A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks

126Citations
Citations of this article
63Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Mobile ad hoc networks (MANET) are self-organizing, rapidly deployable wireless networks excellent for outdoor events, communications in places lacking radio infrastructure, disasters, and military activities. Because network topologies are flexible and dynamic, security may be the most vulnerable point in the network, open to attacks including eavesdropping, routing, and application changes. MANET has more security flaws than quality of service (QoS). It is thus recommended to use intrusion detection, which regulates system to detect further security problems. Monitoring for intrusions is crucial for prevention and additional security against unwanted access. The loss of a mobile node's power source may affect the node's ability to forward packets, which is reliant on the system's overall life. In this paper, the Bacteria for Aging Optimization Algorithm (BFOA), which finds the ideal hops in advancing the routing, is utilized to offer a trust-based protected and energy-efficient navigation in MANETs using a trust-based protected and energy-efficient navigation algorithm. The fuzzy clustering algorithm is activated first, and the Cluster Heads (CHs) are selected depending on the value of indirect, direct, and recent trust that each CH has. In addition, value nodes were discovered based on trust levels. Moreover, the CHs are engaged in multi hop routing, and the selection of the ideal route is based on the projected protocol, which selects the best routes based on latency, throughput, and connection within the course's boundaries. Even without an attack, compared to the exiting methods EA-DRP & EE-OHRA the proposed secure optimization routing (BFOA) algorithm produced a minimum energy of 0.10 m joules, a minimal latency of 0.0035 m sec, a maximum throughput of 0.70 bps, and an 83 percent detection rate, with enhanced results obtained by using a selective packet dropping attack.

Cite

CITATION STYLE

APA

Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks. IEEE Access, 10, 14260–14269. https://doi.org/10.1109/ACCESS.2022.3144679

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free