Abstract
Mobile ad-hoc network (MANET) is dynamic in nature that is susceptible to energy and security constraints. Among most of the existing techniques, energy optimization was a hectic challenge, which is addressed effectively using the routing protocols. Accordingly, this paper proposes an effective multipath routing protocol in MANET based on an optimization algorithm. The energy and the security crisis in the MANET are addressed effectively using the cluster head (CH) selection and intrusion detection strategies namely, fuzzy clustering and fuzzy Naive Bayes (fuzzy NB). Then, the multipath routing progresses using the secure nodes based on the routing protocol, Bird swarm-whale optimization algorithm (BSWOA), which is the integration of bird swarm optimization (BSA) in whale optimization algorithm (WOA). The selection of the optimal routes is based on fitness factors, such as connectivity, energy, trust, and throughput. The analysis of the methods is done using the attacks, such as flooding, blackhole, and selective packet drop based on the performance metrics. The proposed BSWOA acquired the maximal energy, throughput, detection rate, and a minimal delay of 9.48 Joule, 0.676 bps, 69.9%, and 0.00372 ms in the presence of the attack.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Perkins CE, Royer EM (2003) Ad hoc on-demand distance vector routing (AODV). In: IETF RFC 3561, 2003
Veeraiah N, Krishna BT (2018) Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy naïve bayes rule. Multimed Res (MR) 1(1):27–32
Cannuccia E, Phuoc VT, Brière B, Cario L, Janod E, Corraze B, Lepetit MB (2017) Combined first-principles calculations and experimental study of the phonon modes in the multiferroic compound GeV4S8. J Phys Chem 121(6):3522–3529
Barbari M, Conti L, Rossi G, Simonini S (2017) Supply of wood as environmental enrichment material to post-weaning piglets. Estonian Res Inst Agric 15(2):313–321
Sarkar S, Datta R (2013) A game theoreticmodel for stochastic routing in self-organized MANETs. In: Proceedings of the IEEE wireless communications and networking conference (WCNC), pp 1962–1967, 7-10 April 2013
Yavuz AA, Alagoz F, Anarim E (2010) A new multi-tier adaptive military MANET security protocol using hybrid cryptography and sign cryption. Turk J Electr Eng Comput Sci 18(1):1–21
Marina MK, Das SR (2001) On-demand multipath distance vector routing in Ad hoc networks. In: Proceedings of the ninth international conference on network protocols (ICNP), California, pp 14–23, November 2001
Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw 37(Part 2):209–227
Anderegg L, Eidenbenz S (2003) Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of the ninth annual international conference on mobile computing and networking, MOBICOM 2003, 2003, San Diego, CA, USA, September 14–19, 2003
Satheesh kumar S, Sengottaiyan N (2017) Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Cluster Comput 13:1–12
Sarkar S, Datta R (2013) AODV based technique for quick and secure local recovery from link failures in MANETs. Int J Commun Netw Distrib Syst 11(1):92–116
Lou W, Liu W, Zhang Y, Fang Y (2009) SPREAD: improving network security by multipath routing in mobile ad hoc networks. Wirel Netw 15(3):279–294
Li J, Lewis HW (2016) Fuzzy clustering algorithms – review of the applications. In: Proceedings of the IEEE international conference on smart cloud (SmartCloud), pp 282–288
Singh O, Singh J, Singh R (2018) Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Comput 21:51–63
Subba B, Biswas S, Karmakar S (2016) Intrusion detection in mobile Ad hoc Networks: Bayesian game formulation. Eng Sci Technol 19(2):782–799
Yadav AK, Tripathi S (2017) QMRPRNS: design of QoS multicast routing protocol using reliable node selection scheme for MANETs. Peer Peer Netw Appl 10(4):897–909
Chaudhry R, Tapaswi S (2018) Optimized power control and efficient energy conservation for topology management of MANET with an adaptive Gabriel graph. Comput Electr Eng 72:1021–1036
Xian-Bing Meng XZ, Gao LL, Liu Y, Zhang H (2016) A new bio-inspired optimisation algorithm: bird swarm algorithm. J Exp Theor Artif Intell 28(4):673–687
Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67
Marchang N, Datta R, Das SK (2017) A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans Veh Technol 66(2):1684–1695
Pi S, Sun B (2012) Fuzzy controllers based multipath routing algorithm in MANET. Phys Procedia 24(Part B):1178–1185
Mohapatra P, Li J, Gui C (2009) QoS in mobile ad hoc networks. In: Proceedings of the IEEE 10th annual conference on wireless and microwave technology, vol 10, no 3, pp 44–53
Jiang S, Liu Y, Yin Q (2004) Provisioning of adaptability to variable topologies for routing schemes in MANETs. IEEE J Sel Areas Commun 22(7):1347–1356
Wan J, Liu J, Shao Z, Vasilakos AV, Imran M, Zhou K (2016) Mobile crowd sensing for traffic prediction in internet of vehicles. Sensors 16(1):1–15
Dvir A, Vasilakos AV (2010) Backpressure-based routing protocol for DTNs. In: ACM SIGCOMM computer communication review vol 40, no 4, pp 405–406, August 2010
Sarkar S, Kisku B, Misra S, Obaidat MS (2009) Chinese remainder theorem based RSA-threshold cryptography in mobile ad hoc networks using verifiable secret sharing. In: Proceedings of the Fifth IEEE international conference on wireless and mobile computing, networking and communications (WiMob’09), pp 258–262
Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23(8):2455–2472
Narayandas V, Tiruvayipati S, Hanmandlu M, Thimmareddy L (2017) Anomaly detection system in a cluster-Based MANET. In: Proceedings in computer communication, networking and internet security. Springer, Singapore, pp 11–21
Usha G, Rajesh Babu M, Saravana Kumar S (2006) Dynamic anomaly detection using cross-layer security in MANET. Comput Electr Eng 59:1–11
Bhattacharya A, Sinha K (2017) An efficient protocol for load-balanced multipath routing in mobile ad hoc networks. Ad Hoc Netw 63:104–114
Russia S, Anita R (2017) Joint cost and secured node disjoint energy efficient multipath routing in mobile ad hoc network. Wirel Netw 23(7):2307–2316
Taha A, Alsaqour R, Uddin M, Abdelhaq M, Saba T (2017) Energy efficient multipath routing protocol for mobile ad-hoc network using the fitness function. IEEE Access 5:10369–10381
Selvi PFA, Manikandan MSK (2017) Ant based multipath backbone routing for load balancing in MANET. IET Commun 11(1):136–141
Bala K, Chandra Sekar A, Baskar M, Paramesh J (2019) An efficient multi level intrusion detection system for mobile ad-hoc network using clustering technique. Int J Eng Adv Technol (IJEAT) 8(6):1977–1985
Yannam A, Prasad GVSNRV (2019) Trust aware intrustion detection system to defend attacks in MANET. Int J Innov Technol Explor Eng (IJITEE) 8(6):1298–1306
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Veeraiah, N., Krishna, B.T. An approach for optimal-secure multi-path routing and intrusion detection in MANET. Evol. Intel. 15, 1313–1327 (2022). https://doi.org/10.1007/s12065-020-00388-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12065-020-00388-7