FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

STAGNet-COpt: A Spatio-Temporal Attention Graph Network with Cluster-based Optimized Trust Routing for MANET Security

Author(s): Manbir Kaur Brar1,3*, Sukhpreet Singh2, and Sajjan Singh3

Publisher : FOREX Publication

Published : 30 March 2026

e-ISSN : 2347-470X

Page(s) : 225-241




Manbir Kaur Brar, ECE Department, Chandigarh University, Mohali, Punjab, India; Email: manbirbrar90@gmail.com

Sukhpreet Singh, ECE Department, Chandigarh University, Mohali, Punjab, India; Email: sukhpreet.ece@cumail.in

Sajjan Singh, ECE Department, Chandigarh Engineering College, Chandigarh Group of Colleges Jhanjeri-140307, Mohali, Punjab, India; Email: sajjantech@gmail.com

    [1] I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, Jul. 2003, doi: 10.1016/S1570-8705(03)00013-1.
    [2] R. Sheikh, Mahakal Singh Chande, and D. K. Mishra, “Security issues in MANET: A review,” in 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN), IEEE, Sep. 2010, pp. 1–4. doi: 10.1109/WOCN.2010.5587317.
    [3] I. Baird, I. Wadhaj, B. Ghaleb, and C. Thomson, “Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs),” Electronics, vol. 13, no. 16, p. 3314, Aug. 2024, doi: 10.3390/electronics13163314.
    [4] A. Priyam and A. Yadav, “Challenges, Attacks, and Countermeasures for Security in MANETs-IoT,” in Cryptology and Network Security with Machine Learning, Springer Nature, 2024, pp. 383–395. doi: 10.1007/978-981-97-0641-9_27.
    [5] P. Mitra and S. Mukherjee, “A review of trust based secure routing protocols in MANETs,” in 2015 International Conference and Workshop on Computing and Communication (IEMCON), IEEE, Oct. 2015, pp. 1–7. doi: 10.1109/IEMCON.2015.7344490.
    [6] G. Vidhya Lakshmi and P. Vaishnavi, “An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution,” Wirel. Pers. Commun., vol. 124, no. 1, pp. 333–348, May 2022, doi: 10.1007/s11277-021-09359-2.
    [7] R. Popli, M. Sethi, I. Kansal, A. Garg, and N. Goyal, “Machine Learning Based Security Solutions in MANETs: State of the art approaches,” J. Phys. Conf. Ser., vol. 1950, no. 1, p. 012070, Aug. 2021, doi: 10.1088/1742-6596/1950/1/012070.
    [8] V. R. Sugumaran, E. Dinesh, R. Ramya, and E. Muniyandy, “Distributed blockchain assisted secure data aggregation scheme for risk-aware zone-based MANET,” Sci. Rep., vol. 15, no. 1, p. 8022, Mar. 2025, doi: 10.1038/s41598-025-92656-8.
    [9] S. Majumder, D. Bhattacharyya, and S. Chowdhuri, “ABCD: advanced blockchain DSR algorithm for MANET to mitigate the different security threats,” EURASIP J. Wirel. Commun. Netw., vol. 2025, no. 1, p. 8, Feb. 2025, doi: 10.1186/s13638-025-02430-7.
    [10] S. S. Priya, R. Vijayabhasker, and A. Rajaram, “Advanced Security and Efficiency Framework for Mobile Ad-Hoc Networks Using Adaptive Clustering and Optimization Techniques,” J. Electr. Eng. Technol., vol. 20, no. 3, pp. 1815–1826, Mar. 2025, doi: 10.1007/s42835-024-02119-9.
    [11] K. S. Prasanna and B. Ramesh, “Multiobjective Secure Trust Aware Redundant Array Shifting Encryption and Clustering Based Routing in Mobile Ad Hoc Networks,” Int. J. Commun. Syst., vol. 38, no. 5, Mar. 2025, doi: 10.1002/dac.6074.
    [12] V. Nivedita, C.-S. Shieh, and M.-F. Horng, “An integrated trust-based secure routing with intrusion detection for mobile Ad Hoc network using adaptive snow geese optimization algorithm,” Ain Shams Eng. J., vol. 16, no. 7, p. 103385, Jul. 2025, doi: 10.1016/j.asej.2025.103385.
    [13] S. Jeganathan, G. Kulandaivelu, D. Muthusamy, and K. V. Samraj, “Trust‐Aware Routing Protocol Using Hierarchical Manta Ray Foraging Optimization Algorithm with Selfish Node Detection in MANET,” Int. J. Commun. Syst., vol. 38, no. 5, Mar. 2025, doi: 10.1002/dac.70011.
    [14] K. Dalal, “Hybrid optimization-based secured routing in mobile ad-hoc network,” Intell. Decis. Technol., vol. 19, no. 1, pp. 312–336, Jan. 2025, doi: 10.3233/IDT-240739.
    [15] V. A. Khandekar and P. Gupta, “Machine learning-based hybrid SSO-MA with optimized secure link state routing protocol in Manet,” China Commun., vol. 22, no. 3, pp. 164–180, Mar. 2025, doi: 10.23919/JCC.ja.2023-0401.
    [16] S. D and L. PH, “A secure routing and black hole attack detection system using coot Chimp Optimization Algorithm-based Deep Q Network in MANET,” Comput. Secur., vol. 148, p. 104166, Jan. 2025, doi: 10.1016/j.cose.2024.104166.
    [17] M. V. Anand, A. Krishnamurthy, A. Kannan, and N. Govindarajan, “Secure Routing in Mobile Ad Hoc Networks with Hybrid Tasmanian Gazelle Optimization,” IETE J. Res., pp. 1–12, Mar. 2025, doi: 10.1080/03772063.2025.2466683.
    [18] K. Saminathan, L. Perumal, F. H. Shajin, and R. K. Shakya, “Multicast On-Route cluster propagation to detect network intrusion detection systems on MANET using Deep Operator Neural networks,” Expert Syst. Appl., vol. 271, p. 125864, May 2025, doi: 10.1016/j.eswa.2024.125864.
    [19] S. Ravi, S. Matheswaran, U. Perumal, S. Sivakumar, and S. K. Palvadi, “Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization,” Peer-to-Peer Netw. Appl., vol. 16, no. 1, pp. 22–34, Jan. 2023, doi: 10.1007/s12083-022-01351-2.
    [20] S. M. Hassan, M. Murtadha Mohamad, F. Binti Muchtar, and F. Bin Yusuf Patel Dawoodi, “Enhancing MANET Security Through Federated Learning and Multiobjective Optimization: A Trust-Aware Routing Framework,” IEEE Access, vol. 12, pp. 181149–181178, 2024, doi: 10.1109/ACCESS.2024.3505236.
    [21] J. A. Rathod and M. Kotari, “Secure and efficient message transmission in MANET using hybrid cryptography and multipath routing technique,” Multimed. Tools Appl., vol. 84, no. 13, pp. 12633–12656, Jun. 2024, doi: 10.1007/s11042-024-19542-9.
    [22] N. Saravanan, R. Arunachalam, A. S. A. Nisha, and A. Karthikayen, “An innovative energy efficient routing protocol in MANET with hybridized osprey-fire hawk optimization algorithm to attain optimal routing constraints,” Wirel. Networks, vol. 31, no. 3, pp. 2005–2026, Mar. 2025, doi: 10.1007/s11276-024-03867-2.
    [23] P. Satyanarayana, U. B. Sofi, B. F. Ahmed, N. N. Saranya, G. V. S. P. Rao, and V. G. Krishnan, “Enhancement of Network Security in MANET Using Refined Adaptive Harris Hawks Optimization Algorithm (RAHHO) for IoT Applications,” in 2024 International Conference on Emerging Smart Computing and Informatics (ESCI), IEEE, Mar. 2024, pp. 1–5. doi: 10.1109/ESCI59607.2024.10497254.
    [24] S. Selvaraj and M. Chakkaravarthy, “Enhancing security and efficiency in MANETs: a clustering-based approach with CGRUN and AGTO optimization for intrusion detection and path establishment,” Int. J. Inf. Technol., Apr. 2024, doi: 10.1007/s41870-024-01859-1.
    [25] M. K. Brar, S. Singh, and S. Singh, “TrustOpt: An optimized trust-based approach for integrated attacks in MANETs,” in 2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT), IEEE, May 2024, pp. 534–540. doi: 10.1109/InCACCT61598.2024.10551211.
    [26] R. Saravanan, K. Suresh, and S. S. Arumugam, “A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET,” J. Supercomput., vol. 79, no. 9, pp. 10481–10504, Jun. 2023, doi: 10.1007/s11227-023-05053-1.
    [27] N. S. Naga Malleswari, D. Kalpana, S. Marlin, N. B. Sundara Ganapathy, M. Arun, and P. Satyanarayana, “Enhancement of Network Security in MANET By Using Guided Whale Optimization Algorithm (GWOA) for Solving Multiobjective Optimization,” in 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, Mar. 2023, pp. 1471–1476. doi: 10.1109/ICACCS57279.2023.10112966.
    [28] S. R. Addula, U. Mamodiya, W. Jiang, and M. A. Almaiah, “Generative AI-Enhanced Intrusion Detection Framework for Secure Healthcare Networks in MANETs,” SHIFRA, vol. 2025, pp. 62–68, Feb. 2025, doi: 10.70470/SHIFRA/2025/003.
    [29] E. P. Krishna et al., “Enhancing intrusion detection in MANETs with blockchain-based trust management and enhanced GRU model,” Peer-to-Peer Netw. Appl., vol. 18, no. 1, p. 27, Jan. 2025, doi: 10.1007/s12083-024-01877-7.
    [30] A. A. Abdalhameed and A. I. Kadhim, “Molecular Swarm Optimization Analysis of Data Transmission and Recurrent Neural Networks (RNNs) for Attack Prevention in Mobile Ad Hoc Networks (MANETs),” KSII Trans. Internet Inf. Syst., vol. 19, no. 3, Mar. 2025, doi: 10.3837/tiis.2025.03.014.
    [31] S. M. Hassan, M. M. Mohamad, and F. B. Muchtar, “Advanced Intrusion Detection in MANETs: A Survey of Machine Learning and Optimization Techniques for Mitigating Black/Gray Hole Attacks,” IEEE Access, vol. 12, pp. 150046–150090, 2024, doi: 10.1109/ACCESS.2024.3457682.
    [32] A. A. Alkasasbeh, “Machine Learning Approach to Detect Blackhole Attack over MANETs,” in ResearchGa, 2025. doi: 10.1109/ICIT64950.2025.11049211.
    [33] P. K. D. et al., “Enhancing security and efficiency in Mobile Ad Hoc Networks using a hybrid deep learning model for flooding attack detection,” Sci. Rep., vol. 15, no. 1, p. 818, Jan. 2025, doi: 10.1038/s41598-024-84421-0.
    [34] S. Pushpalatha and N. Narasimhulu, “A hybrid approach for detecting network layer attacks in MANET,” Int. J. Syst. Assur. Eng. Manag., Jun. 2025, doi: 10.1007/s13198-025-02854-w.
    [35] S. F. M. Hussain and S. M. H. S. S. Fathima, “Federated Learning-Assisted Coati Deep Learning-Based Model for Intrusion Detection in MANET,” Int. J. Comput. Intell. Syst., vol. 17, no. 1, p. 285, Nov. 2024, doi: 10.1007/s44196-024-00590-w.
    [36] R. Reka, R. Karthick, R. Saravana Ram, and G. Singh, “Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET,” Comput. Secur., vol. 136, p. 103526, Jan. 2024, doi: 10.1016/j.cose.2023.103526.
    [37] R. Meddeb, F. Jemili, B. Triki, and O. Korbaa, “A deep learning-based intrusion detection approach for mobile Ad-hoc network,” Soft Comput., May 2023, doi: 10.1007/s00500-023-08324-4.
    [38] S. Shafi, S. Mounika, and S. Velliangiri, “Machine Learning and Trust Based AODV Routing Protocol to Mitigate Flooding and Blackhole Attacks in MANET,” Procedia Comput. Sci., vol. 218, pp. 2309–2318, 2023, doi: 10.1016/j.procs.2023.01.206.
    [39] J. Zeng, Y. Shen, S. Xu, and R. Yang, “Analysis of gastrin-17 and its related influencing factors in physical examination results,” Immunity, Inflamm. Dis., vol. 11, no. 10, pp. 1–5, 2023, doi: 10.1002/iid3.993.
    [40] W. Villegas-Ch, J. Govea, A. Maldonado Navarro, and P. Palacios Játiva, “Intrusion Detection in IoT Networks Using Dynamic Graph Modeling and Graph-Based Neural Networks,” IEEE Access, vol. 13, pp. 65356–65375, 2025, doi: 10.1109/ACCESS.2025.3559325.
    [41] Z. Li, L. Zheng, Q. Zhang, H. Wang, Z. Du, and J. Liu, “GNSS Jamming Attacks Recognition Based on Dual GCN With Adaptive Weight Learning,” IEEE Sens. J., vol. 25, no. 13, pp. 26152–26168, Jul. 2025, doi: 10.1109/JSEN.2025.3571189.
    [42] F. Huang, Y. Wang, W. Jiang, J. Wang, and K.-L. Hsiung, “GCAT-Based Localization of Eavesdropping Node for Power Internet of Things,” IEEE Internet Things J., vol. 12, no. 13, pp. 25804–25822, Jul. 2025, doi: 10.1109/JIOT.2025.3559503.

Manbir Kaur Brar, Sukhpreet Singh, and Sajjan Singh (2026), STAGNet-COpt: A Spatio-Temporal Attention Graph Network with Cluster-based Optimized Trust Routing for MANET Security. IJEER 14(1), 225-241. DOI: 10.37391/IJEER.140124.