Skip to main content
Top
Published in: Wireless Personal Communications 4/2023

26-02-2024

A Review: An Efficient and Reliable Secure Routing Mechanism with the Prevention of Attacks in Mobile Ad-Hoc Network (MANET)

Authors: K. S. Prasanna, B. Ramesh

Published in: Wireless Personal Communications | Issue 4/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In wireless communication systems, Wireless ad hoc network plays a significant role in the research domain. MANET is also an ad hoc network that build a temporary network to transmit data around the network utilizing multi-hop routers. MANET is utilized in various regions of life such as real-time information, network portioning, rescue operation, interpersonal communication, and information sharing. To deliver data accurately and quickly, MANET has changed its topology and nodes dynamically. Because of the mobility nature of nodes, the chances of routing design problem are maximum among the nodes. In this review, other categories of Routing Protocols (RPs) such as Geographical Multicast Routing Protocols (Geocast RPs), Power-Aware Routing Protocols, Multipath Routing Protocols, Hierarchical Routing Protocols, Multicast Routing Protocols and Location-Aware Routing Protocols are discussed and compared its attribute on various parameters. Also, the MANET networks are vulnerable to attacks at different tiers. Moreover, secure routing is a significant concern in MANET. Therefore, this review discusses various attacks and solutions for resisting attacks in MANET environment. It protects the network from both active and passive attacks. Attackers can dominate the scattered MANET and wireless design to minimize its potentials.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shantaf, A. M., Kurnaz, S., & Mohammed, A. H. (2020). Performance evaluation of three mobile ad-hoc network routing protocols in different environments. In 2020 International congress on Human–computer interaction, optimization and robotic applications (HORA) (pp. 1–6). IEEE. Shantaf, A. M., Kurnaz, S., & Mohammed, A. H. (2020). Performance evaluation of three mobile ad-hoc network routing protocols in different environments. In 2020 International congress on Human–computer interaction, optimization and robotic applications (HORA) (pp. 1–6). IEEE.
2.
go back to reference Ghodichor, N., Namdeoe, V., & Borkar, G. (2022). Secure routing protocol against internal and external attack in MANET. In Proceedings of the international conference on emerging trends in artificial intelligence and smart systems, THEETAS 2022, 16–17 April 2022, Jabalpur, India. Ghodichor, N., Namdeoe, V., & Borkar, G. (2022). Secure routing protocol against internal and external attack in MANET. In Proceedings of the international conference on emerging trends in artificial intelligence and smart systems, THEETAS 2022, 16–17 April 2022, Jabalpur, India.
3.
go back to reference Fayaz, M., Mehmood, G., Khan, A., Abbas, S., Fayaz, M., & Gwak, J. (2022). Counteracting selfish nodes using reputation based system in mobile Ad Hoc networks. Electronics, 11(2), 185.CrossRef Fayaz, M., Mehmood, G., Khan, A., Abbas, S., Fayaz, M., & Gwak, J. (2022). Counteracting selfish nodes using reputation based system in mobile Ad Hoc networks. Electronics, 11(2), 185.CrossRef
4.
go back to reference Wheeb, A. H., & Al-Jamali, N. A. S. (2022). Performance analysis of OLSR protocol in mobile ad hoc networks. iJIM, 16(01), 107. Wheeb, A. H., & Al-Jamali, N. A. S. (2022). Performance analysis of OLSR protocol in mobile ad hoc networks. iJIM16(01), 107.
5.
go back to reference Zulkifli, C. Z., Ismail, R., Ibrahim, A. B., & Boonsong, W. (2022). Performance analysis of proactive routing protocol based on different network load in mobile ad-hoc network (MANET). Evolution of Information, Communication and Computing System, 46–53. Zulkifli, C. Z., Ismail, R., Ibrahim, A. B., & Boonsong, W. (2022). Performance analysis of proactive routing protocol based on different network load in mobile ad-hoc network (MANET). Evolution of Information, Communication and Computing System, 46–53.
6.
go back to reference Thamizhmaran, K., & Charles, A. (2022). Comparison of on-demand routing protocol for MANET using Simulation. i-Manager's Journal on Communication Engineering and Systems, 11(1), 13. Thamizhmaran, K., & Charles, A. (2022). Comparison of on-demand routing protocol for MANET using Simulation. i-Manager's Journal on Communication Engineering and Systems11(1), 13.
7.
go back to reference Addanki, U. K., & Kumar, B. H. (2023). Hybrid optimization of OLSR routing protocol in MANETs: Uniting genetic algorithm and particle swarm optimization. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 131–141. Addanki, U. K., & Kumar, B. H. (2023). Hybrid optimization of OLSR routing protocol in MANETs: Uniting genetic algorithm and particle swarm optimization. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 131–141.
8.
go back to reference Rajeshkumar, G., Kumar, M. V., Kumar, K. S., Bhatia, S., Mashat, A., & Dadheech, P. (2023). An improved multi-objective particle swarm optimization routing on MANET. Computer Systems Science & Engineering, 44(2). Rajeshkumar, G., Kumar, M. V., Kumar, K. S., Bhatia, S., Mashat, A., & Dadheech, P. (2023). An improved multi-objective particle swarm optimization routing on MANET. Computer Systems Science & Engineering44(2).
9.
go back to reference Murugesan, G., Padmaa, M., Nagarajan, K., & Premkumar, N. Secured and efficient data transmission in MANETS against malicious attack using DSR routing and BCS clustering with hybrid AES-ECC cryptanalysis. Murugesan, G., Padmaa, M., Nagarajan, K., & Premkumar, N. Secured and efficient data transmission in MANETS against malicious attack using DSR routing and BCS clustering with hybrid AES-ECC cryptanalysis.
10.
go back to reference Khudayer, B. H., Alzabin, L. R., Anbar, M., Tawafak, R. M., Alamiedy, T. A., Malik, S. I., & Alfarsi, G. M. (2022). An optimizing rebroadcast mechanism for minimizing the control overhead in mobile ad-hoc networks. Journal of Theoretical and Applied Information Technology, 100(8). Khudayer, B. H., Alzabin, L. R., Anbar, M., Tawafak, R. M., Alamiedy, T. A., Malik, S. I., & Alfarsi, G. M. (2022). An optimizing rebroadcast mechanism for minimizing the control overhead in mobile ad-hoc networks. Journal of Theoretical and Applied Information Technology100(8).
11.
go back to reference Chandravanshi, K., Soni, G., & Mishra, D. K. (2022). Design and analysis of an energy-efficient load balancing and bandwidth aware adaptive multipath N-channel routing approach in MANET. IEEE Access, 10, 110003–110025.CrossRef Chandravanshi, K., Soni, G., & Mishra, D. K. (2022). Design and analysis of an energy-efficient load balancing and bandwidth aware adaptive multipath N-channel routing approach in MANET. IEEE Access, 10, 110003–110025.CrossRef
12.
go back to reference Naseem, M., Ahamad, G., Sharma, S., & Abbasi, E. (2021). EE-LB-AOMDV: An efficient energy constraints-based load-balanced multipath routing protocol for MANETs. International Journal of Communication Systems, 34(16), e4946.CrossRef Naseem, M., Ahamad, G., Sharma, S., & Abbasi, E. (2021). EE-LB-AOMDV: An efficient energy constraints-based load-balanced multipath routing protocol for MANETs. International Journal of Communication Systems, 34(16), e4946.CrossRef
13.
go back to reference Rani, S., & Sharma, V. (2023). Energy and load aware multipath route selection for mobile ad hoc networks. International Journal of Advanced Computer Technology, 12(5), 11–19. Rani, S., & Sharma, V. (2023). Energy and load aware multipath route selection for mobile ad hoc networks. International Journal of Advanced Computer Technology, 12(5), 11–19.
14.
go back to reference Samadi, R., Nazari, A., & Seitz, J. (2023). Intelligent energy-aware routing protocol in mobile IoT networks based on SDN. IEEE Transactions on Green Communications and Networking. Samadi, R., Nazari, A., & Seitz, J. (2023). Intelligent energy-aware routing protocol in mobile IoT networks based on SDN. IEEE Transactions on Green Communications and Networking.
15.
go back to reference Kaddoura, S., Haraty, R. A., Al Jahdali, S., & Assi, M. (2023). SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs. Peer-to-Peer Networking and Applications, 16(5), 2325–2348.CrossRef Kaddoura, S., Haraty, R. A., Al Jahdali, S., & Assi, M. (2023). SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs. Peer-to-Peer Networking and Applications, 16(5), 2325–2348.CrossRef
16.
go back to reference Kaur, P., Batra, S., & Rana, P. S. (2024). Border-hunting optimization for mobile agent-based intrusion detection with deep convolutional neural network. Concurrency and Computation: Practice and Experience, 36(1), e7876.CrossRef Kaur, P., Batra, S., & Rana, P. S. (2024). Border-hunting optimization for mobile agent-based intrusion detection with deep convolutional neural network. Concurrency and Computation: Practice and Experience, 36(1), e7876.CrossRef
17.
go back to reference Jose, M. R., & Vigila, S. M. C. (2023). F-CAPSO: Fuzzy chaos adaptive particle swarm optimization for energy-efficient and secure data transmission in MANET. Expert Systems with Applications, 234, 120944.CrossRef Jose, M. R., & Vigila, S. M. C. (2023). F-CAPSO: Fuzzy chaos adaptive particle swarm optimization for energy-efficient and secure data transmission in MANET. Expert Systems with Applications, 234, 120944.CrossRef
18.
go back to reference Tahboush, M., Adawy, M., & Aloqaily, O. (2023). PEO-AODV: Preserving energy optimization based on modified AODV routing protocol for MANET. International Journal of Advances in Soft Computing & Its Applications, 15(2). Tahboush, M., Adawy, M., & Aloqaily, O. (2023). PEO-AODV: Preserving energy optimization based on modified AODV routing protocol for MANET. International Journal of Advances in Soft Computing & Its Applications15(2).
19.
go back to reference Rao, G. B. N., & Tripathy, A. K. (2024). Energy aware routing through genetic algorithm and AOMDV in MANET. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 435–441. Rao, G. B. N., & Tripathy, A. K. (2024). Energy aware routing through genetic algorithm and AOMDV in MANET. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 435–441.
20.
go back to reference Adnan Hadi A, Vahab AL-Din Makki S (2023) Performance improvements for MANET routing protocols using a combination of cat and particle swarm optimization (CPSO). International Journal of Nonlinear Analysis and Applications, 14(1), 2821–2829. Adnan Hadi A, Vahab AL-Din Makki S (2023) Performance improvements for MANET routing protocols using a combination of cat and particle swarm optimization (CPSO). International Journal of Nonlinear Analysis and Applications, 14(1), 2821–2829.
21.
go back to reference Manhar, A., & Dembla, D. (2023). Improved hybrid routing protocol (IHRP) in MANETs based on situation based adaptive routing. International Journal of Electrical and Electronics Research, 11(1), 15–24.CrossRef Manhar, A., & Dembla, D. (2023). Improved hybrid routing protocol (IHRP) in MANETs based on situation based adaptive routing. International Journal of Electrical and Electronics Research, 11(1), 15–24.CrossRef
22.
go back to reference Arulselvan, G., & Rajaram, A. (2023). Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs. Journal of Intelligent & Fuzzy Systems, (Preprint), 1–16. Arulselvan, G., & Rajaram, A. (2023). Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs. Journal of Intelligent & Fuzzy Systems, (Preprint), 1–16.
23.
go back to reference Jeyaraj, D., Yesudhasan, J., & Aliar, A. A. S. (2023). Developing multi-path routing protocol in MANET using hybrid SM-CSBO based on novel multi-objective function. International Journal of Communication Systems, 36(4), e5404.CrossRef Jeyaraj, D., Yesudhasan, J., & Aliar, A. A. S. (2023). Developing multi-path routing protocol in MANET using hybrid SM-CSBO based on novel multi-objective function. International Journal of Communication Systems, 36(4), e5404.CrossRef
24.
go back to reference Meenakshi, K., Revathi, M., Harsha, S. S., Tamilarasi, K., Shanthi, T. S., Sugumar, D., & Rajaram, A. Hybrid machine learning approach for trust evaluation to secure MANET from routing attacks. Journal of Intelligent & Fuzzy Systems, (Preprint), 1–17. Meenakshi, K., Revathi, M., Harsha, S. S., Tamilarasi, K., Shanthi, T. S., Sugumar, D., & Rajaram, A. Hybrid machine learning approach for trust evaluation to secure MANET from routing attacks. Journal of Intelligent & Fuzzy Systems, (Preprint), 1–17.
25.
go back to reference Rao, T. V., Swamy, V. K., Karthigeyan, K. A., Gopalakrishnan, S., Kalaichelvi, T., & Koteswari, S. (2023). Energy efficient trust based data communication using AODV protocol in MANET. Journal of Advanced Research in Applied Sciences and Engineering Technology, 32(1), 390–405. Rao, T. V., Swamy, V. K., Karthigeyan, K. A., Gopalakrishnan, S., Kalaichelvi, T., & Koteswari, S. (2023). Energy efficient trust based data communication using AODV protocol in MANET. Journal of Advanced Research in Applied Sciences and Engineering Technology, 32(1), 390–405.
26.
go back to reference Saxena, M., Dutta, S., Singh, B. K., & Neogy, S. (2023). Multi-objective based route selection approach using AOMDV in MANET. SN Computer Science, 4(5), 581.CrossRef Saxena, M., Dutta, S., Singh, B. K., & Neogy, S. (2023). Multi-objective based route selection approach using AOMDV in MANET. SN Computer Science, 4(5), 581.CrossRef
27.
go back to reference Al-Essa, R. I., & Al-Suhail, G. A. (2023). AFB-GPSR: Adaptive beaconing strategy based on fuzzy logic scheme for geographical routing in a mobile ad hoc network (MANET). Computation, 11(9), 174.CrossRef Al-Essa, R. I., & Al-Suhail, G. A. (2023). AFB-GPSR: Adaptive beaconing strategy based on fuzzy logic scheme for geographical routing in a mobile ad hoc network (MANET). Computation, 11(9), 174.CrossRef
28.
go back to reference Benatia, S. E., Smail, O., Meftah, B., Rebbah, M., & Cousin, B. (2021). A reliable multipath routing protocol based on link quality and stability for MANETs in urban areas. Simulation Modelling Practice and Theory, 113, 102397.CrossRef Benatia, S. E., Smail, O., Meftah, B., Rebbah, M., & Cousin, B. (2021). A reliable multipath routing protocol based on link quality and stability for MANETs in urban areas. Simulation Modelling Practice and Theory, 113, 102397.CrossRef
29.
go back to reference Sarkar, S. (2022). Mobility aware and reliable multipath routing protocol for MANETs. International Journal of Ad Hoc and Ubiquitous Computing, 41(4), 256–269.CrossRef Sarkar, S. (2022). Mobility aware and reliable multipath routing protocol for MANETs. International Journal of Ad Hoc and Ubiquitous Computing, 41(4), 256–269.CrossRef
30.
go back to reference Veeraiah, N., Khalaf, O. I., Prasad, C. V. P. R., Alotaibi, Y., Alsufyani, A., Alghamdi, S. A., & Alsufyani, N. (2021). Trust aware secure energy efficient hybrid protocol for manet. IEEE Access, 9, 120996–121005.CrossRef Veeraiah, N., Khalaf, O. I., Prasad, C. V. P. R., Alotaibi, Y., Alsufyani, A., Alghamdi, S. A., & Alsufyani, N. (2021). Trust aware secure energy efficient hybrid protocol for manet. IEEE Access, 9, 120996–121005.CrossRef
31.
go back to reference Soomro, A. M., Saim, M., bin Naeem, A., Soomro, M. A., Khurshid, I., & Baloch, M. A. (2022). Analysis study of routing protocols in MANET for disaster management. Journal of Computing & Biomedical Informatics, 3(02), 124–135. Soomro, A. M., Saim, M., bin Naeem, A., Soomro, M. A., Khurshid, I., & Baloch, M. A. (2022). Analysis study of routing protocols in MANET for disaster management. Journal of Computing & Biomedical Informatics, 3(02), 124–135.
32.
go back to reference Rezvanian, A., Vahidipour, S. M., & Saghiri, A. M. (2024). CaAIS: Cellular automata-based artificial immune system for dynamic environments. Algorithms, 17(1), 18.CrossRef Rezvanian, A., Vahidipour, S. M., & Saghiri, A. M. (2024). CaAIS: Cellular automata-based artificial immune system for dynamic environments. Algorithms, 17(1), 18.CrossRef
33.
go back to reference Shanmugham, K., Rangan, R., Dhatchnamurthy, S., & Pundir, S. (2024). An efficient self-attention-based conditional variational auto-encoder generative adversarial networks based multipath cross-layer design routing paradigm for MANET. Expert Systems with Applications, 238, 122097.CrossRef Shanmugham, K., Rangan, R., Dhatchnamurthy, S., & Pundir, S. (2024). An efficient self-attention-based conditional variational auto-encoder generative adversarial networks based multipath cross-layer design routing paradigm for MANET. Expert Systems with Applications, 238, 122097.CrossRef
34.
go back to reference Li, X., Bian, X., & Li, M. (2024). Routing selection algorithm for mobile ad hoc networks based on neighbor node density. Sensors, 24(2), 325.PubMedCrossRef Li, X., Bian, X., & Li, M. (2024). Routing selection algorithm for mobile ad hoc networks based on neighbor node density. Sensors, 24(2), 325.PubMedCrossRef
35.
go back to reference Gupta, P., Goel, P., Varshney, P., & Tyagi, N. (2019). Reliability factor based AODV protocol: Prevention of black hole attack in MANET. In Smart innovations in communication and computational sciences: Proceedings of ICSICCS-2018 (pp. 271–279). Springer, Singapore. Gupta, P., Goel, P., Varshney, P., & Tyagi, N. (2019). Reliability factor based AODV protocol: Prevention of black hole attack in MANET. In Smart innovations in communication and computational sciences: Proceedings of ICSICCS-2018 (pp. 271–279). Springer, Singapore.
36.
go back to reference Sankara Narayanan, S., & Murugaboopathi, G. (2020). Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency and Computation: Practice and Experience, 32(4), e5017.CrossRef Sankara Narayanan, S., & Murugaboopathi, G. (2020). Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency and Computation: Practice and Experience, 32(4), e5017.CrossRef
37.
go back to reference Rajendran, N., Jawahar, P. K., & Priyadarshini, R. (2019). Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. Computer Communications, 148, 129–135.CrossRef Rajendran, N., Jawahar, P. K., & Priyadarshini, R. (2019). Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. Computer Communications, 148, 129–135.CrossRef
38.
go back to reference Hassan, K. L., Mandal, J. K., & Mondal, S. (2019). Enhanced trust-based intrusion detection system in manet. Hassan, K. L., Mandal, J. K., & Mondal, S. (2019). Enhanced trust-based intrusion detection system in manet.
39.
go back to reference Salah, S., Zaghal, R., & Abdeljawad, M. (2022). A mathematical-based model for estimating the path duration of the DSDV routing protocol in MANETs. Journal of Sensor and Actuator Networks, 11(2), 23.CrossRef Salah, S., Zaghal, R., & Abdeljawad, M. (2022). A mathematical-based model for estimating the path duration of the DSDV routing protocol in MANETs. Journal of Sensor and Actuator Networks, 11(2), 23.CrossRef
40.
go back to reference Wang, N., Datla, R., & Jhajj, H. (2019). NCMDSDV: A neighbor coverage multipsth DSDV Routing Protocol for MANETs. In 2019 IEEE 11th international conference on communication software and networks (ICCSN) (pp. 46–50). IEEE. Wang, N., Datla, R., & Jhajj, H. (2019). NCMDSDV: A neighbor coverage multipsth DSDV Routing Protocol for MANETs. In 2019 IEEE 11th international conference on communication software and networks (ICCSN) (pp. 46–50). IEEE.
41.
go back to reference Jain, R., & Kashyap, I. (2019). An QoS aware link defined OLSR (LD-OLSR) routing protocol for MANETs. Wireless Personal Communications, 108(3), 1745–1758.CrossRef Jain, R., & Kashyap, I. (2019). An QoS aware link defined OLSR (LD-OLSR) routing protocol for MANETs. Wireless Personal Communications, 108(3), 1745–1758.CrossRef
42.
go back to reference Saif, A. A. A., & Kumar, K. (2022). Enhance the performance of AODV routing protocol in mobile ad-hoc networks. Journal of Physics: Conference Series (Vol. 2327, No. 1, p. 012057). IOP Publishing. Saif, A. A. A., & Kumar, K. (2022). Enhance the performance of AODV routing protocol in mobile ad-hoc networks. Journal of Physics: Conference Series (Vol. 2327, No. 1, p. 012057). IOP Publishing.
43.
go back to reference M Haglan, H. (2021). Determining an optimum zone radius for zone routing protocol (ZRP) based on node mobility. M Haglan, H. (2021). Determining an optimum zone radius for zone routing protocol (ZRP) based on node mobility.
44.
go back to reference Manhar, A., & Dembla, D. (2021). Design an improved hybrid routing protocol strategy to minimize delay and overhead for MANET. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(6), 2407–2419.CrossRef Manhar, A., & Dembla, D. (2021). Design an improved hybrid routing protocol strategy to minimize delay and overhead for MANET. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(6), 2407–2419.CrossRef
45.
go back to reference Allimuthu, U., & Mahalakshmi, K. (2023). Efficient mobile ad hoc route maintenance against social distances using attacker detection automation. Mobile Networks and Applications, 28(1), 128–159.CrossRef Allimuthu, U., & Mahalakshmi, K. (2023). Efficient mobile ad hoc route maintenance against social distances using attacker detection automation. Mobile Networks and Applications, 28(1), 128–159.CrossRef
46.
go back to reference Qabajeh, M. M. (2022). SGMRP: Scalable geographic multicast routing protocol for mobile ad hoc networks. Qabajeh, M. M. (2022). SGMRP: Scalable geographic multicast routing protocol for mobile ad hoc networks.
47.
go back to reference Qabajeh, L. K. (2022). a scalable multicast routing protocol for mobile ad-hoc networks. Journal of Telecommunications and Information Technology, (2). Qabajeh, L. K. (2022). a scalable multicast routing protocol for mobile ad-hoc networks. Journal of Telecommunications and Information Technology, (2).
48.
go back to reference Jamaesha, S. S., & Bhavani, S. (2019). A secure and efficient cluster based location aware routing protocol in MANET. Cluster Computing, 22(Suppl 2), 4179–4186.CrossRef Jamaesha, S. S., & Bhavani, S. (2019). A secure and efficient cluster based location aware routing protocol in MANET. Cluster Computing, 22(Suppl 2), 4179–4186.CrossRef
49.
go back to reference Benazer, S. S., Dawood, M. S., Suganya, G., & Ramanathan, S. K. (2021). Performance analysis of modified on-demand multicast routing protocol for MANET using non forwarding nodes. Materials Today: Proceedings, 45, 2603–2605. Benazer, S. S., Dawood, M. S., Suganya, G., & Ramanathan, S. K. (2021). Performance analysis of modified on-demand multicast routing protocol for MANET using non forwarding nodes. Materials Today: Proceedings, 45, 2603–2605.
50.
go back to reference Kaur, G., & Midha, K. (2022). Review of MANET security features. Mathematical Statistician and Engineering Applications, 71(4), 2430–2439. Kaur, G., & Midha, K. (2022). Review of MANET security features. Mathematical Statistician and Engineering Applications, 71(4), 2430–2439.
51.
go back to reference Sivapriya, N., & Mohandas, R. (2022). Analysis on essential challenges and attacks on MANET security appraisal. Journal of Algebraic Statistics, 13(3), 2578–2589. Sivapriya, N., & Mohandas, R. (2022). Analysis on essential challenges and attacks on MANET security appraisal. Journal of Algebraic Statistics, 13(3), 2578–2589.
52.
go back to reference Uthumansa, A., & Shantha, F. (2022). Lightweight security mechanism to mitigate active attacks in a mobile ad-hoc network. Uthumansa, A., & Shantha, F. (2022). Lightweight security mechanism to mitigate active attacks in a mobile ad-hoc network.
53.
go back to reference Al-Shareeda, M. A., & Manickam, S. (2022). Man-in-the-middle attacks in mobile ad hoc networks (MANETs): Analysis and evaluation. Symmetry, 14(8), 1543.CrossRef Al-Shareeda, M. A., & Manickam, S. (2022). Man-in-the-middle attacks in mobile ad hoc networks (MANETs): Analysis and evaluation. Symmetry, 14(8), 1543.CrossRef
54.
go back to reference Kumar, V., Shankar, M., Tripathi, A. M., Yadav, V., Rai, A. K., Khan, U., & Rahul, M. (2022). Prevention of Blackhole Attack in MANET using certificateless signature scheme. Journal of Scientific & Industrial Research, 81(10), 1061–1072. Kumar, V., Shankar, M., Tripathi, A. M., Yadav, V., Rai, A. K., Khan, U., & Rahul, M. (2022). Prevention of Blackhole Attack in MANET using certificateless signature scheme. Journal of Scientific & Industrial Research, 81(10), 1061–1072.
55.
go back to reference Rao, P. V., Murthy, K. S., Krishnan, V. G., Divya, V., & Sathyamoorthy, K. Detection of sybil attack in MANET environment using Anfis with bloom filter algorithm. Rao, P. V., Murthy, K. S., Krishnan, V. G., Divya, V., & Sathyamoorthy, K. Detection of sybil attack in MANET environment using Anfis with bloom filter algorithm.
56.
go back to reference Esiefarienrhe, B. M., Phakathi, T., & Lugayizi, F. (2022). Node-based QoS-aware security framework for sinkhole attacks in mobile ad-hoc networks. In Telecom (Vol. 3, No. 3, pp. 407–432). MDPI. Esiefarienrhe, B. M., Phakathi, T., & Lugayizi, F. (2022). Node-based QoS-aware security framework for sinkhole attacks in mobile ad-hoc networks. In Telecom (Vol. 3, No. 3, pp. 407–432). MDPI.
57.
go back to reference Narayanan, S. S., & Murugaboopathi, G. (2020). Prevention of rushing attack in MANET using threshold-based approach. International Journal of Internet Technology and Secured Transactions, 10(5), 576–584.CrossRef Narayanan, S. S., & Murugaboopathi, G. (2020). Prevention of rushing attack in MANET using threshold-based approach. International Journal of Internet Technology and Secured Transactions, 10(5), 576–584.CrossRef
58.
go back to reference Zardari, Z. A., He, J., Pathan, M. S., Qureshi, S., Hussain, M. I., Razaque, F., & Zhu, N. (2021). Detection and prevention of jellyfish attacks using knn algorithm and trusted routing scheme in manet. International Journal of Network Security, 23(1), 77–87. Zardari, Z. A., He, J., Pathan, M. S., Qureshi, S., Hussain, M. I., Razaque, F., & Zhu, N. (2021). Detection and prevention of jellyfish attacks using knn algorithm and trusted routing scheme in manet. International Journal of Network Security, 23(1), 77–87.
59.
go back to reference Suseendran, G., Chandrasekaran, E., & Nayyar, A. (2019). Defending jellyfish attack in mobile ad hoc networks via novel fuzzy system rule. In Data management, analytics and innovation: Proceedings of ICDMAI 2018, Volume 2 (pp. 437–455). Springer, Singapore. Suseendran, G., Chandrasekaran, E., & Nayyar, A. (2019). Defending jellyfish attack in mobile ad hoc networks via novel fuzzy system rule. In Data management, analytics and innovation: Proceedings of ICDMAI 2018, Volume 2 (pp. 437–455). Springer, Singapore.
60.
go back to reference Venkatasubramanian, S., Suhasini, A., & Hariprasath, S. Detection of black and grey hole attacks using hybrid cat with PSO-based deep learning algorithm in MANET. International Journal of Computer Networks and Applications (IJCNA), 724–735. Venkatasubramanian, S., Suhasini, A., & Hariprasath, S. Detection of black and grey hole attacks using hybrid cat with PSO-based deep learning algorithm in MANET. International Journal of Computer Networks and Applications (IJCNA), 724–735.
61.
go back to reference Sbai, O., & Elboukhari, M. (2022). Mobile ad hoc networks intrusion detection system against packet dropping attacks. Indonesian Journal of Electrical Engineering and Computer Science, 26(2), 819–825.CrossRef Sbai, O., & Elboukhari, M. (2022). Mobile ad hoc networks intrusion detection system against packet dropping attacks. Indonesian Journal of Electrical Engineering and Computer Science, 26(2), 819–825.CrossRef
62.
go back to reference Narayana, V. L., & Bharathi, C. R. (2019). Multi-mode routing mechanism with cryptographic techniques and reduction of packet drop using 2ACK scheme MANETs. In Smart intelligent computing and applications: Proceedings of the second international conference on SCI 2018, Volume 1 (pp. 649–658). Springer, Singapore. Narayana, V. L., & Bharathi, C. R. (2019). Multi-mode routing mechanism with cryptographic techniques and reduction of packet drop using 2ACK scheme MANETs. In Smart intelligent computing and applications: Proceedings of the second international conference on SCI 2018, Volume 1 (pp. 649–658). Springer, Singapore.
63.
go back to reference Kannan, K. R., & Marimuthu, C. N. (2024). Energy efficient routing technique using enthalpy ant net routing for zone-based MANETS. IETE Journal of Research, 1–13. Kannan, K. R., & Marimuthu, C. N. (2024). Energy efficient routing technique using enthalpy ant net routing for zone-based MANETS. IETE Journal of Research, 1–13.
64.
go back to reference Panda, N., & Pattanayak, B. K. (2020). ACO-based secure routing protocols in MANETs. In New Paradigm in decision science and management: Proceedings of ICDSM 2018 (pp. 195–206). Springer, Singapore. Panda, N., & Pattanayak, B. K. (2020). ACO-based secure routing protocols in MANETs. In New Paradigm in decision science and management: Proceedings of ICDSM 2018 (pp. 195–206). Springer, Singapore.
65.
go back to reference Navamani, M. R., & Elamathi, N. (2022). Tversky Indexive Cramer–Shoup cryptography based deep structured belief neural learning for secured routing in MANET. Journal of Theoretical and Applied Information Technology, 100(12). Navamani, M. R., & Elamathi, N. (2022). Tversky Indexive Cramer–Shoup cryptography based deep structured belief neural learning for secured routing in MANET. Journal of Theoretical and Applied Information Technology100(12).
66.
go back to reference Kumar, S. (2022). Security enhancement in mobile ad-hoc network using novel data integrity based hash protection process. Wireless Personal Communications, 123(2), 1059–1083.MathSciNetCrossRef Kumar, S. (2022). Security enhancement in mobile ad-hoc network using novel data integrity based hash protection process. Wireless Personal Communications, 123(2), 1059–1083.MathSciNetCrossRef
67.
go back to reference Ben Brahim, G., Mohammad, N., El-Hajj, W., Parr, G., & Scotney, B. (2022). Performance evaluation and comparison study of adaptive MANET service location and discovery protocols for highly dynamic environments. EURASIP Journal on Wireless Communications and Networking, 2022(1), 1–21.CrossRef Ben Brahim, G., Mohammad, N., El-Hajj, W., Parr, G., & Scotney, B. (2022). Performance evaluation and comparison study of adaptive MANET service location and discovery protocols for highly dynamic environments. EURASIP Journal on Wireless Communications and Networking, 2022(1), 1–21.CrossRef
68.
go back to reference Hande, J. Y., & Sadiwala, R. (2024). Data security-based routing in MANETs using key management mechanism. SN Computer Science, 5(1), 155.CrossRef Hande, J. Y., & Sadiwala, R. (2024). Data security-based routing in MANETs using key management mechanism. SN Computer Science, 5(1), 155.CrossRef
69.
go back to reference Singh, C. E., & Vigila, S. M. C. (2023). Fuzzy based intrusion detection system in MANET. Measurement: Sensors, 26, 100578. Singh, C. E., & Vigila, S. M. C. (2023). Fuzzy based intrusion detection system in MANET. Measurement: Sensors26, 100578.
70.
go back to reference Olaniyan, O. M., Olusesi, A. T., Omodunbi, B. A., Wahab, W. B., Adetunji, O. J., & Olukoya, B. M. A data security model for mobile ad hoc network using linear function mayfly advanced encryption standard. Olaniyan, O. M., Olusesi, A. T., Omodunbi, B. A., Wahab, W. B., Adetunji, O. J., & Olukoya, B. M. A data security model for mobile ad hoc network using linear function mayfly advanced encryption standard.
71.
go back to reference Prasad, R. (2022). Enhanced energy efficient secure routing protocol for mobile ad-hoc network. Global Transitions Proceedings, 3(2), 412–423.CrossRef Prasad, R. (2022). Enhanced energy efficient secure routing protocol for mobile ad-hoc network. Global Transitions Proceedings, 3(2), 412–423.CrossRef
72.
go back to reference Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access, 10, 14260–14269.CrossRef Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access, 10, 14260–14269.CrossRef
Metadata
Title
A Review: An Efficient and Reliable Secure Routing Mechanism with the Prevention of Attacks in Mobile Ad-Hoc Network (MANET)
Authors
K. S. Prasanna
B. Ramesh
Publication date
26-02-2024
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-024-10888-9

Other articles of this Issue 4/2023

Wireless Personal Communications 4/2023 Go to the issue