Secure Aware Cluster-Based Routing For Manet Using A Multi-Objective-Trust Centric Flower Pollination Algorithm
How to Cite?
Arudra Annepu, Priti Mishra, "Secure Aware Cluster-Based Routing For Manet Using A Multi-Objective-Trust Centric Flower Pollination Algorithm," International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 266-274, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I1P230
Abstract
A mobile Adhoc network (MANET) is a system of moveable nodes that are self-configured where the nodes in the network communicate through wireless links. However, the dynamic topology of the network creates route failures, higher energy consumption, and high delays. Moreover, the nodes in the MANE are vulnerable to malicious attacks because of their mobility and lack of solid infrastructure. In order to overcome this, the Multi-objective-Trust Centric Flower Pollination Algorithm (M-TCFPA) is proposed for achieving a safe and dependable network data transfer. This M-TCFPA method is used to perform secure-aware cluster-based routing over the network. The M-TCFPA trust, integrity factor, residual energy, and distance are all taken into account. For selecting a secure optimal cluster head (CH) and determining a secure routing path over the network. Performance of the M-TCFPA technique is evaluated using PDR, PLR, average end-to-end delay (AEED), and throughput metrics.. particularly, the current research, Trust-Based Secure Multipath Routing (TBSMR), is used for evaluating the M-TCFPA method. The PDR of the M-TCFPA method for 100 nodes is 98.85%, which is high when compared to the TBSMR method.
Keywords
Cluster-based routing, packet delivery ratio, Integrity factor, Mobile ad-hoc network, multi objective-trust centric flower pollination algorithm, Trust.
Reference
[1] Thiyagarajan, P. and Senthilkumar, S., Power-efficient memetic optimized and adjacent exponentially distributed routing in mobile ad hoc networks. Computer Communications, 150 (2020) 209-215.
[2] Rajeswari, A.R., Kulothungan, K., Ganapathy, S. and Kannan, A., A trusted fuzzy-based stable and secure routing algorithm for effective communication in mobile ad-hoc networks. Peer-to-Peer Networking and Applications, 12(5) (2019) 1076-1096.
[3] Robinson, Y.H. and Julie, E.G., MTPKM, Multipart trust-based public key management technique to reduce security vulnerability in mobile ad-hoc networks. Wireless Personal Communications, 109(2) (2019) 739-760.
[4] Krishnan, R.S., Julie, E.G., Robinson, Y.H., Kumar, R., Son, L.H., Tuan, T.A. and Long, H.V., Modified zone-based intrusion detection system for security enhancement in mobile ad hoc networks. Wireless Networks, 26(2) (2020) 1275-1289.
[5] Borkar, G.M. and Mahajan, A.R., A secure and trust-based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wireless Networks, 23(8) (2017) 2455-2472.
[6] M. Ramesha, K. Jeevan 2020. Implementation of IoT Based Wireless Electronic Stethoscope, Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT), (2020) 103-106, doi, 10.1109/MPCIT51588.2020.9350476.
[7] Desai, A.M. and Jhaveri, R.H., Secure routing in mobile Ad hoc networks, a predictive approach. International Journal of Information Technology, 11(2) (2019) 345-356.
[8] Bisen, D. and Sharma, S., Enhanced performance through agent-based secure approach for mobile ad hoc networks. International Journal of Electronics, 105(1) (2018)116-136.
[9] Kishore D.V, Shivashankar, and S. Mehta., MANET topology for disaster management using wireless sensor network, in International Conference on Communication and Signal Processing, ICCSP, (2016) 0736–0740, doi, 10.1109/ICCSP.2016.7754242.
[10] Umar, Muhammad &Mehmood, Amjad& Song, Houbing. SeCRoP, secure cluster head centred multi-hop routing protocol for mobile ad hoc networks, SeCRoP. Security and Communication Networks. 9. 10.1002/sec.1544 (2016).
[11] Vatambeti, R., Sanshi, S. and Krishna, D.P., An efficient clustering approach for optimized path selection and route maintenance in mobile ad hoc networks. Journal of Ambient Intelligence and Humanized Computing, (2021) 1-15.
[12] Khalladi, R., Rebbah, M. &Smail, O. A new efficient approach for detecting single and multiple black hole attacks. J Supercomput 77 (2021) 7718–7736. https,//doi.org/10.1007/s11227-020-03596-1.
[13] Raja, R. and Ganeshkumar, P., QoSTRP, A trusted clustering based routing protocol for mobile ad-hoc networks. Programming and Computer Software, 44(6) (2018) 407-416.
[14] Anita, R., Joint cost and secured node disjoint energy-efficient multipath routing in mobile ad hoc network. Wireless Networks, 23(7) (2017) 2307-2316.
[15] Vatambeti, R., A novel wolf based trust accumulation approach for preventing malicious activities in mobile ad hoc networks. Wireless Personal Communications, 113(4) (2020) 2141-2166.
[16] Sridevi, N. and Nagarajan, V., Efficient traffic control and lifetime maximization in mobile ad hoc networks by using PSO–BAT optimization. Wireless Networks, 27(2) (2021) 861-870.
[17] Xu, H., Si, H., Zhang, H., Zhang, L., Leng, Y., Wang, J. and Li, D., Trust-based probabilistic broadcast scheme for mobile ad hoc networks. IEEE Access, 8 (2020) 21380-21392.
[18] Usha, M.S. and Ravishankar, K.C., Implementation of Trust-Based Novel Approach for Security Enhancements in MANETs. SN Computer Science, 2(4) (2021) 1-7.
[19] Thebiga, M. and Pramila, S.R., Adaptable and energy efficacious routing using modified emperor penguin colony optimization multi-faceted metaheuristics algorithm for MANETS. Wireless Personal Communications, 118(2) (2021) 1245-1270.
[20] Sirajuddin, M., Rupa, C., Iwendi, C. and Biamba, C., TBSMR, A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network. Security and Communication Networks, (2021).