A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks

Mobile ad hoc networks (MANET) are self-organizing, rapidly deployable wireless networks excellent for outdoor events, communications in places lacking radio infrastructure, disasters, and military activities. Because network topologies are flexible and dynamic, security may be the most vulnerable p...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 10; pp. 14260 - 14269
Main Authors Srilakshmi, Uppalapati, Alghamdi, Saleh Ahmed, Vuyyuru, Veera Ankalu, Veeraiah, Neenavath, Alotaibi, Youseef
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Mobile ad hoc networks (MANET) are self-organizing, rapidly deployable wireless networks excellent for outdoor events, communications in places lacking radio infrastructure, disasters, and military activities. Because network topologies are flexible and dynamic, security may be the most vulnerable point in the network, open to attacks including eavesdropping, routing, and application changes. MANET has more security flaws than quality of service (QoS). It is thus recommended to use intrusion detection, which regulates system to detect further security problems. Monitoring for intrusions is crucial for prevention and additional security against unwanted access. The loss of a mobile node's power source may affect the node's ability to forward packets, which is reliant on the system's overall life. In this paper, the Bacteria for Aging Optimization Algorithm (BFOA), which finds the ideal hops in advancing the routing, is utilized to offer a trust-based protected and energy-efficient navigation in MANETs using a trust-based protected and energy-efficient navigation algorithm. The fuzzy clustering algorithm is activated first, and the Cluster Heads (CHs) are selected depending on the value of indirect, direct, and recent trust that each CH has. In addition, value nodes were discovered based on trust levels. Moreover, the CHs are engaged in multi hop routing, and the selection of the ideal route is based on the projected protocol, which selects the best routes based on latency, throughput, and connection within the course's boundaries. Even without an attack, compared to the exiting methods EA-DRP & EE-OHRA the proposed secure optimization routing (BFOA) algorithm produced a minimum energy of 0.10 m joules, a minimal latency of 0.0035 m sec, a maximum throughput of 0.70 bps, and an 83 percent detection rate, with enhanced results obtained by using a selective packet dropping attack
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2022.3144679