust is computed. The direct trust is constructed by direct observations on sensing the neighbouring nodes. Whereas, the indirect trust is made by recommendations from the one-hop neighbours. Unlike, in centralized trust calculation, each node computes its own trust value on its neighbour. The trust computation of trustor ‘m’ on trustee ‘\({\text{T}}_{{{\text{m}},{\text{n}}}}\)’, by hybrid mechanism as shown in Fig. 1, is calculated as follows in (1)

$$T_{m,n} = \left( {1 - \mu } \right) T_{m,n}^{D} + \mu T_{m,n}^{ID}$$
(1)
Fig. 1
figure 1

Hybrid trust method

Herein, ‘μ’ is the trust component that ranges from 0 ≤ μ ≤ 1, ‘\({\text{T}}_{{{\text{m}},{\text{n}}}}^{\text{D}}\)’ denotes the direct trust made by ‘\({\text{m}}\)’ on ‘\({\text{n}}\)’ from \(0 \le {\text{T}}_{{{\text{m}},{\text{n}}}}^{\text{D}} \le 1\), and ‘\({\text{T}}_{{{\text{m}},{\text{n}}}}^{\text{ID}}\)’ is the indirect trust made by ‘\({\text{m}}\)’ on ‘\({\text{n}}\)’ from \(0 \le {\text{T}}_{{{\text{m}},{\text{n}}}}^{\text{ID}} \le 1\). The direct trust calculated from the direct observations of ‘\({\text{m}}\)’ on ‘\({\text{n}}\)’ at time ‘\({\text{t}}\)’ is given by the Eq. (2). With the change in the time ‘\({\text{t}}_{1}\)’, the trust may decay, represented by the decay component ‘\(\updelta\)’.

$$T_{m,n}^{D} = \left\{ {\begin{array}{*{20}l} {T_{m,n}^{D} \left( t \right);} \hfill & {if\quad hopcount = = 1} \hfill \\ {\delta T_{m,n}^{D} \left( {t - t_{1} } \right);} \hfill & {otherwise} \hfill \\ \end{array} } \right.$$
(2)

The indirect trust evaluated by ‘\({\text{m}}\)’ on ‘\({\text{n}}\)’ with respect to the recommendation from one-hop neighbour of ‘\({\text{n}}\)’ (node ‘\({\text{p}}\)’), at time ‘\({\text{t}}\)’ is given by the Eq. (3). The trust decays with ‘\({\text{t}}_{1}\)’ when ‘\({\text{m}}\)’ receive incorrect recommendations from the recommender node ‘\({\text{p}}\)’ located within an optimum trust length from ‘\({\text{m}}\)’.

$$T_{m,n}^{ID} = \left\{ {\begin{array}{*{20}l} {T_{p,n} ;} \hfill & {\left| {CR} \right| > 0} \hfill \\ {\delta T_{m,n} \left( {t - t_{1} } \right);} \hfill & {otherwise} \hfill \\ \end{array} } \right.$$
(3)

Here, ‘\({\text{CR}}\)’ is the set of correctly received recommendations from ‘\({\text{n}}\)’s’ one hop neighbour (i.e., ‘\({\text{p}}\)’). When ‘\({\text{CR}} > 0\), \({\text{m}}\)’ employs those one-hop neighbo nodes to assess the trust indirectly. On the other hand, if ‘\({\text{CR}} = 0\), \({\text{m}}\)’ uses its past trust value ‘\({\text{T}}_{{{\text{m}},{\text{n}}}} \left( {{\text{t}} - {\text{t}}_{1} } \right)\)’, since it received no correct recommendations.

4.2 Distributed Trust System with Bayesian and Evidence Theorem

When a CH receives a misbehaviour alert message from any node, it verifies whether the message is attained from an acceptable node. The CH observes the suspected node and requests the 1-hop neighbours of the suspected node to share their independent observations about ‘\({\text{x}}\)’. The observations are considered as evidences that are in the form of number of observed misbehaviours to calculate the evidence trust factor ‘\(\upalpha^{\text{x}} \left( {\text{e}} \right)\)’. The CH also computes the misbehaviour rate in terms of trust factor ‘\(\upalpha^{\text{x}} \left( {\text{d}} \right)\)’ by directly observing the node ‘\({\text{x}}\)’. The trust systems, usually combines the direct observations and the evidences obtained from the 1-hop neighbours to decide the trustworthiness of ‘\({\text{x}}\)’.

The existing trust systems let-down when the observing node itself is untrustworthy, which contributes no true evidences. Such systems might be impracticable especially to inform which observer node is untrustworthy. Hence, the proposed system employs Dempster–Shafer (DS) Evidence Theory (ET) developed by Dempster and revised later by Shafer, where the uncertainty is represented in the form of belief functions. The core idea of the DS theory is that an observer acquires a certain degree of belief on a proposition based on the subjective probability of a related proposition or hypothesis. DS theory aims to provide a convenient mathematical model to combine disparate information obtained from different sources.

4.2.1 Direct Trust Computation: Bayesian Theory

The proposed system assumes that the CH can lookout the key forwarded by the suspicious node and compare them with the original packets to identify the misbehaviour nature (deviation from expected trust behaviour) of the node ‘\({\text{x}}\)’. Therefore, the CH directly calculates the trust factor of its member nodes by Bayesian inference. In which, the unknown probabilities are inferred using observations. The measure of belief about a proposition or hypothesis is stated with well-known Bayes theorem as (4):

$$P\left( {\left. a \right|\text{b} } \right) = \frac{{P\left( {\text{b}|a} \right)P\left( a \right)}}{{P\left( \text{b} \right)}}$$
(4)

where ‘a|b’ is the measure of belief about the proposition ‘a’ with respect to the evidence ‘b’, ‘P(a)’ denotes belief about ‘a’ in the absence of ‘b’. The Baye’s theorem can also be expressed in terms of probability distribution as in (5):

$$P\left( {\left.\Phi \right|data} \right) = \frac{{P\left( {\left. {data} \right|\Phi } \right) P\left(\Phi \right)}}{{P\left( {data} \right)}}$$
(5)

Herein, ‘(Φ|data)’ measures the posterior distribution for the parameter ‘Φ’, ‘P(data|Φ)’ is the sampling density function, ‘P(Φ)’ mentions prior distribution, and ‘P(data)’ is the marginal probability function of data. From the (5), the misbehaviour verification can be modified as:

$$P\left( {\Phi , \left. i \right|j} \right) = \frac{{f\left( {\left. j \right|\Phi , i} \right)P\left( {\Phi , i} \right)}}{{\mathop \smallint \nolimits_{0}^{1} f\left( {\left. j \right|\Phi , i} \right)P\left( {\Phi , i} \right)d\Phi }}$$
(6)

In the Eq. (6), ‘Φ’ is the degree of belief that ranges from 0 ≤ Φ ≤ 1, ‘j’ denotes rate of correctly forwarded data by a node, ‘i’ is the rate of data received by the node, and ‘f(j|Φ, i)’ describes probability function that follows a binomial distribution given by (7):

$$f\left( {\left. j \right|\Phi , i} \right) = \left( {\begin{array}{*{20}c} i \\ j \\ \end{array} } \right)\Phi ^{j} \left( {1 -\Phi } \right)^{i - j}$$
(7)

Beta distribution is used to the Bayesian approach for describing the initial knowledge concerning probabilities of success. Therefore, the prior distribution ‘P(Φ, i)’ can be stated as in (8):

(8)

where \(\upalpha,\upbeta > 0\), is the power function of ‘i’ and ‘j’.

The mean and variance of the beta distribution function is given in (8) and (10):

$$E(\Phi \left| {\alpha ,\beta ) = } \right.\frac{\alpha }{\alpha + \beta }$$
(9)
$$V(\varPhi \left| {\alpha ,\beta ) = } \right.\frac{\alpha \beta }{\alpha + \beta + 1 }*\frac{1}{{\left( {\alpha + \beta } \right)^{2} }}$$
(10)

In the proposed scheme, the trust factor reflects the behaviour fading thereby giving more weights on the misbehaving rate in Bayesian network. The trust factor for misbehaviour verification is given as (11):

$$E(\varPhi \left| {\alpha ,\beta ) = } \right.\frac{\alpha }{{\alpha + \alpha^{x} \beta }}$$
(11)

On considering the transaction history in the Bayesian framework for misbehaviour calculation, the expectation of beta distribution can be written as (12):

$$E(\varPhi \left| {\alpha ,\beta ) } \right. = \frac{{\alpha _{t} }}{{\alpha _{t} + \alpha^{x}_{t} \beta_{t} }}$$
(12)

where \(\alpha _{t} = \alpha _{t - 1} + i _{t - 1}\) and \(\beta _{t} = \beta _{t - 1} + j _{t - 1}\), in which no observations are made at initial stage and so \(\alpha _{0}\), \(\beta _{0}\) = 0. Based on the above deduction, the direct trust factor of the CH is computed on the node ‘\({\text{x}}\)’ can be written as (13):

$$T_{x}^{D} \left( t \right) = \left( {\alpha^{x} \left( d \right)} \right) = E(\varPhi \left| {\alpha ,\beta ) } \right.$$
(13)

4.2.2 Indirect Trust Computation: Evidence Theory

This section describes the trust computation based on the indirect observations from the 1-hop neighbours of the suspicious node ‘x’. As shown in the Fig. 2, the CH requests the 1-hop neighbours of ‘x’ to verify the misbehaviour rate from their independent observations about ‘x’. The observations (also called evidences) obtained from the 1-hop neighbours help in judging the trustworthiness of ‘x’. To perform this, the DS theory is used with uncertainty or ignorance. This theory is based on key element namely belief function which depends on the subjective probabilities that are combined to form indirect evidences.

Fig. 2
figure 2

Indirect trust computation

In DS evidence system, the probabilities that are mutually exclusive and exhaustive are considered as a set and frame of discernment, denoted by ‘\(\Omega\)’. A power set represented by ‘\(2^{\Omega }\)’ includes all basic probabilities of the proposition called focal values ‘Ak’, which is a function of ‘\({\text{m}}\)’ and satisfies the following two conditions:

  1. 1.

    Basic probability value of null set is zero (i.e., \(m\left(\upphi \right) = 0\)).

  2. 2.

    Sum of elements in 2Ω is 1 (i.e., \(\mathop \sum \limits_{{A_{k} \subseteq \varOmega }} m\left( {A_{k} } \right) = 1\)).

Moreover, the belief function can be defined as in (14):

$$B\left( x \right) = \mathop \sum \limits_{{A_{k} \subseteq x}} m\left( {A_{k} } \right)$$
(14)

In the proposed scheme, two behaviour states are designed to the nodes namely, accept and revoke, demonstrated with DS theory. The frame of discernment consists of two possibilities concerning the behaviour level for any random node as Ω = (trust, distrust). This can further represented as: (a) an trust or allowable behaviour state, and (b) a distrust or mischievous state. The mischievous node behaviour is measured and isolated with the proposed verification mechanism that is integrated with the hybrid trust computation. On considering the Fig. 2, the 1-hop neighbours node A, B and C of ‘x’ shares their evidences as a subset of ‘Ω’.

The power set ‘2Ω’ includes three possible forms of hypothesis and they are: hypothesis T = (trust), hypothesis D = (distrust), and hypothesis H = Ω. It represents node ‘x’ which is either in acceptable or mischievous state. The hypothesis H refers the Uncertainty Degree (UD), which can be stated as the degree to which a node is unsuccessful to predict the behavior of its neighbouring node as either trustworthy or untrustworthy. The 1-hop neighbour provides evidences based on their direct observations by sharing its belief over ‘Ω’. For example, if node ‘A’ believes ‘x’ behaves trustworthy, then \({\text{m}}_{\text{A}} \left( {\text{T}} \right) {\text{is }}\upalpha^{\text{x}} \left( {\text{A}} \right)\) and therefore \({\text{m}}_{\text{A}} \left( {\text{D}} \right)\) is 0. The evidence from node A can be stated as in (15):

$$\begin{aligned} m_{A} \left( T \right) & = \alpha^{x} \left( A \right) \\ m_{A} \left( D \right) & = 0 \\ m_{A} \left( H \right) & = 1 - \alpha^{x} \left( A \right) \\ \end{aligned}$$
(15)

Likewise, if node ‘B’ believes ‘x’ as misbehaved, its evidence favours revoke function as (16)

$$\begin{aligned} m_{B} \left( T \right) & = 0 \\ m_{B} \left( D \right) & = \alpha^{x} \left( B \right) \\ m_{B} \left( H \right) & = 1 - \alpha^{x} \left( B \right) \\ \end{aligned}$$
(16)

4.2.3 DS Theory of Combining Evidences

The DS theory combines all the 1-hop neighbours evidences based on the condition that the evidences are independent. Suppose ‘B 1(x)’ and ‘B 1(x)’ are two independent observer’s belief functions over same suspicious node, then the orthogonal sum of these functions is as in (17):

$$B\left( x \right) = B_{1} \left( x \right) + B_{2} \left( x \right) = \frac{{\mathop \sum \nolimits_{{j,k,A_{j} {\bigcap }A_{k} = x}} m_{1} \left( {A_{j} } \right) * m_{2} \left( {A_{k} } \right)}}{{\mathop \sum \nolimits_{{j,k,A_{j} {\bigcap }A_{k} \ne\Phi }} m_{1} \left( {A_{j} } \right) * m_{2} \left( {A_{k} } \right)}}$$
(17)

where ‘\({\text{A}}_{\text{j}} ,{\text{A}}_{\text{k}} \subseteq\Omega\)’. With reference to the Fig. 2, the belief of node ‘A’ and ‘B’ is calculated as in (18), (19) and (20):

$$m_{A} \left( T \right) \oplus m_{B} \left( T \right) = \frac{1}{I}\left[ {m_{A} \left( T \right) m_{B} \left( T \right) + m_{A} \left( T \right)m_{B} \left( H \right) + m_{A} \left( H \right) m_{B} \left( T \right)} \right]$$
(18)
$$m_{A} \left( D \right) \oplus m_{B} \left( D \right) = \frac{1}{I}\left[ {m_{A} \left( D \right) m_{B} \left( D \right) + m_{A} \left( D \right)m_{B} \left( H \right) + m_{A} \left( H \right) m_{B} \left( D \right)} \right]$$
(19)
$$m_{A} \left( H \right) \oplus m_{B} \left( H \right) = \frac{1}{I}\left[ {m_{A} \left( H \right) m_{B} \left( H \right)} \right]$$
(20)

where,

$$\begin{aligned} I & = m_{A} \left( T \right) m_{B} \left( T \right) + m_{A} \left( T \right)m_{B} \left( H \right) + m_{A} \left( H \right) m_{B} \left( H \right) \\ & \quad + m_{A} \left( H \right) m_{B} \left( T \right) + m_{A} \left( H \right) m_{B} \left( D \right) \\ & \quad + m_{A} \left( D \right) m_{B} \left( D \right) + m_{A} \left( D \right)m_{B} \left( H \right) \\ \end{aligned}$$
(21)

Assume, the acceptance rate of probability of node ‘A’ and ‘B’ is 0.8 and 0.7 respectively, and therefore,

$$B\left( T \right) = 0.94$$
(22)
$$B\left( D \right) = 0$$
(23)
$$B\left( H \right) = 0.6$$
(24)

Thus, the acceptable behaviour value from the indirect observation with DS theory is 0.9. In general, the evidence trust factor obtained from the indirect observations can be computed as in the Eq. (25).

$$T_{x}^{ID} \left( t \right) = \left( {\alpha^{x} \left( e \right)} \right) = m_{A} \left( T \right) \oplus m_{B} \left( T \right) \oplus \ldots \ldots \oplus m_{N} \left( T \right)$$
(25)

where nodes A, BN are one hop neighbours.

Eventually, the hybrid trust shall therefore be calculated as in (26):

$$T_{m,n} = \left( {1 - \mu } \right) \left( {\alpha^{x} \left( d \right)} \right) + \mu \left( {\alpha^{x} \left( e \right)} \right)$$
(26)

5 Proposed Clustering Model

This section provides a detailed description of the cluster construction and the header election process presented in the proposed HTMAC scheme.

5.1 Cluster Construction

An efficient clustering scheme is designed with the ad hoc environment to form stable clusters for the underlying network operations. The Voronoi clusters are constructed with nodes N i  = {N 1, N 2 …… N k } with a distance function \(d: D^{m} \times D^{m} \to D\) (m-dimensional space) giving the distance \(d\left( {i.j} \right) \ge 0\) between any nodes \(i,j \in D^{m}\). To adapt the dynamic mobility of MANET, the diameter of the cluster should be flexible and so herein, we use hexagonal shape non-overlapping clusters.

The hexagonal Voronoi technique divides a larger MANET into adjacent, non-overlapping clusters and can be subdivided into regular hexagonal regions. The nodes join to form Voronoi clusters and each cluster consists of Cluster Head (CH) and Cluster Members (CM), as shown in Fig. 3. In the proposed scheme, clusters have exactly one CH elected based on trust value, that is elected as given in following Sect. 5.2. The nodes in the boundary region and within the transmission range of any two CH are considered as gateway nodes, which handles cluster-to-cluster operations.

Fig. 3
figure 3

Clustering model

The CH monitors its neighbour nodes with their trustworthiness, within each cluster. We assume all the nodes communicate through bi-directional channels so that each node can forward as well as hear from its neighbouring nodes. The distance \(D\left( {i,j} \right)\) between nodes in a cluster plays a significant role in determining the MANET performance. For computation, we assume the nodes of the network are independent and randomly distributed in the cluster region. The edges of the Voronoi hexagonal clusters are perpendicular to the line joining a cluster node with another in N i . Considering the radius \(R_{i}\), with respect to a node point a ∊ D can be written as: \(\left( {a,c_{x } } \right) - D\left( {a,c_{y } } \right) = R_{x} + R_{y}\); where{ \(c_{x } ,c_{y }\) }: cluster representatives. If two nodes overlap, the distance \(D\left( {N_{x} , N_{y} } \right) < R_{x} + R_{y}\) and distance \(D\left( {a,c_{x } } \right) - D\left( {a,c_{y } } \right)\) become unreal, where the edges cannot be calculated and represents an empty cluster. The cluster construction is described in the Algorithm 1.

Algorithm 1: Voronoi Hexagonal Clusters

Input: Nodes N i  = {N 1N 2 … … … … N k }

Output: Clusters C i  = {C 1C 2 … … … … C k }

  1. 1.

    for each N n  ∊ N i do;

  2. 2.

    Consider an expected cluster region; \(A_{{R_{i} }} \leftarrow D^{m}\).

  3. 3.

    for each \(N_{m} \in N_{i} {\bigwedge }m \ne n\), do

  4. 4.

    Compute cluster edges; \(E_{n} \left( m \right) \leftarrow {\text{edge of}} N_{n}\)

  5. 5.

    Assign neighbours as \(X_{n} \left( m \right) \leftarrow {\text{neighbouring regions of }}E_{n} \left( m \right)^{ }\)

  6. 6.

    To form non overlapping clusters, execute; \(A_{{R_{i} }} \leftarrow A_{{R_{i} }} - X_{n} \left( m \right)\)

  7. 7.

    end for

  8. 8.

    Verify the expected region lies within the region boundary (RB) of the network region. RB is the region with sides perpendicular to the principle axes of D m of finite region. i.e., if \(A_{{R_{i} }} \subseteq {\text{RB}}\), dos

  9. 9.

    Assign the region as a Voronoi cluster

  10. 10.

    end if

  11. 11.

    end for.

5.2 Cluster Communication and Header Election

In the proposed scheme, each node calculates its own trust function (T f ) and trust rate (T rate ) for clustering and CH election, as given in (27) and (28).

$$T_{f} = w_{1} *T_{m,n}^{D} + w_{2} *T_{m,n}^{ID} + w_{3} *M_{b} + w_{3} *B_{p}$$
(27)

where \(w_{1 } + w_{2} + w_{3} + w_{4} = 1\), is the weight factor

M b : mobility of a node

B p : battery power of a node

T rate is an important parameter that reflects the honesty of any node against network attacks (e.g. Sybil attack, false ID distribution). It is calculated as the ratio of positives experiences (p) received to the total experiences (\(\upeta\)) send by a node, which is given as

$$T_{rate} = \frac{\text{p}}{\upeta}$$
(28)

Initially, each node sends a HELLO message to all the nodes within its transmission range as shown in Fig. 4.

Fig. 4
figure 4

\(HELLO\) message

The proposed scheme indicates two special fields, namely Node Location Identification (NLI) and Neighbour Trust Value (NTV) for mobility and security reinforcement. NLI represents the location, history of any node which moves frequently from one cluster to another, using the GPS information. Likewise, NTV indicates the trust a node keeps on its one-hop neighbours based on direct observations. The HELLO message, as shown in Fig. 4, includes: 4 byte field of sender’s id (S id ) which represents the identity (e.g. IP address) of the sender node, 2 bit field of \(S\) that represent the current status of the sender as undefined, CH or Cluster member (CM) (S is set as 1 if sender node is header, 2 if the sender node is a CM and 0 if undefined), 2 byte field of T f that represents the trust function of the sender node, 1 byte field 1 − HN which represents the number of one hop neighbours of the sender node, 1 byte NLI that represents the location details of the sender node 3 bytes for each one hop neighbouring node address along with the NTV of 1 byte, calculated by the sender node.

On receiving the HELLO message, each one-hop neighbor replies with a REPLY message. The REPLY message includes the receiver node’s ID along with its trust function and neighbor trust value, as shown in Fig. 5.

Fig. 5
figure 5

REPLY message

In addition, all the nodes maintain a h(), as shown in Fig. 6, to record the frequently changing neighboring nodes and their trust values. The neighbor table will be utilized in clustering and routing processes. It includes the ID of the neighbor, status of the neighbor node (which is set to 1 if it is a CH or as 0 if it is a member), its trust component (x), the direct and indirect trust of the node, its trust function and finally a timer to refresh the table at regular time intervals.

Fig. 6
figure 6

Table of Neighbour (ToN)

An efficient cluster header election algorithm that can adapt the random mobility changes is shown in Algorithm 2.

Algorithm 2: Header Election

Initialise S: as a sender node that wants to become cluster head

CH: cluster head

\(T_{{f_{s} }}\): trust function of S

  1. 1.

    S broadcasts ELECT message to all its one hop neighboring nodes with its location, mobility and battery power.

  2. 2.

    Each node that receives the ELECT calculates the trust function \(T_{{f_{s} }}\) and check whether \(T_{{f_{s} }}\) is greater than the trust threshold (T t ) set by the node, below which the node assumes a certain risk in communication.

  3. 3.

    If \(T_{{f_{s} }} > T_{t}\), that node will sign a header certificate ‘HEADER_CERTI’ and sends to S.

  4. 4.

    S waits for a voting time of T vote to hear from all its neighbors.

  5. 5.

    After T vote , S counts the votes it received by computing the T rate .

  6. 6.

    If the T rate is high (i.e., 0.5 ≤ T rate  ≤ 1), \(S\) advertises itself as header and broadcasts a HEADER message to nodes which elected S.

  7. 7.

    An ERROR message is send to S by a node whoses ID is wrongly included.

  8. 8.

    After a time T CH , neighbor nodes sends a signed trust certificate(TC) for S, in response to the HEADER message.

  9. 9.

    Thus S becomes cluster header (CH)and the elector nodes who all signed the certificate becomes the cluster member (CM).

6 Proposed Misbehaviour Verification

The proposed HTMAC scheme evaluates node behaviour in order to detect the misbehaviour due to mischievous and selfish nodes. To attain this goal, the proposed hybrid trust management is accompanied with misbehaviour detection mechanism. The mischievous and selfish behaviour of nodes are distinguished based on its intention over the ad hoc networks. The mischievous state can be categorized as any action intended to harm the MANET system. Such node behaviour shall be characterized by packet dropping, altering control packets, IP spoofing, MAC spoofing or denial of service. Some of the attacks that affect the network adversely on account of the mischievous node are generally classified as: Black hole attack, Wormhole attack, Denial of Service (DoS) attacks, Jamming attack or Rushing attack. Whereas, a selfish node utilizes its battery power, energy, memory space and other resources selfishly for its own benefits. These selfish nodes use all the network services and decline to co-operate with other members in a cluster. Such node behaviour is featured by denial to share and forward the HELLO message, routing and control packets, and delaying the routing packets, for example: Sleep deprivation, DoS attack etc. Any such misbehaviour either with selfish or mischievous node weakens the trust level by providing false recommendations about a trustworthy neighbouring node.

We consider the CH in each cluster as the judging node for misbehaviour verification. The judging node maintains a Rating Table (R T ) which records the direct rating of CH about the cluster members within a cluster. This direct rating is the summation of all the hybrid trust obtained from the \({\text{Table of Neighbour}}\left( {\text{ToN}} \right)\) of the cluster members. Once a CH collects sufficient entries in the \('{\text{ToN}}\)’, it can then proceed with the misbehaviour detection test as given in below to specify the trust values for all the MANET nodes. To adapt the detection scheme, the rating table entries are set as binary value; ‘0’ or ‘1’ for computation simplicity. That is, a node with a trust rating ‘1’ would be indicated as selfish or mischievous node. The proposed HTMAC scheme detects and revokes the misbehaving nodes from the network to minimize their challenges.

For the verification purpose we classified the misbehaviour action into two cases: In the first case; the misbehaving nodes deny packets they received and generate a false trust to deliver to other misbehaving nodes via trustworthy nodes. Such illegitimate performance is considered as selfish node misbehaviour, which can degrade the MANET performance in terms of packet delivery ratio and data availability. In the second case; we assume the mischievous nodes simultaneously execute black hole attack and wormhole attack on legitimate packet, Denial of Service (DoS) attacks, Jamming attack on reliable communication, and Rushing attack on trustable users, in order to corrupt the underlying proposed trust management scheme.

The trust rating of node \(x\) on neighbouring node y; T x,y , is defined by Beta distribution functions (α , \(\beta^{\prime}\)) which is initially set as (1, 1). The distribution function is updated whenever the \({\text{ToN}}\) is revised by the corresponding nodes. Let the observed misbehaviour be m′; with m′ ∊ {0, 1}, and the distribution function as (29) and (30):

$$\alpha^{\prime} = \omega \alpha^{\prime} + m'$$
(29)
$$\beta^{\prime} = \omega \beta^{\prime} + (1 - m')$$
(30)

where ‘ω’: fading factor obtained from the past experiences. The value of ω decays exponentially, so that the suspected and revoked node cannot restore by itself. This makes the proposed HTMAC scheme more advantageous with updated trust values.

To identify and avoid false trust entries due to the selfish or mischevious attacks, we assume node x receives recommendation from node i (i.e., R i,y ). Therefore, T x,y shall be modified as in (31):

$$T_{x,y} = T_{x,y} + \rho R_{i,y}$$
(31)

where ρ is a positive constant. The update is performed for all y node members. On considering the recommendation, R i,y  = (α R β R ) in the Bayesian framework for misbehaviour calculation, the expectation of beta distribution can be written as in (32). We consider the expectation computation as the verification test for false trust entries as:

$$E(Beta\left| {\alpha_{R} ,\beta_{R} ) - E(Beta\left| {\alpha ,\beta ) \ge \tau } \right.} \right.$$
(32)

where τ is the rating threshold. If the rating obtained by solving (32) is positive, R i,y is considered mutually exclusive and so eliminated. Else, R i,y is considered for rating calculations.

7 Mobility Adaptive Clusters

The proposed clustering scheme is designed to achieve a stable cluster organization with minimum communication overhead and complexities, in the presence of dynamic node mobility. This is established by two processes namely \(Node Registration\) and \(Node Resign\), as described below.

7.1 Node Registration

When a node attempts to join a cluster, it should be registered with the other nodes, specially in an unstable topological ad hoc network. The registration procedure is described in Algorithm 3.

Algorithm 3: Node Registration

  1. 1.

    As shown in Fig. 7, CH broadcasts an CLUSTER_ACTIVE beacon to update the status of the existing cluster members as well as to make feasible the cluster for new nodes ‘n’ to join.

    Fig. 7
    figure 7

    Node registration in a cluster

  2. 2.

    At regular intervals, the nodes that sense the CLUSTER_ACTIVE beacon sends a ACTIVE message which includes S id , T f and NLI.

  3. 3.

    The CH verifies each ACTIVE message to validate the trust and location of the CM.

  4. 4.

    When a new node attempts to join the cluster, it sends REG_CLUSTER message to the CH, which includes S id , T f and NLI of the node n.

  5. 5.

    After verifying the T f and location history, if the CH finds the node n as trustable, it sends a \(TEMP\_ JOIN\) message to temporarily join the cluster.

  6. 6.

    CH broadcasts a VOTE message along with the status of newly joined node to all its members, for calculating the NTV for the node n.

  7. 7.

    After a review period, CH calculates the T rate of the node n, with the experiences got from the voters.

  8. 8.

    If the T rate is higher than the T t set by the CH, it sends a TC to the node n to confirm the temporary registration. The status of is node n is broadcast to all the members by the CH.

7.2 Node Resignation

The nodes get deactivated from a cluster due to certain reasons; connection failure, cluster disconnection or self departure. If a node voluntarily departs from the cluster, it announces its resignation by broadcasting a RESIGN message to all the nodes before leaving the cluster. At periodic interval, each node in a cluster has to send a ACTIVE message in response to the CLUSTER_ACTIVE message broadcast by the CH. When the CH doesn’t receive ACTIVE message from any node for certain waiting time (say t w ), the CH broadcasts a SENSE message to all its members. For example, if the silent node is node m, CH sends SENSE m to the members. The cluster members who senses the presence of the deactivated node either due to connection failure or cluster disconnection, sends a DETECT message to the CH. The CH verifies the DETECT message and tries to establish a connection with the silent node ans asks for its ACTIVE message. The CH ratify the node m if the node replies or instead, CH assumes node m as damaged and broadcast a RESIGN m message to all the members.

8 System Model

This section describes the system model which includes the cluster model, security model and the attack model presented in the proposed HTMAC scheme in order to deploy PKI based framework in MANET.

8.1 Cluster Model

In the proposed clustering method, we divide the entire operational region into different equi-sized hexagonal clusters of area A = πr 2, where r is the radius of the cluster region. The number of hexagonal clusters in a region is given by (33)

$$N_{c} = 3d^{2} + 3d + 1$$
(33)

where d is the degree of rings. The N c value is obtained from the mathematical induction in the network coverage model used. For example, in Fig. 8 the total number of clusters ‘N c ’ is 7 with degree of rings surrounded ‘d’ = 1.

Fig. 8
figure 8

Network region with \(N_{c}\) is 7 and d = 1

We assume the random nodes are distributed in a homogeneous passion fashion of density \(d_{p}\), over the hexagonally clustered network region of area A. The average number of nodes (N) in any cluster depends on the area of the cluster and the density of distribution, which is given as

$$N = \pi r^{2} d_{p}$$
(34)

Assume the rate of node joining the cluster be λ j and the rate of node resigning from the cluster be λ r . Therefore, the probability that a node is registered in a cluster can be λ j /(λ j  + λ r ) and the probability that it is resigned from a cluster is λ r /(λ j  + λ r ). In a hexagonal cluster region, the average number of active nodes is given as j /(λ j  + λ r ). Moreover, the rate of all nodes registered in any cluster be R j and the rate of all nodes resigned from the cluster be R r , given in (35) and (36).

$$R_{j} = \lambda_{j} *N*\lambda_{r} /\left( {\lambda_{j} + \lambda_{r} } \right)$$
(35)
$$R_{r} = \lambda_{r} *N*\lambda_{j} /\left( {\lambda_{j} + \lambda_{r} } \right)$$
(36)

In the mobility adaptive cluster, the nodes can move dynamically within a cluster and across the boundary region. Let μ be the rate of mobility of a node when there is one cluster and \(\upmu_{m}\) be the mobility rate of the node for N c clusters. Then, the mobility rate across the boundary is given by

$$\upmu_{m} = \left( {2d + 1} \right)\upmu *K$$
(37)

where factor K represents the intra-cluster mobility of the nodes for whom the mobility across the boundary is not applicable.

8.2 Security Model

The proposed clustering model provides assurance for security using hard security and soft security approaches using trust, as mentioned below.

  • Authentication: When a node joins a cluster, the node’s identity is authenticated based on the trust function calculated by hybrid trust mechanism. Source authentication is ensured during the verification process and TC is signed to authenticate the source node. Location authentication is performed by authenticating the NLI, especially in a mobile network like MANET.

  • Integrity: To preserve the integrity, a node calculates its T rate with the positive responses it obtained during cluster construction.

  • Access control: The unauthorized use of resources is prevented using trust within each cluster. The services and resources allocated to the network are accessed by trustable node alone in the proposed cluster model.

  • Communication risk: The proposed system indicates the presence of untrustworthy nodes that dissimate false communication. The CH validates each of its member’s trust with T t , below which it presumes certain communication risks and revoke those dishonest nodes from further cluster applications.

  • Cluster availability: An CLUSTER_ACTIVE beacon at regular intervals make the cluster to work promptly so that no service denial for trustworthy nodes is assured.

8.3 Attack Model

We consider certain attacks in MANET as follows.

  • Dropping attack interrupts the service availability of the nodes. The attackers deactivate nodes from their cluster by making a connection failure or cluster disconnection. The SENSE beacon send by the CH during node missing, re-establishes the connection with the deactivated node, after verification processes.

  • Fake recommendation attack falsely sends recommendations to include an untrustworthy node in the cluster functionalities. The hybrid trust calculation we used, measures the direct trust from direct observations, in addition to the indirect trust obtained in the form of recommendations. This direct trust value gives higher importance for analyzing the trustworthiness of any node, which degrades fake recommendations.

  • Sybil attack can break down the security, when a node in the network claims multiple identities. The integrity check of the node gets rid of such attackers, where the honesty of that node is proved. Also the NLI records the location history of each node, which aids the CH to detect the attacker node with multiple identities and same location particulars.

  • Impersonation attack can be an identity spoofing, node cloning, reply or an unauthorized access. However, the attackers fail to pass the source and location authentication as well as integrity check.

With the misbehaviour verification mechanism in the proposed HTMAC scheme, the attacks that generates due to the selfish node and the mischievous node are detected and isolated from the MANET. This includes: Black hole attack, Wormhole attack, Denial of Service (DoS) attacks, Jamming attack, Rushing attack and Sleep deprivation

9 Simulation Results

The performance of the HTMAC scheme was tested through a series of simulation experiments on the QualNet simulator with IDE: Visual studio 2013, programming language: VC ++ and SDK: NSC_XE-NETSIMCAP (Network Simulation and Capture). For comparison, we also simulated three other clustering algorithms, namely the CBRP [11], 2ACK [12] and CBTRP [28]. A MANET environment is configured with many mobile devices (mobile phones, laptops, etc.) which move randomly to communicate among their neighbours in the network of transmission range 250. The probability of selecting new node as CH is set to 0.3. The nodes follow a Random Way Point (RWP) approach presented by the authors [38, 39], where the speed and the direction of each nodes are chosen randomly and independently.

When simulation starts, each node chooses one location randomly as the destination within terrain of 1000 m the simulation field. The nodes then moves with constant velocity chosen uniformly and randomly in a range \(\left[ {0,{\text{V}}_{\text{m}} } \right]\); where ‘\({\text{V}}_{\text{m}}\)’ is the maximum range of velocity that a node travels. When the node reaches its destination, it halts for a time period, referred as halt time ‘\({\text{T}}_{\text{halt}}\)’. If \({\text{T}}_{\text{halt}} = 0\), a continuous mobility is experienced. However, when the ‘\({\text{T}}_{\text{halt}}\)’ expires, the nodes again move randomly in the simulation field. The performance of the proposed THCM is evaluated by varying the two parameters ‘\({\text{V}}_{\text{m}}\)’ and ‘\({\text{T}}_{\text{halt}}\)’ for topology alterations (i.e., if ‘\({\text{V}}_{\text{m}}\)’ is less and ‘\({\text{T}}_{\text{halt}}\)’ is high, a relatively stable topology is achieved, while a highly dynamic topology is obtained if ‘\({\text{V}}_{\text{m}}\)’ is high and ‘\({\text{T}}_{\text{halt}}\)’ is less). Each data point in the simulation was run 10 times to compute the average value.

9.1 Mobility Adaptiveness

The two main properties of cluster that reflect the efficient adaptiveness of any clustering algorithm in MANET namely size of a cluster and the probability of node in a cluster subjected to node mobility are considered in this section. Figures 9 and 10 depict the mean cluster size and the node probability in a cluster with respect to the node velocity respectively.

Fig. 9
figure 9

Mean cluster size with node velocity

Fig. 10
figure 10

Node probability with mobility

9.1.1 Mean Cluster Size with Mobility

In MANET, with the increase in the node density, the size of cluster increases. The performance of any clustering scheme may not be worthy if the cluster size is larger. This is because the load to manage the traffic by the cluster head within each cluster gets accumulated. Therefore, the size of the clusters should be optimized in order to avoid high cluster maintenance overhead and to achieve desirable clustering scalability.

The Fig. 9 shows the influence of mobility on mean cluster size for the existing and the proposed clustering schemes. The results show how each clustering methodologies adapt the dynamic mobility of mobile nodes. When the node velocity is increased form 5 to 25 m/s, the size of the cluster diminishes from 25 to 7 numbers of nodes to aid from to benefit from more suitable routing. Whereas, the existing schemes shows a higher cluster size of 41–20 for 2ACK, 36–14 for CBRP and 35–14 for CBTRP, in the presence of different node speed of MANET nodes. It is precise that all the schemes maintain larger cluster size for lower mobility and reduced cluster size over greater mobility. The proposed HTMAC clustering scheme, therefore, forms an appropriate number of clusters of optimal size with efficient mobility adaptive property.

9.1.2 Probability of Node with Mobility

The Fig. 10 illustrates the probability of node in a cluster with respect to the effect of mobility. It is clearly shown from the simulation result that the nodes remain higher probability in any cluster at larger mobility. The probability that nodes belong to any cluster greatly depends on the system parameters. Specifically, in the proposed HTMAC scheme the nodes remain clustered with probability greater than or equal to 0.9 at higher node mobility of 25 m/s. On the other hand, the existing methods such as 2ACK, CBRP and CBTRP show a lower probability range of 0.57, 0.75 and 0.77 respectively, on comparing with the HTMAC scheme. This higher probability of HTMAC scheme is achieved because of the partitioning technique that is carried out with Voronoi geometric structure in the proposed method. Thus result clearly shows the desirable property of HTMAC that the mobile nodes remains clustered with high probability even at high node velocity.

9.2 Effectiveness in Stability

The stability of the proposed HTMAC scheme is measured in terms of the node residence time and the cluster age.

9.2.1 Residence Time with Mobility

Figure 11 represents the time each node survive in a cluster, referred as the residence time (R T ), in regard to the node velocity. The node residence time varies with the probability of node in the cluster. The clustering effort shall be creditable with longer residence time and higher probability of node being clustered. The residence time for the existing schemes is lesser than the proposed HTMAC scheme. The R T value of the 2ACK methodology falls to 2 s from 17 s at greater node speed of 25 m/s. While considering the other two existing schemes; CBTRP and CBRP, the R T value varies from 20 to 8 s and 25 to 10 s respectively, when the node mobility is increased from 5 to 25 m/s. Compared to these existing schemes, the proposed HTMAC shows an improved value of R T from 27 to 15 s for the node velocity 5–25 m/s. This betterment in the residence time of HTMAC is due to the least probability that a node is clustered at that rate. By increasing the pause time further, the R T value of the proposed scheme shall be increased significantly.

Fig. 11
figure 11

Average node residence time with node velocity

9.2.2 Cluster Duration with Mobility

Figure 12 demonstrates the cluster age of the proposed HTMAC scheme against different existing schemes. The cluster age is measured as the amount of time a cluster is active at each instant of time. Thus it represents the lifetime of each clusters in MANET. For a stable cluster topology, the cluster duration should be relatively longer. As shown in the Fig. 12, the cluster age in general, decreases with the increase in the node velocity. Compared to the other three existing schemes, the proposed HTMAC scheme has longer cluster age even at higher rate of node mobility. The cluster continues for time duration of maximum 42 s at higher node mobility to form stable clusters in the proposed HTMAC scheme. Whereas, for the existing schemes the cluster remains only for the maximum duration of 9 s in 2ACK, 30 s in CBTRP and 36 s in CBRP. This advantage in the cluster duration for the proposed scheme is due to the lower rate of link failures and link activations, which is around a maximum of 3 per sec at higher node velocity. This is because of the mobility adaptiveness of the nodes in the cluster construction which makes the members in the cluster stay connected to the CH for a longer time. Whereas, the clusters in the existing clustering schemes are less stable against the node speed. This shows the inability of those methodologies to adapt the mobility characteristics of the nodes in cluster formation.

Fig. 12
figure 12

Cluster duration with node velocity

This also shows the advantages of the HTMAC scheme in the reaffiliation rate. The reaffiliation rate represents the rate of change of CH and its affiliation per unit time with respect to the mobility speed of the node. The simulation result in Fig. 12 also reveals that the existing schemes have relatively higher reaffiliation rate than the HTMAC scheme. This is due to the reduced CH duration at increasing node speed in the existing schemes. On the other hand, in HTMAC scheme each node selects the node which remains its CH for a longer time, and so it reduces the probability of reaffiliation.

9.3 Efficiency of HTMAC Algorithm

The efficiency of the proposed HTMAC algorithm is measured in terms of performance parameters such as cluster overhead, message rate, and security as depicted in the Figs. 13, 14 and 15.

Fig. 13
figure 13

Cluster overhead with misbehaving nodes

Fig. 14
figure 14

Control message overhead

Fig. 15
figure 15

Security rate

9.3.1 Cluster Overhead with Misbehaving Nodes

The cluster overhead includes the overhead in cluster organization and maintenance for the ad hoc network. The efficiency of any clustering algorithm depends on its ability to provide stable clusters. Figure 13 shows that the overhead caused by the proposed HTMAC scheme is minimum compared to the existing schemes.

The cluster overhead rises gradually from 0.056% with 5% misbehaving nodes to 0.072%, when 25% of the nodes are misbehaving. Whereas, the existing schemes CBRP and CBTRP shows more or less an equal overhead percentage, which is around 0.07% for higher percentage of misbehaving nodes. While considering the 2ACK scheme, the 0.08% when the ratio of misbehaving nodes is 25%. This rise in the overhead is due to the flat architecture of the existing schemes which floods the cluster registration and header election packets throughout the network.

9.3.2 Rate of Control Message with Mobility

In the Fig. 14, the efficiency of the clustering techniques measured in terms of the rate of control messages per node are plotted. This measurement includes the number of cluster updates that are processed whenever cluster membership changes. It is noted that the proposed HTMAC scheme protects the mobile nodes from the frequent topology changes with respect to the increased mobility. Initially, the message rate increases with the change in topology in the proposed scheme. It is clearly shown in the Fig. 14 that the mobility adaptive clustering property of the HTMAC scheme diminishes the message rate by decreasing the size of clusters as node velocity increases beyond 10 m/s. For higher mobility, the rate of message attains an optimal value of 0.06, which is very much lower than the existing schemes.

9.3.3 Security Level with Mobility

The Fig. 15 shows the rate of security, which is considered as another significant parameter for measuring the algorithm’s efficiency. The Hackman tool along with the Qualnet simulator verifies different attackers at regular time interval. The BCCC (Block Cipher Cryptography Class) interface is used to link with Hackman tool using Visual Studio IDE enabled with Hackman SDK. The Hackman tool the simulator continuously tries to break the data packets and counts the number of packets that are hacked successfully for total number of packets and then calculates the security level in %. The proposed HTMAC scheme demonstrates a higher rate of security to different attacks (as mentioned in Sect. 8.3) compared to other three existing schemes. A maximum of 97% security is achieved for minimum node mobility. The security level drops slightly to 93% when the velocity of node reaches the maximum of 25 m/s. On the other hand, the existing schemes such as 2ACK, CBRP and CBTRP possess a lower security level of 69, 73 and 74% respectively, for higher percentage of misbehaving nodes.

10 Conclusion

In this paper we have addressed hybrid trust based mobility aware clustering scheme(HTMAC) for mobile ad-hoc networks. In contrast to the existing techniques, we have proposed HTMAC to efficiently partition the network into non-overlapping clusters of trustable nodes. Our approach enables each node to establish trustability with other interacting nodes, in each hexagonal cluster, with minimal complexities in header selection and maintenance. In addition, the HTMAC scheme takes the advantage of trust mechanism to detect and revoke the selfish and mischievous nodes from the network in a short period of time. Simulation results shows that our scheme achieves beneficial over (a) mobility adaptiveness (b) cluster stability with reduced overhead of clustering and cluster maintenance (c) control message rate and security. Therefore, our scheme, HTMAC, can be adequately adopted for infrastructural less and dynamic wireless ad-hoc networks.