Skip to main content
Top
Published in: Evolutionary Intelligence 2/2022

26-03-2020 | Special Issue

An approach for optimal-secure multi-path routing and intrusion detection in MANET

Authors: Neenavath Veeraiah, B. T. Krishna

Published in: Evolutionary Intelligence | Issue 2/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile ad-hoc network (MANET) is dynamic in nature that is susceptible to energy and security constraints. Among most of the existing techniques, energy optimization was a hectic challenge, which is addressed effectively using the routing protocols. Accordingly, this paper proposes an effective multipath routing protocol in MANET based on an optimization algorithm. The energy and the security crisis in the MANET are addressed effectively using the cluster head (CH) selection and intrusion detection strategies namely, fuzzy clustering and fuzzy Naive Bayes (fuzzy NB). Then, the multipath routing progresses using the secure nodes based on the routing protocol, Bird swarm-whale optimization algorithm (BSWOA), which is the integration of bird swarm optimization (BSA) in whale optimization algorithm (WOA). The selection of the optimal routes is based on fitness factors, such as connectivity, energy, trust, and throughput. The analysis of the methods is done using the attacks, such as flooding, blackhole, and selective packet drop based on the performance metrics. The proposed BSWOA acquired the maximal energy, throughput, detection rate, and a minimal delay of 9.48 Joule, 0.676 bps, 69.9%, and 0.00372 ms in the presence of the attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Perkins CE, Royer EM (2003) Ad hoc on-demand distance vector routing (AODV). In: IETF RFC 3561, 2003 Perkins CE, Royer EM (2003) Ad hoc on-demand distance vector routing (AODV). In: IETF RFC 3561, 2003
2.
go back to reference Veeraiah N, Krishna BT (2018) Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy naïve bayes rule. Multimed Res (MR) 1(1):27–32 Veeraiah N, Krishna BT (2018) Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy naïve bayes rule. Multimed Res (MR) 1(1):27–32
3.
go back to reference Cannuccia E, Phuoc VT, Brière B, Cario L, Janod E, Corraze B, Lepetit MB (2017) Combined first-principles calculations and experimental study of the phonon modes in the multiferroic compound GeV4S8. J Phys Chem 121(6):3522–3529 Cannuccia E, Phuoc VT, Brière B, Cario L, Janod E, Corraze B, Lepetit MB (2017) Combined first-principles calculations and experimental study of the phonon modes in the multiferroic compound GeV4S8. J Phys Chem 121(6):3522–3529
4.
go back to reference Barbari M, Conti L, Rossi G, Simonini S (2017) Supply of wood as environmental enrichment material to post-weaning piglets. Estonian Res Inst Agric 15(2):313–321 Barbari M, Conti L, Rossi G, Simonini S (2017) Supply of wood as environmental enrichment material to post-weaning piglets. Estonian Res Inst Agric 15(2):313–321
5.
go back to reference Sarkar S, Datta R (2013) A game theoreticmodel for stochastic routing in self-organized MANETs. In: Proceedings of the IEEE wireless communications and networking conference (WCNC), pp 1962–1967, 7-10 April 2013 Sarkar S, Datta R (2013) A game theoreticmodel for stochastic routing in self-organized MANETs. In: Proceedings of the IEEE wireless communications and networking conference (WCNC), pp 1962–1967, 7-10 April 2013
6.
go back to reference Yavuz AA, Alagoz F, Anarim E (2010) A new multi-tier adaptive military MANET security protocol using hybrid cryptography and sign cryption. Turk J Electr Eng Comput Sci 18(1):1–21 Yavuz AA, Alagoz F, Anarim E (2010) A new multi-tier adaptive military MANET security protocol using hybrid cryptography and sign cryption. Turk J Electr Eng Comput Sci 18(1):1–21
7.
go back to reference Marina MK, Das SR (2001) On-demand multipath distance vector routing in Ad hoc networks. In: Proceedings of the ninth international conference on network protocols (ICNP), California, pp 14–23, November 2001 Marina MK, Das SR (2001) On-demand multipath distance vector routing in Ad hoc networks. In: Proceedings of the ninth international conference on network protocols (ICNP), California, pp 14–23, November 2001
8.
go back to reference Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw 37(Part 2):209–227CrossRef Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw 37(Part 2):209–227CrossRef
9.
go back to reference Anderegg L, Eidenbenz S (2003) Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of the ninth annual international conference on mobile computing and networking, MOBICOM 2003, 2003, San Diego, CA, USA, September 14–19, 2003 Anderegg L, Eidenbenz S (2003) Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of the ninth annual international conference on mobile computing and networking, MOBICOM 2003, 2003, San Diego, CA, USA, September 14–19, 2003
10.
go back to reference Satheesh kumar S, Sengottaiyan N (2017) Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Cluster Comput 13:1–12 Satheesh kumar S, Sengottaiyan N (2017) Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Cluster Comput 13:1–12
11.
go back to reference Sarkar S, Datta R (2013) AODV based technique for quick and secure local recovery from link failures in MANETs. Int J Commun Netw Distrib Syst 11(1):92–116 Sarkar S, Datta R (2013) AODV based technique for quick and secure local recovery from link failures in MANETs. Int J Commun Netw Distrib Syst 11(1):92–116
12.
go back to reference Lou W, Liu W, Zhang Y, Fang Y (2009) SPREAD: improving network security by multipath routing in mobile ad hoc networks. Wirel Netw 15(3):279–294CrossRef Lou W, Liu W, Zhang Y, Fang Y (2009) SPREAD: improving network security by multipath routing in mobile ad hoc networks. Wirel Netw 15(3):279–294CrossRef
13.
go back to reference Li J, Lewis HW (2016) Fuzzy clustering algorithms – review of the applications. In: Proceedings of the IEEE international conference on smart cloud (SmartCloud), pp 282–288 Li J, Lewis HW (2016) Fuzzy clustering algorithms – review of the applications. In: Proceedings of the IEEE international conference on smart cloud (SmartCloud), pp 282–288
14.
go back to reference Singh O, Singh J, Singh R (2018) Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Comput 21:51–63CrossRef Singh O, Singh J, Singh R (2018) Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Comput 21:51–63CrossRef
15.
go back to reference Subba B, Biswas S, Karmakar S (2016) Intrusion detection in mobile Ad hoc Networks: Bayesian game formulation. Eng Sci Technol 19(2):782–799 Subba B, Biswas S, Karmakar S (2016) Intrusion detection in mobile Ad hoc Networks: Bayesian game formulation. Eng Sci Technol 19(2):782–799
16.
go back to reference Yadav AK, Tripathi S (2017) QMRPRNS: design of QoS multicast routing protocol using reliable node selection scheme for MANETs. Peer Peer Netw Appl 10(4):897–909CrossRef Yadav AK, Tripathi S (2017) QMRPRNS: design of QoS multicast routing protocol using reliable node selection scheme for MANETs. Peer Peer Netw Appl 10(4):897–909CrossRef
17.
go back to reference Chaudhry R, Tapaswi S (2018) Optimized power control and efficient energy conservation for topology management of MANET with an adaptive Gabriel graph. Comput Electr Eng 72:1021–1036CrossRef Chaudhry R, Tapaswi S (2018) Optimized power control and efficient energy conservation for topology management of MANET with an adaptive Gabriel graph. Comput Electr Eng 72:1021–1036CrossRef
18.
go back to reference Xian-Bing Meng XZ, Gao LL, Liu Y, Zhang H (2016) A new bio-inspired optimisation algorithm: bird swarm algorithm. J Exp Theor Artif Intell 28(4):673–687CrossRef Xian-Bing Meng XZ, Gao LL, Liu Y, Zhang H (2016) A new bio-inspired optimisation algorithm: bird swarm algorithm. J Exp Theor Artif Intell 28(4):673–687CrossRef
19.
go back to reference Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67CrossRef Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67CrossRef
20.
go back to reference Marchang N, Datta R, Das SK (2017) A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans Veh Technol 66(2):1684–1695CrossRef Marchang N, Datta R, Das SK (2017) A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans Veh Technol 66(2):1684–1695CrossRef
21.
go back to reference Pi S, Sun B (2012) Fuzzy controllers based multipath routing algorithm in MANET. Phys Procedia 24(Part B):1178–1185CrossRef Pi S, Sun B (2012) Fuzzy controllers based multipath routing algorithm in MANET. Phys Procedia 24(Part B):1178–1185CrossRef
22.
go back to reference Mohapatra P, Li J, Gui C (2009) QoS in mobile ad hoc networks. In: Proceedings of the IEEE 10th annual conference on wireless and microwave technology, vol 10, no 3, pp 44–53 Mohapatra P, Li J, Gui C (2009) QoS in mobile ad hoc networks. In: Proceedings of the IEEE 10th annual conference on wireless and microwave technology, vol 10, no 3, pp 44–53
23.
go back to reference Jiang S, Liu Y, Yin Q (2004) Provisioning of adaptability to variable topologies for routing schemes in MANETs. IEEE J Sel Areas Commun 22(7):1347–1356CrossRef Jiang S, Liu Y, Yin Q (2004) Provisioning of adaptability to variable topologies for routing schemes in MANETs. IEEE J Sel Areas Commun 22(7):1347–1356CrossRef
24.
go back to reference Wan J, Liu J, Shao Z, Vasilakos AV, Imran M, Zhou K (2016) Mobile crowd sensing for traffic prediction in internet of vehicles. Sensors 16(1):1–15CrossRef Wan J, Liu J, Shao Z, Vasilakos AV, Imran M, Zhou K (2016) Mobile crowd sensing for traffic prediction in internet of vehicles. Sensors 16(1):1–15CrossRef
25.
go back to reference Dvir A, Vasilakos AV (2010) Backpressure-based routing protocol for DTNs. In: ACM SIGCOMM computer communication review vol 40, no 4, pp 405–406, August 2010 Dvir A, Vasilakos AV (2010) Backpressure-based routing protocol for DTNs. In: ACM SIGCOMM computer communication review vol 40, no 4, pp 405–406, August 2010
26.
go back to reference Sarkar S, Kisku B, Misra S, Obaidat MS (2009) Chinese remainder theorem based RSA-threshold cryptography in mobile ad hoc networks using verifiable secret sharing. In: Proceedings of the Fifth IEEE international conference on wireless and mobile computing, networking and communications (WiMob’09), pp 258–262 Sarkar S, Kisku B, Misra S, Obaidat MS (2009) Chinese remainder theorem based RSA-threshold cryptography in mobile ad hoc networks using verifiable secret sharing. In: Proceedings of the Fifth IEEE international conference on wireless and mobile computing, networking and communications (WiMob’09), pp 258–262
27.
go back to reference Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23(8):2455–2472CrossRef Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23(8):2455–2472CrossRef
28.
go back to reference Narayandas V, Tiruvayipati S, Hanmandlu M, Thimmareddy L (2017) Anomaly detection system in a cluster-Based MANET. In: Proceedings in computer communication, networking and internet security. Springer, Singapore, pp 11–21 Narayandas V, Tiruvayipati S, Hanmandlu M, Thimmareddy L (2017) Anomaly detection system in a cluster-Based MANET. In: Proceedings in computer communication, networking and internet security. Springer, Singapore, pp 11–21
29.
go back to reference Usha G, Rajesh Babu M, Saravana Kumar S (2006) Dynamic anomaly detection using cross-layer security in MANET. Comput Electr Eng 59:1–11 Usha G, Rajesh Babu M, Saravana Kumar S (2006) Dynamic anomaly detection using cross-layer security in MANET. Comput Electr Eng 59:1–11
30.
go back to reference Bhattacharya A, Sinha K (2017) An efficient protocol for load-balanced multipath routing in mobile ad hoc networks. Ad Hoc Netw 63:104–114CrossRef Bhattacharya A, Sinha K (2017) An efficient protocol for load-balanced multipath routing in mobile ad hoc networks. Ad Hoc Netw 63:104–114CrossRef
31.
go back to reference Russia S, Anita R (2017) Joint cost and secured node disjoint energy efficient multipath routing in mobile ad hoc network. Wirel Netw 23(7):2307–2316CrossRef Russia S, Anita R (2017) Joint cost and secured node disjoint energy efficient multipath routing in mobile ad hoc network. Wirel Netw 23(7):2307–2316CrossRef
32.
go back to reference Taha A, Alsaqour R, Uddin M, Abdelhaq M, Saba T (2017) Energy efficient multipath routing protocol for mobile ad-hoc network using the fitness function. IEEE Access 5:10369–10381CrossRef Taha A, Alsaqour R, Uddin M, Abdelhaq M, Saba T (2017) Energy efficient multipath routing protocol for mobile ad-hoc network using the fitness function. IEEE Access 5:10369–10381CrossRef
33.
go back to reference Selvi PFA, Manikandan MSK (2017) Ant based multipath backbone routing for load balancing in MANET. IET Commun 11(1):136–141CrossRef Selvi PFA, Manikandan MSK (2017) Ant based multipath backbone routing for load balancing in MANET. IET Commun 11(1):136–141CrossRef
34.
go back to reference Bala K, Chandra Sekar A, Baskar M, Paramesh J (2019) An efficient multi level intrusion detection system for mobile ad-hoc network using clustering technique. Int J Eng Adv Technol (IJEAT) 8(6):1977–1985CrossRef Bala K, Chandra Sekar A, Baskar M, Paramesh J (2019) An efficient multi level intrusion detection system for mobile ad-hoc network using clustering technique. Int J Eng Adv Technol (IJEAT) 8(6):1977–1985CrossRef
35.
go back to reference Yannam A, Prasad GVSNRV (2019) Trust aware intrustion detection system to defend attacks in MANET. Int J Innov Technol Explor Eng (IJITEE) 8(6):1298–1306 Yannam A, Prasad GVSNRV (2019) Trust aware intrustion detection system to defend attacks in MANET. Int J Innov Technol Explor Eng (IJITEE) 8(6):1298–1306
Metadata
Title
An approach for optimal-secure multi-path routing and intrusion detection in MANET
Authors
Neenavath Veeraiah
B. T. Krishna
Publication date
26-03-2020
Publisher
Springer Berlin Heidelberg
Published in
Evolutionary Intelligence / Issue 2/2022
Print ISSN: 1864-5909
Electronic ISSN: 1864-5917
DOI
https://doi.org/10.1007/s12065-020-00388-7

Other articles of this Issue 2/2022

Evolutionary Intelligence 2/2022 Go to the issue

Premium Partner