Open Access Open Access  Restricted Access Subscription Access

Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E


Affiliations
1 Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, India
2 Department of Information and Technology, RMD Engineering College, Chennai, India
 

Multipath Routing (MR) technique is much common in Mobile Ad-hoc Networks (MANET) as they overcome single-path routing’s particular limitations. However, by reason of the deficiency of trusted centralized authority and also inadequate resources, attaining energy-effective secure MR is a significant challenge in MANET. Aimed at overcoming these challenges, this work proposes a trust-centred energy-efficient MR scheme for MANET. In this research, primarily, the direct and indirect trust of nodes and paths are examined and centred on these trust values, the secure multipath is selected and also the victim nodes are identified and isolated. Next, the data packets (DPs) are encrypted using the Secret key-centred Hybrid Honey Encryption (SH2E) algorithm to secure the DPs against data transmission (DT) attacks. Next, the Levy Flight centred Shuffled Shepherd Optimization (LF-SSO) Algorithm is applied to discover an optimal path as of the multipath selected. This algorithm improves the network’s lifetime by discovering a path based on path trust, residual node energy, and also the path’s distance. And then, the encrypted DPs are forwarded as of the source node (SN) onto the destination node (DN) over the discovered optimal path, and finally, transmitted to the base station (BS). This work not only considers the energy-efficient secure routing but also considers the route maintenance. The experiential outcomes are given to exhibit the proposed system’s efficacy.

Keywords

Encryption, Energy, Multipath Routing, Mobile Ad Hoc Networks, Optimization, Routing.
User
Notifications
Font Size

  • Poongothai T and Duraiswamy K, “Intrusion detection in mobile AdHoc networks using machine learning approach”, In International Conference on Information Communication and Embedded Systems (ICICES2014), IEEE, pp. 1-5, 2014.
  • Santosh Kumar Das, and Sachin Tripathi, “Intelligent energy-aware efficient routing for MANET”, Wireless Networks, vol. 24, no. 4, pp. 1139-1159, 2018.
  • De-gan Zhang, Jin-xin Gao, Xiao-huan Liu, Ting Zhang, and De-xin Zhao, “Novel approach of distributed & adaptive trust metrics for MANET”, Wireless Networks, vol. 25, no. 6, pp. 3587-3603, 2019.
  • Rajesh, M., and J. M. Gnanasekar, “Consistently neighbor detection for MANET”, In International Conference on Communication and Electronics Systems (ICCES), IEEE, pp. 1-9, 2016, 10.1109/CESYS.2016.7889967.
  • Muthukumaran, N, “Analyzing throughput of MANET with reduced packet loss”, Wireless Personal Communications, vol. 97, no. 1, pp. 565-578, 2017.
  • De-gan Zhang, Jin-xin Gao, Xiao-huan Liu, Ting Zhang, and De-xin Zhao, “Novel approach of distributed & adaptive trust metrics for MANET”, Wireless Networks, vol. 25, no. 6, pp. 3587-3603, 2019.
  • Anand, M., and T. Sasikala, “Efficient energy optimization in mobile ad hoc network (MANET) using better-quality AODV protocol”, Cluster Computing, vol. 22, no. 5, pp. 12681-12687, 2019.
  • Mohamed Elhoseny, and K. Shankar, “Reliable data transmission model for mobile ad hoc network using signcryption technique”, IEEE Transactions on Reliability, 2019, 10.1109/TR.2019.2915800.
  • Lakshman Narayana, V, and C. R. Bharathi, “Multi-mode routing mechanism with cryptographic techniques and reduction of packet drop using 2ACK scheme MANETs”, In Smart Intelligent Computing and Applications, Springer, Singapore, pp. 649-658, 2019, 10.1007/978-981-13-1921-1_63 ·.
  • Omuwa Oyakhire, and Koichi Gyoda, “Improved proactive routing protocol considering node density using game theory in dense networks”, Future Internet, vol. 12, no. 3, pp. 47, 2020.
  • Burhan Ul Islam Khan, Farhat Anwar, Rashidah Funke Olanrewaju, Bisma Rasool Pampori, and Roohie Naaz Mir, “A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic mobile adhoc networks”, IEEE Access, vol. 8, pp. 124097-124109, 2020, 10.1109/ACCESS.2020.3006043.
  • Santosh Kumar Das, and Sachin Tripathi, “A nonlinear strategy management approach in software-defined ad hoc network”, In Design Frameworks for Wireless Networks, Springer, Singapore, pp. 321-346, 2020, 10.1007/978-981-13-9574-1_14.
  • Gomathi Krishnasamy, “An energy aware fuzzy trust based clustering with group key management in MANET multicasting”, In 2nd International Conference on new Trends in Computing Sciences (ICTCS), IEEE, pp. 1-5, 2019, 10.1109/ICTCS.2019.8923088.
  • Pushpender Sarao, “Ad Hoc on-demand multipath distance vector based routing in Ad-Hoc Networks”, Wireless Personal Communications, pp. 1-21, 2019, 10.4236/cn.2013.53B2075.
  • Néstor J. Hetnández Marcano, Jonas Gabs Fugl Nørby, and Rune Hylsberg Jacobsen, “On Ad hoc On-Demand distance vector routing in low earth orbit nanosatellite constellations”, In IEEE 91st Vehicular Technology Conference (VTC2020-Spring), IEEE, pp. 1-6, 2020, 10.1109/VTC2020-Spring48590.2020.9128736.
  • Sankara Narayanan S., and G. Murugaboopathi, “Modified secure AODV protocol to prevent wormhole attack in MANET”, Concurrency and Computation: Practice and Experience, vol. 32, no. 4, pp. e5017, 2020.
  • Valmik Tilwari, Mhd Nour Hindia, Kaharudin Dimyati, Faizan Qamar, A. Talip, and M. Sofian, “Contention window and residual battery aware multipath routing schemes in mobile ad-hoc networks”, International Journal of Technology, vol. 10, no. 7, pp. 1376-1384, 2019.
  • Tino Merlin R and R. Ravi, “Novel trust based energy aware routing mechanism for mitigation of black hole attacks in MANET”, Wireless Personal Communications, vol. 104, no. 4, pp. 1599-1636, 2019.
  • Sulaiman Abdo Mahyoub Ghaleb, and V. Vasanthi, “Energy efficient multipath routing using multi-objective grey wolf optimizer based dynamic source routing algorithm for MANET”, International Journal of Advanced Science and Technology, vol. 29, no. 3, pp. 6096-6117, 2020.
  • Mariappan Rajashanthi, and K. Valarmathi, “A secure trusted multipath routing and optimal fuzzy logic for enhancing QoS in MANETs”, Wireless Personal Communications, pp. 1-16, 2019, 10.1007/s11277-019-07016-3.
  • Pattabiram Thulasingam Kasthuribai, and Murugaiyan Sundararajan, “Secured and QoS based energy-aware multipath routing in MANET”, Wireless Personal Communications, vol. 101, no. 4, pp. 2349-2364, 2018.
  • Neenavath Veeraiah and B. T. Krishna, “An approach for optimal-secure multi-path routing and intrusion detection in MANET”, Evolutionary Intelligence, pp. 1-15, 2020, https://doi.org/10.1007/s12065-020-00388-7.
  • Sannasy Muthurajkumar, Sannasi Ganapathy, Muthuswamy Vijayalakshmi, and Arputharaj Kannan, “An intelligent secured and energy efficient routing algorithm for MANETs”, Wireless Personal Communications, vol. 96, no. 2, pp. 1753-1769, 2017.
  • Aqeel Taha, Raed Alsaqour, Mueen Uddin, Maha Abdelhaq, and Tanzila Saba, “Energy efficient multipath routing protocol for mobile ad-hoc network using the fitness function”, IEEE access, vol. 5, pp. 10369-10381, 2017, 10.1109/ACCESS.2017.2707537.
  • Rajashanthi, M., and Valarmathi K, “Energy-efficient multipath routing in networking aid of clustering with OGFSO algorithm”, Soft Computing, pp. 1-10, 2020, 10.1007/s00500-020-04710-4.
  • Sajal Sarkar, and Raja Datta, “A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks”, Ad Hoc Networks, vol. 37, pp. 209-227, 2016.

Abstract Views: 21

PDF Views: 0




  • Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E

Abstract Views: 21  |  PDF Views: 0

Authors

Valanto Alappatt
Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, India
Joe Prathap P. M.
Department of Information and Technology, RMD Engineering College, Chennai, India

Abstract


Multipath Routing (MR) technique is much common in Mobile Ad-hoc Networks (MANET) as they overcome single-path routing’s particular limitations. However, by reason of the deficiency of trusted centralized authority and also inadequate resources, attaining energy-effective secure MR is a significant challenge in MANET. Aimed at overcoming these challenges, this work proposes a trust-centred energy-efficient MR scheme for MANET. In this research, primarily, the direct and indirect trust of nodes and paths are examined and centred on these trust values, the secure multipath is selected and also the victim nodes are identified and isolated. Next, the data packets (DPs) are encrypted using the Secret key-centred Hybrid Honey Encryption (SH2E) algorithm to secure the DPs against data transmission (DT) attacks. Next, the Levy Flight centred Shuffled Shepherd Optimization (LF-SSO) Algorithm is applied to discover an optimal path as of the multipath selected. This algorithm improves the network’s lifetime by discovering a path based on path trust, residual node energy, and also the path’s distance. And then, the encrypted DPs are forwarded as of the source node (SN) onto the destination node (DN) over the discovered optimal path, and finally, transmitted to the base station (BS). This work not only considers the energy-efficient secure routing but also considers the route maintenance. The experiential outcomes are given to exhibit the proposed system’s efficacy.

Keywords


Encryption, Energy, Multipath Routing, Mobile Ad Hoc Networks, Optimization, Routing.

References





DOI: https://doi.org/10.22247/ijcna%2F2021%2F209706