An approach for optimal-secure multi-path routing and intrusion detection in MANET

被引:36
作者
Veeraiah, Neenavath [1 ]
Krishna, B. T. [2 ]
机构
[1] DVR & DHS MIC Coll Technol, Kanchikacharla 521180, Andhra Pradesh, India
[2] JNTUK Univ, Kakinada, Andhra Pradesh, India
关键词
Mobile ad-hoc network; Multipath routing; Optimization; Naive Bayes; Intrusion detection; Bird swarm optimization; Whale optimization algorithm; PROTOCOL; CRYPTOGRAPHY;
D O I
10.1007/s12065-020-00388-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile ad-hoc network (MANET) is dynamic in nature that is susceptible to energy and security constraints. Among most of the existing techniques, energy optimization was a hectic challenge, which is addressed effectively using the routing protocols. Accordingly, this paper proposes an effective multipath routing protocol in MANET based on an optimization algorithm. The energy and the security crisis in the MANET are addressed effectively using the cluster head (CH) selection and intrusion detection strategies namely, fuzzy clustering and fuzzy Naive Bayes (fuzzy NB). Then, the multipath routing progresses using the secure nodes based on the routing protocol, Bird swarm-whale optimization algorithm (BSWOA), which is the integration of bird swarm optimization (BSA) in whale optimization algorithm (WOA). The selection of the optimal routes is based on fitness factors, such as connectivity, energy, trust, and throughput. The analysis of the methods is done using the attacks, such as flooding, blackhole, and selective packet drop based on the performance metrics. The proposed BSWOA acquired the maximal energy, throughput, detection rate, and a minimal delay of 9.48 Joule, 0.676 bps, 69.9%, and 0.00372 ms in the presence of the attack.
引用
收藏
页码:1313 / 1327
页数:15
相关论文
共 35 条
[1]  
Anderegg L, 2003, P 9 ANN INT C MOB CO
[2]  
Bala K., 2019, INT J ENG ADV TECHNO, V8, P1977
[3]  
Barbari M., 2017, Agronomy Research, V15, P313
[4]   An efficient protocol for load-balanced multipath routing in mobile ad hoc networks [J].
Bhattacharya, Ansuman ;
Sinha, Koushik .
AD HOC NETWORKS, 2017, 63 :104-114
[5]   A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks [J].
Borkar, Gautam M. ;
Mahajan, A. R. .
WIRELESS NETWORKS, 2017, 23 (08) :2455-2472
[6]   Combined First-Principles Calculations and Experimental Study of the Phonon Modes in the Multiferroic Compound GeV4S8 [J].
Cannuccia, Elena ;
Vinh Ta Phuoc ;
Briere, Benjamin ;
Cario, Laurent ;
Janod, Etienne ;
Corraze, Benoit ;
Lepetit, Marie Bernadette .
JOURNAL OF PHYSICAL CHEMISTRY C, 2017, 121 (06) :3522-3529
[7]   Optimized power control and efficient energy conservation for topology management of MANET with an adaptive Gabriel graph [J].
Chaudhry, Rashmi ;
Tapaswi, Shashikala .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 72 :1021-1036
[8]   Backpressure-based Routing Protocol for DTNs [J].
Dvir, Amit ;
Vasilakos, Athanasios V. .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (04) :405-406
[9]   Provisioning of adaptability to variable topologies for routing schemes in MANETs [J].
Jiang, SM ;
Liu, YD ;
Jiang, YM ;
Yin, QG .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004, 22 (07) :1347-1356
[10]   Ontology Cohesion and Coupling Metrics [J].
Kumar, Sandeep ;
Baliyan, Niyati ;
Sukalikar, Shriya .
INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2017, 13 (04) :1-26