Skip to main content

Advertisement

Log in

An approach for optimal-secure multi-path routing and intrusion detection in MANET

  • Special Issue
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

Mobile ad-hoc network (MANET) is dynamic in nature that is susceptible to energy and security constraints. Among most of the existing techniques, energy optimization was a hectic challenge, which is addressed effectively using the routing protocols. Accordingly, this paper proposes an effective multipath routing protocol in MANET based on an optimization algorithm. The energy and the security crisis in the MANET are addressed effectively using the cluster head (CH) selection and intrusion detection strategies namely, fuzzy clustering and fuzzy Naive Bayes (fuzzy NB). Then, the multipath routing progresses using the secure nodes based on the routing protocol, Bird swarm-whale optimization algorithm (BSWOA), which is the integration of bird swarm optimization (BSA) in whale optimization algorithm (WOA). The selection of the optimal routes is based on fitness factors, such as connectivity, energy, trust, and throughput. The analysis of the methods is done using the attacks, such as flooding, blackhole, and selective packet drop based on the performance metrics. The proposed BSWOA acquired the maximal energy, throughput, detection rate, and a minimal delay of 9.48 Joule, 0.676 bps, 69.9%, and 0.00372 ms in the presence of the attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Perkins CE, Royer EM (2003) Ad hoc on-demand distance vector routing (AODV). In: IETF RFC 3561, 2003

  2. Veeraiah N, Krishna BT (2018) Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy naïve bayes rule. Multimed Res (MR) 1(1):27–32

    Google Scholar 

  3. Cannuccia E, Phuoc VT, Brière B, Cario L, Janod E, Corraze B, Lepetit MB (2017) Combined first-principles calculations and experimental study of the phonon modes in the multiferroic compound GeV4S8. J Phys Chem 121(6):3522–3529

    Google Scholar 

  4. Barbari M, Conti L, Rossi G, Simonini S (2017) Supply of wood as environmental enrichment material to post-weaning piglets. Estonian Res Inst Agric 15(2):313–321

    Google Scholar 

  5. Sarkar S, Datta R (2013) A game theoreticmodel for stochastic routing in self-organized MANETs. In: Proceedings of the IEEE wireless communications and networking conference (WCNC), pp 1962–1967, 7-10 April 2013

  6. Yavuz AA, Alagoz F, Anarim E (2010) A new multi-tier adaptive military MANET security protocol using hybrid cryptography and sign cryption. Turk J Electr Eng Comput Sci 18(1):1–21

    Google Scholar 

  7. Marina MK, Das SR (2001) On-demand multipath distance vector routing in Ad hoc networks. In: Proceedings of the ninth international conference on network protocols (ICNP), California, pp 14–23, November 2001

  8. Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw 37(Part 2):209–227

    Article  Google Scholar 

  9. Anderegg L, Eidenbenz S (2003) Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of the ninth annual international conference on mobile computing and networking, MOBICOM 2003, 2003, San Diego, CA, USA, September 14–19, 2003

  10. Satheesh kumar S, Sengottaiyan N (2017) Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Cluster Comput 13:1–12

    Google Scholar 

  11. Sarkar S, Datta R (2013) AODV based technique for quick and secure local recovery from link failures in MANETs. Int J Commun Netw Distrib Syst 11(1):92–116

    Google Scholar 

  12. Lou W, Liu W, Zhang Y, Fang Y (2009) SPREAD: improving network security by multipath routing in mobile ad hoc networks. Wirel Netw 15(3):279–294

    Article  Google Scholar 

  13. Li J, Lewis HW (2016) Fuzzy clustering algorithms – review of the applications. In: Proceedings of the IEEE international conference on smart cloud (SmartCloud), pp 282–288

  14. Singh O, Singh J, Singh R (2018) Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Comput 21:51–63

    Article  Google Scholar 

  15. Subba B, Biswas S, Karmakar S (2016) Intrusion detection in mobile Ad hoc Networks: Bayesian game formulation. Eng Sci Technol 19(2):782–799

    Google Scholar 

  16. Yadav AK, Tripathi S (2017) QMRPRNS: design of QoS multicast routing protocol using reliable node selection scheme for MANETs. Peer Peer Netw Appl 10(4):897–909

    Article  Google Scholar 

  17. Chaudhry R, Tapaswi S (2018) Optimized power control and efficient energy conservation for topology management of MANET with an adaptive Gabriel graph. Comput Electr Eng 72:1021–1036

    Article  Google Scholar 

  18. Xian-Bing Meng XZ, Gao LL, Liu Y, Zhang H (2016) A new bio-inspired optimisation algorithm: bird swarm algorithm. J Exp Theor Artif Intell 28(4):673–687

    Article  Google Scholar 

  19. Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67

    Article  Google Scholar 

  20. Marchang N, Datta R, Das SK (2017) A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans Veh Technol 66(2):1684–1695

    Article  Google Scholar 

  21. Pi S, Sun B (2012) Fuzzy controllers based multipath routing algorithm in MANET. Phys Procedia 24(Part B):1178–1185

    Article  Google Scholar 

  22. Mohapatra P, Li J, Gui C (2009) QoS in mobile ad hoc networks. In: Proceedings of the IEEE 10th annual conference on wireless and microwave technology, vol 10, no 3, pp 44–53

  23. Jiang S, Liu Y, Yin Q (2004) Provisioning of adaptability to variable topologies for routing schemes in MANETs. IEEE J Sel Areas Commun 22(7):1347–1356

    Article  Google Scholar 

  24. Wan J, Liu J, Shao Z, Vasilakos AV, Imran M, Zhou K (2016) Mobile crowd sensing for traffic prediction in internet of vehicles. Sensors 16(1):1–15

    Article  Google Scholar 

  25. Dvir A, Vasilakos AV (2010) Backpressure-based routing protocol for DTNs. In: ACM SIGCOMM computer communication review vol 40, no 4, pp 405–406, August 2010

  26. Sarkar S, Kisku B, Misra S, Obaidat MS (2009) Chinese remainder theorem based RSA-threshold cryptography in mobile ad hoc networks using verifiable secret sharing. In: Proceedings of the Fifth IEEE international conference on wireless and mobile computing, networking and communications (WiMob’09), pp 258–262

  27. Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23(8):2455–2472

    Article  Google Scholar 

  28. Narayandas V, Tiruvayipati S, Hanmandlu M, Thimmareddy L (2017) Anomaly detection system in a cluster-Based MANET. In: Proceedings in computer communication, networking and internet security. Springer, Singapore, pp 11–21

  29. Usha G, Rajesh Babu M, Saravana Kumar S (2006) Dynamic anomaly detection using cross-layer security in MANET. Comput Electr Eng 59:1–11

    Google Scholar 

  30. Bhattacharya A, Sinha K (2017) An efficient protocol for load-balanced multipath routing in mobile ad hoc networks. Ad Hoc Netw 63:104–114

    Article  Google Scholar 

  31. Russia S, Anita R (2017) Joint cost and secured node disjoint energy efficient multipath routing in mobile ad hoc network. Wirel Netw 23(7):2307–2316

    Article  Google Scholar 

  32. Taha A, Alsaqour R, Uddin M, Abdelhaq M, Saba T (2017) Energy efficient multipath routing protocol for mobile ad-hoc network using the fitness function. IEEE Access 5:10369–10381

    Article  Google Scholar 

  33. Selvi PFA, Manikandan MSK (2017) Ant based multipath backbone routing for load balancing in MANET. IET Commun 11(1):136–141

    Article  Google Scholar 

  34. Bala K, Chandra Sekar A, Baskar M, Paramesh J (2019) An efficient multi level intrusion detection system for mobile ad-hoc network using clustering technique. Int J Eng Adv Technol (IJEAT) 8(6):1977–1985

    Article  Google Scholar 

  35. Yannam A, Prasad GVSNRV (2019) Trust aware intrustion detection system to defend attacks in MANET. Int J Innov Technol Explor Eng (IJITEE) 8(6):1298–1306

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neenavath Veeraiah.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Veeraiah, N., Krishna, B.T. An approach for optimal-secure multi-path routing and intrusion detection in MANET. Evol. Intel. 15, 1313–1327 (2022). https://doi.org/10.1007/s12065-020-00388-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-020-00388-7

Keywords

Navigation