Adaptive-atom whale optimization algorithm using autonomous mobile ad hoc network for energy-efficient multipath routing

被引:0
作者
Halhalli, Suresh R. [1 ]
Jagdale, B. N. [2 ]
Sugave, Shounak Rushikesh [2 ]
机构
[1] MS Bidve Engn Coll, Elect Engn, Latur, India
[2] Dr Vishwanath Karad World Peace Univ, Sch CET, Pune, Maharashtra, India
关键词
MANET; energy; multipath routing; trust; mobility; PROTOCOL; SECURE;
D O I
10.1142/S179396232050052X
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile ad hoc network (MANET) consists of a group of self-operated mobile nodes that form a network without considering predefined infrastructure. In the network, each node poses less energy due to battery-operated sensor nodes. Numerous methods are devised for routing, but each method suffered from the energy constraint. This paper proposes an energy-efficient multipath routing protocol for exploiting different routes between source and destination to mitigate energy constraints. The key idea is to determine the optimal path from a set of paths available between the source and the target node. To improve the security in routing protocol, the factors, like energy, trust, and mobility are considered as major components. Here, the trust is modeled by considering trust factors, like average encounter rate (AER), successful cooperation frequency (SCF), direct trust, integrity factor, and forwarding rate factor. Moreover, secure routing is performed between the nodes using the proposed Adaptive-Atom Whale Optimization algorithm (Adaptive-AWOA). The proposed Adaptive-AWOA) is designed by incorporating the Adaptive concept in the Atom Whale Optimization algorithm (AWOA). The fitness function is newly modeled considering mobility, energy, and trust factors. The proposed Adaptive-AWOA outperformed the other methods with a minimal end-to-end delay of 0.009, maximal throughput of 85.802% and maximal packet delivery ratio (PDR) of 97.391%, respectively.
引用
收藏
页数:22
相关论文
共 33 条
[1]   Lightweight Sybil Attack Detection in MANETs [J].
Abbas, Sohail ;
Merabti, Madjid ;
Llewellyn-Jones, David ;
Kifayat, Kashif .
IEEE SYSTEMS JOURNAL, 2013, 7 (02) :236-248
[2]  
Ambekar R. K., 2019, EVOL INTELL, P1
[3]  
[Anonymous], 2017, FUTURE GENER COMPUT
[4]   On Residual Energy Maximization in Cognitive Relay Networks With Eavesdropping [J].
Banerjee, Avik ;
Maity, Santi P. .
IEEE SYSTEMS JOURNAL, 2019, 13 (04) :3836-3846
[5]   Intrusion detection for secure clustering and routing in mobile multi-hop wireless networks [J].
Bononi, Luciano ;
Tacconi, Carlo .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (06) :379-392
[6]   A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks [J].
Borkar, Gautam M. ;
Mahajan, A. R. .
WIRELESS NETWORKS, 2017, 23 (08) :2455-2472
[7]   A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs [J].
Cervera, Gimer ;
Barbeau, Michel ;
Garcia-Alfaro, Joaquin ;
Kranakis, Evangelos .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) :744-755
[8]  
Chakraborty, 2019, MULTIMEDIA RES, V2, P37
[9]   STACRP: a secure trusted auction oriented clustering based routing protocol for MANET [J].
Chatterjee, Pushpita ;
Sengupta, Indranil ;
Ghosh, S. K. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2012, 15 (03) :303-320
[10]  
Deshmukh M., 2019, Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET