Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2023

11-10-2023

Cluster head based secure routing using optimized dual-discriminator conditional generative adversarial network in wireless ad-hoc networks

Authors: R. Prabha, G. A. Senthil, SU. Suganthi

Published in: Peer-to-Peer Networking and Applications | Issue 6/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Designing a routing protocol that can against the attacks of malicious nodes is very essential because open wireless channels make a wireless ad hoc network (WAN) affected by different security attacks. To overcome this problem, Dual-Discriminator Conditional Generative Adversarial Network Optimized with Namib beetle optimization algorithm is proposed in this manuscript for cluster head based secure routing in Wireless Ad-hoc Networks (CH-SR-DDCGAN-NBOA-WAN). Here, the proposed CH-SR-DDCGAN-NBOA-WAN method consists of two phases: (i) to find the optimal CHs (ii) to find optimal trust path. At first, Dual-discriminator conditional generative adversarial network is utilized for selecting Cluster Head (CH) depending on the multi-objective fitness function. The multi-objective fitness function considers the factors, namely set of nodes, determining short security paths connecting sources and destinations, and links schedule with the routes that fulfills the request of all nodes to decrease the energy consumption of whole network, and also increase the defense against spiteful nodes. Therefore, in this work, proposed Namib beetle optimization algorithm (NBOA) is utilized for optimizing the Dual-discriminator conditional generative adversarial network, which selects the CH accurately. After CH selection, Nomadic People Optimization Algorithm (NPOA) is used to identify the trust path from that are confirmed by using trust parameters, such as integrity, consistency, forwarding rate, availability factor. The proposed CH-SR-DDCGAN-NBOA-WAN approach is activated in network stimulator NS-2 and its performance is examined under performance metrics, such as drop, normalized network energy, network lifetime, delay, throughput, energy consumption, Packet Delivery Ratio. The proposed CH-SR-DDCGAN-NBOA-WAN approach attains 23.31%, 24.5%, and 30.01% lower packet drop, 12.45%, 17.34% and 24.67% higher network life time and 11.45%, 17.34% and 29.56% lower average delay time compared with existing methods, such as FCO-fuzzy constraints applied cluster optimization technique for wireless ad-hoc networks (CH-SR-FCO-WAN), trust-based secure routing and the prevention of attack in WAN (CH-SR-KID-SASR-WAN) and a secure routing scheme to mitigate attack in wireless ad-hoc sensor network CH-SR-BSCSRP-WAN respectively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Boulaiche M (2020) Survey of secure routing protocols for wireless ad hoc networks. Wirel Pers Commun 114(1):483–517CrossRef Boulaiche M (2020) Survey of secure routing protocols for wireless ad hoc networks. Wirel Pers Commun 114(1):483–517CrossRef
2.
go back to reference Kumar KV, Jayasankar T, Eswaramoorthy V, Nivedhitha V (2020) SDARP: Security based Data Aware Routing Protocol for ad hoc sensor networks. Int J Intell Net 1:36–42 Kumar KV, Jayasankar T, Eswaramoorthy V, Nivedhitha V (2020) SDARP: Security based Data Aware Routing Protocol for ad hoc sensor networks. Int J Intell Net 1:36–42
3.
go back to reference Mahapatra SN, Singh BK (2023) An efficient and secure cluster-based cooperative data transmission for wireless ad hoc networks IOT environment. In: Machine vision and augmented intelligence: Select proceedings of MAI 2022. Springer Nature Singapore, Singapore, pp 651–663 Mahapatra SN, Singh BK (2023) An efficient and secure cluster-based cooperative data transmission for wireless ad hoc networks IOT environment. In: Machine vision and augmented intelligence: Select proceedings of MAI 2022. Springer Nature Singapore, Singapore, pp 651–663
4.
go back to reference Kumar PP, Bai V, Amala M, Krish RP (2023) Krill herd optimization algorithm with deep convolutional neural network fostered breast cancer classification using mammogram images. CONCURR COMP-PRACT E 35(7) Kumar PP, Bai V, Amala M, Krish RP (2023) Krill herd optimization algorithm with deep convolutional neural network fostered breast cancer classification using mammogram images. CONCURR COMP-PRACT E 35(7)
5.
go back to reference Hu F, Chen B, Shi D, Zhang X, Pan HZ (2020) Secure routing protocol in wireless ad hoc networks via deep learning. In: 2020 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1–6 Hu F, Chen B, Shi D, Zhang X, Pan HZ (2020) Secure routing protocol in wireless ad hoc networks via deep learning. In: 2020 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1–6
6.
go back to reference Hosmani S, Mathapati B (2023) R2SCDT: robust and reliable secure clustering and data transmission in vehicular ad hoc network using weight evaluation. J Ambient Intell Humaniz Comput 14(3):2029–2046CrossRef Hosmani S, Mathapati B (2023) R2SCDT: robust and reliable secure clustering and data transmission in vehicular ad hoc network using weight evaluation. J Ambient Intell Humaniz Comput 14(3):2029–2046CrossRef
7.
go back to reference Azhdari MS, Barati A, Barati H (2022) A cluster-based routing method with authentication capability in Vehicular Ad hoc Networks (VANETs). J Parallel Distrib Comput 169:1–23CrossRef Azhdari MS, Barati A, Barati H (2022) A cluster-based routing method with authentication capability in Vehicular Ad hoc Networks (VANETs). J Parallel Distrib Comput 169:1–23CrossRef
8.
go back to reference Abdulhae OT, Mandeep JS, Islam M (2022) Cluster-based routing protocols for flying ad hoc networks (FANETs). IEEE Access 10:32981–33004CrossRef Abdulhae OT, Mandeep JS, Islam M (2022) Cluster-based routing protocols for flying ad hoc networks (FANETs). IEEE Access 10:32981–33004CrossRef
9.
go back to reference Thirunavukkarasu V, Senthil Kumar A, Prakasam P (2022) Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network. Peer-to-Peer Netw Appl 15(5):2240–2252CrossRef Thirunavukkarasu V, Senthil Kumar A, Prakasam P (2022) Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network. Peer-to-Peer Netw Appl 15(5):2240–2252CrossRef
10.
go back to reference Hosseinzadeh M, Mohammed AH, Alenizi FA, Malik MH, Yousefpoor E, Yousefpoor MS, Ahmed OH, Rahmani AM, Tightiz L (2023) A novel fuzzy trust-based secure routing scheme in flying ad hoc networks. Veh Commun 100665 Hosseinzadeh M, Mohammed AH, Alenizi FA, Malik MH, Yousefpoor E, Yousefpoor MS, Ahmed OH, Rahmani AM, Tightiz L (2023) A novel fuzzy trust-based secure routing scheme in flying ad hoc networks. Veh Commun 100665
11.
go back to reference Shakya DS (2020) The robust routing protocol with authentication for wireless adhoc networks. Journal of IoT in Social, Mobile, Analytics, and Cloud 2(2):83–95MathSciNet Shakya DS (2020) The robust routing protocol with authentication for wireless adhoc networks. Journal of IoT in Social, Mobile, Analytics, and Cloud 2(2):83–95MathSciNet
12.
go back to reference Namdev M, Goyal S, Agarwal R (2021) An optimized communication scheme for energy efficient and secure flying ad-hoc network (FANET). Wirel Pers Commun 120(2):1291–1312CrossRef Namdev M, Goyal S, Agarwal R (2021) An optimized communication scheme for energy efficient and secure flying ad-hoc network (FANET). Wirel Pers Commun 120(2):1291–1312CrossRef
13.
go back to reference Prithi S, Sumathi S (2020) LD2FA-PSO: A novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Netw 97:102024CrossRef Prithi S, Sumathi S (2020) LD2FA-PSO: A novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Netw 97:102024CrossRef
14.
go back to reference Krishnasamy B, Muthaiah L, Kamali Pushparaj JE, Pandey PS (2023) DIWGAN optimized with Namib Beetle Optimization Algorithm for intrusion detection in mobile ad hoc networks. IETE J Res 1–20 Krishnasamy B, Muthaiah L, Kamali Pushparaj JE, Pandey PS (2023) DIWGAN optimized with Namib Beetle Optimization Algorithm for intrusion detection in mobile ad hoc networks. IETE J Res 1–20
15.
go back to reference Arivubrakan P, Kanagachidambaresan GR (2023) Multi-objective cluster head-based energy-aware routing protocol using hybrid woodpecker and flamingo search optimization algorithm for Internet of Things environment. Int J Inf Technol Decis Mak 1–20 Arivubrakan P, Kanagachidambaresan GR (2023) Multi-objective cluster head-based energy-aware routing protocol using hybrid woodpecker and flamingo search optimization algorithm for Internet of Things environment. Int J Inf Technol Decis Mak 1–20
16.
go back to reference Devi VB, Elma KJ, Rooban S, Shajin FH (2023) Self-attention based progressive generative adversarial network optimized with arithmetic optimization algorithm for kidney stone detection. CONCURR COMP-PRACT E 35(6) Devi VB, Elma KJ, Rooban S, Shajin FH (2023) Self-attention based progressive generative adversarial network optimized with arithmetic optimization algorithm for kidney stone detection. CONCURR COMP-PRACT E 35(6)
17.
go back to reference Ma J, Xu H, Jiang J, Mei X, Zhang X (2020) PDDcGAN: A dual-discriminator conditional generative adversarial network for multi-resolution image fusion. IEEE Trans Image Process 29:4980–4995CrossRefMATH Ma J, Xu H, Jiang J, Mei X, Zhang X (2020) PDDcGAN: A dual-discriminator conditional generative adversarial network for multi-resolution image fusion. IEEE Trans Image Process 29:4980–4995CrossRefMATH
18.
go back to reference Chahardoli M, Eraghi NO, Nazari S (2022) Namib beetle optimization algorithm: a new meta-heuristic method for feature selection and dimension reduction. Concurr Comput: Practice and Experience 34(1):e6524CrossRef Chahardoli M, Eraghi NO, Nazari S (2022) Namib beetle optimization algorithm: a new meta-heuristic method for feature selection and dimension reduction. Concurr Comput: Practice and Experience 34(1):e6524CrossRef
19.
go back to reference Mohamadi S, Sammen SS, Panahi F, Ehteram M, Kisi O, Mosavi A, Ahmed AN, El-Shafie A, Al-Ansari N (2020) Zoning map for drought prediction using integrated machine learning models with a nomadic people optimization algorithm. Nat Hazards 104(1):537–579CrossRef Mohamadi S, Sammen SS, Panahi F, Ehteram M, Kisi O, Mosavi A, Ahmed AN, El-Shafie A, Al-Ansari N (2020) Zoning map for drought prediction using integrated machine learning models with a nomadic people optimization algorithm. Nat Hazards 104(1):537–579CrossRef
20.
go back to reference Mohammed AS, Basha S, Asha PN, Venkatachalam K (2020) FCO—fuzzy constraints applied cluster optimization technique for wireless adhoc networks. Comput Commun 154:501–508CrossRef Mohammed AS, Basha S, Asha PN, Venkatachalam K (2020) FCO—fuzzy constraints applied cluster optimization technique for wireless adhoc networks. Comput Commun 154:501–508CrossRef
21.
go back to reference Isaac Sajan R, Jasper J (2020) Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network. Int J Commun Syst 33(8):e4341CrossRef Isaac Sajan R, Jasper J (2020) Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network. Int J Commun Syst 33(8):e4341CrossRef
22.
go back to reference Jasper J (2021) A secure routing scheme to mitigate attack in wireless adhoc sensor network. Comput Sec 103:102197CrossRef Jasper J (2021) A secure routing scheme to mitigate attack in wireless adhoc sensor network. Comput Sec 103:102197CrossRef
23.
go back to reference Hu S, Chen X, Ni W, Hossain E, Wang X (2021) Distributed machine learning for wireless communication networks: Techniques, architectures, and applications. IEEE Commun Surveys and Tutorials 23(3):1458–1493CrossRef Hu S, Chen X, Ni W, Hossain E, Wang X (2021) Distributed machine learning for wireless communication networks: Techniques, architectures, and applications. IEEE Commun Surveys and Tutorials 23(3):1458–1493CrossRef
24.
go back to reference Kumar KV, Jayasankar T, Eswaramoorthy V, Nivedhitha VS (2020) DARP: Security based Data Aware Routing Protocol for ad hoc sensor networks. Int J Intell Net 1:36–42 Kumar KV, Jayasankar T, Eswaramoorthy V, Nivedhitha VS (2020) DARP: Security based Data Aware Routing Protocol for ad hoc sensor networks. Int J Intell Net 1:36–42
25.
go back to reference Gomathy V, Padhy N, Samanta D, Sivaram M, Jain V, Amiri IS (2020) Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. J Ambient Intell Humanized Comput 11(11):4995–5001CrossRef Gomathy V, Padhy N, Samanta D, Sivaram M, Jain V, Amiri IS (2020) Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. J Ambient Intell Humanized Comput 11(11):4995–5001CrossRef
Metadata
Title
Cluster head based secure routing using optimized dual-discriminator conditional generative adversarial network in wireless ad-hoc networks
Authors
R. Prabha
G. A. Senthil
SU. Suganthi
Publication date
11-10-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01545-2

Other articles of this Issue 6/2023

Peer-to-Peer Networking and Applications 6/2023 Go to the issue

Premium Partner