Research Article | ![]()
STAGNet-COpt: A Spatio-Temporal Attention Graph Network with Cluster-based Optimized Trust Routing for MANET Security
Author(s): Manbir Kaur Brar1,3*, Sukhpreet Singh2, and Sajjan Singh3
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 14, Issue 1
Publisher : FOREX Publication
Published : 30 March 2026
e-ISSN : 2347-470X
Page(s) : 225-241
Abstract
Mobile Ad Hoc Networks are highly dynamic and infrastructure-less environments that are inherently vulnerable to a range of routing-based attacks. To address the limitations of traditional defense mechanisms, this paper proposes STAGNet-COpt, a novel spatio-temporal trust-aware defense framework that integrates deep learning-based attack detection, fuzzy clustering, and hybrid meta-heuristic routing optimization. The detection component, STAGNet, leverages Graph Attention Networks in combination with Long Short-Term Memory networks to capture both the topological dependencies and temporal behavior of nodes for accurate intrusion detection. To enhance routing security and efficiency, TrustFuzz employs fuzzy logic for trust-aware clustering, while WOACO-R, a hybrid of Whale Optimization Algorithm and Ant Colony Optimization, is utilized for adaptive and trustworthy route selection. The framework is evaluated using NS-2 simulations under diverse attack scenarios, including blackhole, wormhole, grayhole, denial-of-service, and integrated attacks, across varying node densities. Results show that STAGNet-COpt achieves an average Packet Delivery Ratio of 94.05%, packet loss of 5.45%, throughput of 119.5 kbps, end-to-end delay of 3.63 ms, and routing overhead of 325.25, significantly outperforming existing benchmarks. The proposed model demonstrates high scalability, detection accuracy, and resilience, establishing a robust and intelligent solution for secure MANET communication.
Keywords: MANETs, Security, Integrated Attacks, Deep Learning, Optimization, Trust.
Manbir Kaur Brar, ECE Department, Chandigarh University, Mohali, Punjab, India; Email: manbirbrar90@gmail.com
Sukhpreet Singh, ECE Department, Chandigarh University, Mohali, Punjab, India; Email: sukhpreet.ece@cumail.in
Sajjan Singh, ECE Department, Chandigarh Engineering College, Chandigarh Group of Colleges Jhanjeri-140307, Mohali, Punjab, India; Email: sajjantech@gmail.com
-
[1] I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, Jul. 2003, doi: 10.1016/S1570-8705(03)00013-1.
-
[2] R. Sheikh, Mahakal Singh Chande, and D. K. Mishra, “Security issues in MANET: A review,” in 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN), IEEE, Sep. 2010, pp. 1–4. doi: 10.1109/WOCN.2010.5587317.
-
[3] I. Baird, I. Wadhaj, B. Ghaleb, and C. Thomson, “Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs),” Electronics, vol. 13, no. 16, p. 3314, Aug. 2024, doi: 10.3390/electronics13163314.
-
[4] A. Priyam and A. Yadav, “Challenges, Attacks, and Countermeasures for Security in MANETs-IoT,” in Cryptology and Network Security with Machine Learning, Springer Nature, 2024, pp. 383–395. doi: 10.1007/978-981-97-0641-9_27.
-
[5] P. Mitra and S. Mukherjee, “A review of trust based secure routing protocols in MANETs,” in 2015 International Conference and Workshop on Computing and Communication (IEMCON), IEEE, Oct. 2015, pp. 1–7. doi: 10.1109/IEMCON.2015.7344490.
-
[6] G. Vidhya Lakshmi and P. Vaishnavi, “An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution,” Wirel. Pers. Commun., vol. 124, no. 1, pp. 333–348, May 2022, doi: 10.1007/s11277-021-09359-2.
-
[7] R. Popli, M. Sethi, I. Kansal, A. Garg, and N. Goyal, “Machine Learning Based Security Solutions in MANETs: State of the art approaches,” J. Phys. Conf. Ser., vol. 1950, no. 1, p. 012070, Aug. 2021, doi: 10.1088/1742-6596/1950/1/012070.
-
[8] V. R. Sugumaran, E. Dinesh, R. Ramya, and E. Muniyandy, “Distributed blockchain assisted secure data aggregation scheme for risk-aware zone-based MANET,” Sci. Rep., vol. 15, no. 1, p. 8022, Mar. 2025, doi: 10.1038/s41598-025-92656-8.
-
[9] S. Majumder, D. Bhattacharyya, and S. Chowdhuri, “ABCD: advanced blockchain DSR algorithm for MANET to mitigate the different security threats,” EURASIP J. Wirel. Commun. Netw., vol. 2025, no. 1, p. 8, Feb. 2025, doi: 10.1186/s13638-025-02430-7.
-
[10] S. S. Priya, R. Vijayabhasker, and A. Rajaram, “Advanced Security and Efficiency Framework for Mobile Ad-Hoc Networks Using Adaptive Clustering and Optimization Techniques,” J. Electr. Eng. Technol., vol. 20, no. 3, pp. 1815–1826, Mar. 2025, doi: 10.1007/s42835-024-02119-9.
-
[11] K. S. Prasanna and B. Ramesh, “Multiobjective Secure Trust Aware Redundant Array Shifting Encryption and Clustering Based Routing in Mobile Ad Hoc Networks,” Int. J. Commun. Syst., vol. 38, no. 5, Mar. 2025, doi: 10.1002/dac.6074.
-
[12] V. Nivedita, C.-S. Shieh, and M.-F. Horng, “An integrated trust-based secure routing with intrusion detection for mobile Ad Hoc network using adaptive snow geese optimization algorithm,” Ain Shams Eng. J., vol. 16, no. 7, p. 103385, Jul. 2025, doi: 10.1016/j.asej.2025.103385.
-
[13] S. Jeganathan, G. Kulandaivelu, D. Muthusamy, and K. V. Samraj, “Trust‐Aware Routing Protocol Using Hierarchical Manta Ray Foraging Optimization Algorithm with Selfish Node Detection in MANET,” Int. J. Commun. Syst., vol. 38, no. 5, Mar. 2025, doi: 10.1002/dac.70011.
-
[14] K. Dalal, “Hybrid optimization-based secured routing in mobile ad-hoc network,” Intell. Decis. Technol., vol. 19, no. 1, pp. 312–336, Jan. 2025, doi: 10.3233/IDT-240739.
-
[15] V. A. Khandekar and P. Gupta, “Machine learning-based hybrid SSO-MA with optimized secure link state routing protocol in Manet,” China Commun., vol. 22, no. 3, pp. 164–180, Mar. 2025, doi: 10.23919/JCC.ja.2023-0401.
-
[16] S. D and L. PH, “A secure routing and black hole attack detection system using coot Chimp Optimization Algorithm-based Deep Q Network in MANET,” Comput. Secur., vol. 148, p. 104166, Jan. 2025, doi: 10.1016/j.cose.2024.104166.
-
[17] M. V. Anand, A. Krishnamurthy, A. Kannan, and N. Govindarajan, “Secure Routing in Mobile Ad Hoc Networks with Hybrid Tasmanian Gazelle Optimization,” IETE J. Res., pp. 1–12, Mar. 2025, doi: 10.1080/03772063.2025.2466683.
-
[18] K. Saminathan, L. Perumal, F. H. Shajin, and R. K. Shakya, “Multicast On-Route cluster propagation to detect network intrusion detection systems on MANET using Deep Operator Neural networks,” Expert Syst. Appl., vol. 271, p. 125864, May 2025, doi: 10.1016/j.eswa.2024.125864.
-
[19] S. Ravi, S. Matheswaran, U. Perumal, S. Sivakumar, and S. K. Palvadi, “Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization,” Peer-to-Peer Netw. Appl., vol. 16, no. 1, pp. 22–34, Jan. 2023, doi: 10.1007/s12083-022-01351-2.
-
[20] S. M. Hassan, M. Murtadha Mohamad, F. Binti Muchtar, and F. Bin Yusuf Patel Dawoodi, “Enhancing MANET Security Through Federated Learning and Multiobjective Optimization: A Trust-Aware Routing Framework,” IEEE Access, vol. 12, pp. 181149–181178, 2024, doi: 10.1109/ACCESS.2024.3505236.
-
[21] J. A. Rathod and M. Kotari, “Secure and efficient message transmission in MANET using hybrid cryptography and multipath routing technique,” Multimed. Tools Appl., vol. 84, no. 13, pp. 12633–12656, Jun. 2024, doi: 10.1007/s11042-024-19542-9.
-
[22] N. Saravanan, R. Arunachalam, A. S. A. Nisha, and A. Karthikayen, “An innovative energy efficient routing protocol in MANET with hybridized osprey-fire hawk optimization algorithm to attain optimal routing constraints,” Wirel. Networks, vol. 31, no. 3, pp. 2005–2026, Mar. 2025, doi: 10.1007/s11276-024-03867-2.
-
[23] P. Satyanarayana, U. B. Sofi, B. F. Ahmed, N. N. Saranya, G. V. S. P. Rao, and V. G. Krishnan, “Enhancement of Network Security in MANET Using Refined Adaptive Harris Hawks Optimization Algorithm (RAHHO) for IoT Applications,” in 2024 International Conference on Emerging Smart Computing and Informatics (ESCI), IEEE, Mar. 2024, pp. 1–5. doi: 10.1109/ESCI59607.2024.10497254.
-
[24] S. Selvaraj and M. Chakkaravarthy, “Enhancing security and efficiency in MANETs: a clustering-based approach with CGRUN and AGTO optimization for intrusion detection and path establishment,” Int. J. Inf. Technol., Apr. 2024, doi: 10.1007/s41870-024-01859-1.
-
[25] M. K. Brar, S. Singh, and S. Singh, “TrustOpt: An optimized trust-based approach for integrated attacks in MANETs,” in 2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT), IEEE, May 2024, pp. 534–540. doi: 10.1109/InCACCT61598.2024.10551211.
-
[26] R. Saravanan, K. Suresh, and S. S. Arumugam, “A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET,” J. Supercomput., vol. 79, no. 9, pp. 10481–10504, Jun. 2023, doi: 10.1007/s11227-023-05053-1.
-
[27] N. S. Naga Malleswari, D. Kalpana, S. Marlin, N. B. Sundara Ganapathy, M. Arun, and P. Satyanarayana, “Enhancement of Network Security in MANET By Using Guided Whale Optimization Algorithm (GWOA) for Solving Multiobjective Optimization,” in 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, Mar. 2023, pp. 1471–1476. doi: 10.1109/ICACCS57279.2023.10112966.
-
[28] S. R. Addula, U. Mamodiya, W. Jiang, and M. A. Almaiah, “Generative AI-Enhanced Intrusion Detection Framework for Secure Healthcare Networks in MANETs,” SHIFRA, vol. 2025, pp. 62–68, Feb. 2025, doi: 10.70470/SHIFRA/2025/003.
-
[29] E. P. Krishna et al., “Enhancing intrusion detection in MANETs with blockchain-based trust management and enhanced GRU model,” Peer-to-Peer Netw. Appl., vol. 18, no. 1, p. 27, Jan. 2025, doi: 10.1007/s12083-024-01877-7.
-
[30] A. A. Abdalhameed and A. I. Kadhim, “Molecular Swarm Optimization Analysis of Data Transmission and Recurrent Neural Networks (RNNs) for Attack Prevention in Mobile Ad Hoc Networks (MANETs),” KSII Trans. Internet Inf. Syst., vol. 19, no. 3, Mar. 2025, doi: 10.3837/tiis.2025.03.014.
-
[31] S. M. Hassan, M. M. Mohamad, and F. B. Muchtar, “Advanced Intrusion Detection in MANETs: A Survey of Machine Learning and Optimization Techniques for Mitigating Black/Gray Hole Attacks,” IEEE Access, vol. 12, pp. 150046–150090, 2024, doi: 10.1109/ACCESS.2024.3457682.
-
[32] A. A. Alkasasbeh, “Machine Learning Approach to Detect Blackhole Attack over MANETs,” in ResearchGa, 2025. doi: 10.1109/ICIT64950.2025.11049211.
-
[33] P. K. D. et al., “Enhancing security and efficiency in Mobile Ad Hoc Networks using a hybrid deep learning model for flooding attack detection,” Sci. Rep., vol. 15, no. 1, p. 818, Jan. 2025, doi: 10.1038/s41598-024-84421-0.
-
[34] S. Pushpalatha and N. Narasimhulu, “A hybrid approach for detecting network layer attacks in MANET,” Int. J. Syst. Assur. Eng. Manag., Jun. 2025, doi: 10.1007/s13198-025-02854-w.
-
[35] S. F. M. Hussain and S. M. H. S. S. Fathima, “Federated Learning-Assisted Coati Deep Learning-Based Model for Intrusion Detection in MANET,” Int. J. Comput. Intell. Syst., vol. 17, no. 1, p. 285, Nov. 2024, doi: 10.1007/s44196-024-00590-w.
-
[36] R. Reka, R. Karthick, R. Saravana Ram, and G. Singh, “Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET,” Comput. Secur., vol. 136, p. 103526, Jan. 2024, doi: 10.1016/j.cose.2023.103526.
-
[37] R. Meddeb, F. Jemili, B. Triki, and O. Korbaa, “A deep learning-based intrusion detection approach for mobile Ad-hoc network,” Soft Comput., May 2023, doi: 10.1007/s00500-023-08324-4.
-
[38] S. Shafi, S. Mounika, and S. Velliangiri, “Machine Learning and Trust Based AODV Routing Protocol to Mitigate Flooding and Blackhole Attacks in MANET,” Procedia Comput. Sci., vol. 218, pp. 2309–2318, 2023, doi: 10.1016/j.procs.2023.01.206.
-
[39] J. Zeng, Y. Shen, S. Xu, and R. Yang, “Analysis of gastrin-17 and its related influencing factors in physical examination results,” Immunity, Inflamm. Dis., vol. 11, no. 10, pp. 1–5, 2023, doi: 10.1002/iid3.993.
-
[40] W. Villegas-Ch, J. Govea, A. Maldonado Navarro, and P. Palacios Játiva, “Intrusion Detection in IoT Networks Using Dynamic Graph Modeling and Graph-Based Neural Networks,” IEEE Access, vol. 13, pp. 65356–65375, 2025, doi: 10.1109/ACCESS.2025.3559325.
-
[41] Z. Li, L. Zheng, Q. Zhang, H. Wang, Z. Du, and J. Liu, “GNSS Jamming Attacks Recognition Based on Dual GCN With Adaptive Weight Learning,” IEEE Sens. J., vol. 25, no. 13, pp. 26152–26168, Jul. 2025, doi: 10.1109/JSEN.2025.3571189.
-
[42] F. Huang, Y. Wang, W. Jiang, J. Wang, and K.-L. Hsiung, “GCAT-Based Localization of Eavesdropping Node for Power Internet of Things,” IEEE Internet Things J., vol. 12, no. 13, pp. 25804–25822, Jul. 2025, doi: 10.1109/JIOT.2025.3559503.

I. J. of Electrical & Electronics Research