Skip to main content
Log in

A Review: An Efficient and Reliable Secure Routing Mechanism with the Prevention of Attacks in Mobile Ad-Hoc Network (MANET)

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In wireless communication systems, Wireless ad hoc network plays a significant role in the research domain. MANET is also an ad hoc network that build a temporary network to transmit data around the network utilizing multi-hop routers. MANET is utilized in various regions of life such as real-time information, network portioning, rescue operation, interpersonal communication, and information sharing. To deliver data accurately and quickly, MANET has changed its topology and nodes dynamically. Because of the mobility nature of nodes, the chances of routing design problem are maximum among the nodes. In this review, other categories of Routing Protocols (RPs) such as Geographical Multicast Routing Protocols (Geocast RPs), Power-Aware Routing Protocols, Multipath Routing Protocols, Hierarchical Routing Protocols, Multicast Routing Protocols and Location-Aware Routing Protocols are discussed and compared its attribute on various parameters. Also, the MANET networks are vulnerable to attacks at different tiers. Moreover, secure routing is a significant concern in MANET. Therefore, this review discusses various attacks and solutions for resisting attacks in MANET environment. It protects the network from both active and passive attacks. Attackers can dominate the scattered MANET and wireless design to minimize its potentials.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Shantaf, A. M., Kurnaz, S., & Mohammed, A. H. (2020). Performance evaluation of three mobile ad-hoc network routing protocols in different environments. In 2020 International congress on Human–computer interaction, optimization and robotic applications (HORA) (pp. 1–6). IEEE.

  2. Ghodichor, N., Namdeoe, V., & Borkar, G. (2022). Secure routing protocol against internal and external attack in MANET. In Proceedings of the international conference on emerging trends in artificial intelligence and smart systems, THEETAS 2022, 16–17 April 2022, Jabalpur, India.

  3. Fayaz, M., Mehmood, G., Khan, A., Abbas, S., Fayaz, M., & Gwak, J. (2022). Counteracting selfish nodes using reputation based system in mobile Ad Hoc networks. Electronics, 11(2), 185.

    Article  Google Scholar 

  4. Wheeb, A. H., & Al-Jamali, N. A. S. (2022). Performance analysis of OLSR protocol in mobile ad hoc networks. iJIM16(01), 107.

  5. Zulkifli, C. Z., Ismail, R., Ibrahim, A. B., & Boonsong, W. (2022). Performance analysis of proactive routing protocol based on different network load in mobile ad-hoc network (MANET). Evolution of Information, Communication and Computing System, 46–53.

  6. Thamizhmaran, K., & Charles, A. (2022). Comparison of on-demand routing protocol for MANET using Simulation. i-Manager's Journal on Communication Engineering and Systems11(1), 13.

  7. Addanki, U. K., & Kumar, B. H. (2023). Hybrid optimization of OLSR routing protocol in MANETs: Uniting genetic algorithm and particle swarm optimization. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 131–141.

    Google Scholar 

  8. Rajeshkumar, G., Kumar, M. V., Kumar, K. S., Bhatia, S., Mashat, A., & Dadheech, P. (2023). An improved multi-objective particle swarm optimization routing on MANET. Computer Systems Science & Engineering44(2).

  9. Murugesan, G., Padmaa, M., Nagarajan, K., & Premkumar, N. Secured and efficient data transmission in MANETS against malicious attack using DSR routing and BCS clustering with hybrid AES-ECC cryptanalysis.

  10. Khudayer, B. H., Alzabin, L. R., Anbar, M., Tawafak, R. M., Alamiedy, T. A., Malik, S. I., & Alfarsi, G. M. (2022). An optimizing rebroadcast mechanism for minimizing the control overhead in mobile ad-hoc networks. Journal of Theoretical and Applied Information Technology100(8).

  11. Chandravanshi, K., Soni, G., & Mishra, D. K. (2022). Design and analysis of an energy-efficient load balancing and bandwidth aware adaptive multipath N-channel routing approach in MANET. IEEE Access, 10, 110003–110025.

    Article  Google Scholar 

  12. Naseem, M., Ahamad, G., Sharma, S., & Abbasi, E. (2021). EE-LB-AOMDV: An efficient energy constraints-based load-balanced multipath routing protocol for MANETs. International Journal of Communication Systems, 34(16), e4946.

    Article  Google Scholar 

  13. Rani, S., & Sharma, V. (2023). Energy and load aware multipath route selection for mobile ad hoc networks. International Journal of Advanced Computer Technology, 12(5), 11–19.

    Google Scholar 

  14. Samadi, R., Nazari, A., & Seitz, J. (2023). Intelligent energy-aware routing protocol in mobile IoT networks based on SDN. IEEE Transactions on Green Communications and Networking.

  15. Kaddoura, S., Haraty, R. A., Al Jahdali, S., & Assi, M. (2023). SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs. Peer-to-Peer Networking and Applications, 16(5), 2325–2348.

    Article  Google Scholar 

  16. Kaur, P., Batra, S., & Rana, P. S. (2024). Border-hunting optimization for mobile agent-based intrusion detection with deep convolutional neural network. Concurrency and Computation: Practice and Experience, 36(1), e7876.

    Article  Google Scholar 

  17. Jose, M. R., & Vigila, S. M. C. (2023). F-CAPSO: Fuzzy chaos adaptive particle swarm optimization for energy-efficient and secure data transmission in MANET. Expert Systems with Applications, 234, 120944.

    Article  Google Scholar 

  18. Tahboush, M., Adawy, M., & Aloqaily, O. (2023). PEO-AODV: Preserving energy optimization based on modified AODV routing protocol for MANET. International Journal of Advances in Soft Computing & Its Applications15(2).

  19. Rao, G. B. N., & Tripathy, A. K. (2024). Energy aware routing through genetic algorithm and AOMDV in MANET. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 435–441.

    Google Scholar 

  20. Adnan Hadi A, Vahab AL-Din Makki S (2023) Performance improvements for MANET routing protocols using a combination of cat and particle swarm optimization (CPSO). International Journal of Nonlinear Analysis and Applications, 14(1), 2821–2829.

  21. Manhar, A., & Dembla, D. (2023). Improved hybrid routing protocol (IHRP) in MANETs based on situation based adaptive routing. International Journal of Electrical and Electronics Research, 11(1), 15–24.

    Article  Google Scholar 

  22. Arulselvan, G., & Rajaram, A. (2023). Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs. Journal of Intelligent & Fuzzy Systems, (Preprint), 1–16.

  23. Jeyaraj, D., Yesudhasan, J., & Aliar, A. A. S. (2023). Developing multi-path routing protocol in MANET using hybrid SM-CSBO based on novel multi-objective function. International Journal of Communication Systems, 36(4), e5404.

    Article  Google Scholar 

  24. Meenakshi, K., Revathi, M., Harsha, S. S., Tamilarasi, K., Shanthi, T. S., Sugumar, D., & Rajaram, A. Hybrid machine learning approach for trust evaluation to secure MANET from routing attacks. Journal of Intelligent & Fuzzy Systems, (Preprint), 1–17.

  25. Rao, T. V., Swamy, V. K., Karthigeyan, K. A., Gopalakrishnan, S., Kalaichelvi, T., & Koteswari, S. (2023). Energy efficient trust based data communication using AODV protocol in MANET. Journal of Advanced Research in Applied Sciences and Engineering Technology, 32(1), 390–405.

    Google Scholar 

  26. Saxena, M., Dutta, S., Singh, B. K., & Neogy, S. (2023). Multi-objective based route selection approach using AOMDV in MANET. SN Computer Science, 4(5), 581.

    Article  Google Scholar 

  27. Al-Essa, R. I., & Al-Suhail, G. A. (2023). AFB-GPSR: Adaptive beaconing strategy based on fuzzy logic scheme for geographical routing in a mobile ad hoc network (MANET). Computation, 11(9), 174.

    Article  Google Scholar 

  28. Benatia, S. E., Smail, O., Meftah, B., Rebbah, M., & Cousin, B. (2021). A reliable multipath routing protocol based on link quality and stability for MANETs in urban areas. Simulation Modelling Practice and Theory, 113, 102397.

    Article  Google Scholar 

  29. Sarkar, S. (2022). Mobility aware and reliable multipath routing protocol for MANETs. International Journal of Ad Hoc and Ubiquitous Computing, 41(4), 256–269.

    Article  Google Scholar 

  30. Veeraiah, N., Khalaf, O. I., Prasad, C. V. P. R., Alotaibi, Y., Alsufyani, A., Alghamdi, S. A., & Alsufyani, N. (2021). Trust aware secure energy efficient hybrid protocol for manet. IEEE Access, 9, 120996–121005.

    Article  Google Scholar 

  31. Soomro, A. M., Saim, M., bin Naeem, A., Soomro, M. A., Khurshid, I., & Baloch, M. A. (2022). Analysis study of routing protocols in MANET for disaster management. Journal of Computing & Biomedical Informatics, 3(02), 124–135.

    Google Scholar 

  32. Rezvanian, A., Vahidipour, S. M., & Saghiri, A. M. (2024). CaAIS: Cellular automata-based artificial immune system for dynamic environments. Algorithms, 17(1), 18.

    Article  Google Scholar 

  33. Shanmugham, K., Rangan, R., Dhatchnamurthy, S., & Pundir, S. (2024). An efficient self-attention-based conditional variational auto-encoder generative adversarial networks based multipath cross-layer design routing paradigm for MANET. Expert Systems with Applications, 238, 122097.

    Article  Google Scholar 

  34. Li, X., Bian, X., & Li, M. (2024). Routing selection algorithm for mobile ad hoc networks based on neighbor node density. Sensors, 24(2), 325.

    Article  PubMed  Google Scholar 

  35. Gupta, P., Goel, P., Varshney, P., & Tyagi, N. (2019). Reliability factor based AODV protocol: Prevention of black hole attack in MANET. In Smart innovations in communication and computational sciences: Proceedings of ICSICCS-2018 (pp. 271–279). Springer, Singapore.

  36. Sankara Narayanan, S., & Murugaboopathi, G. (2020). Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency and Computation: Practice and Experience, 32(4), e5017.

    Article  Google Scholar 

  37. Rajendran, N., Jawahar, P. K., & Priyadarshini, R. (2019). Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. Computer Communications, 148, 129–135.

    Article  Google Scholar 

  38. Hassan, K. L., Mandal, J. K., & Mondal, S. (2019). Enhanced trust-based intrusion detection system in manet.

  39. Salah, S., Zaghal, R., & Abdeljawad, M. (2022). A mathematical-based model for estimating the path duration of the DSDV routing protocol in MANETs. Journal of Sensor and Actuator Networks, 11(2), 23.

    Article  Google Scholar 

  40. Wang, N., Datla, R., & Jhajj, H. (2019). NCMDSDV: A neighbor coverage multipsth DSDV Routing Protocol for MANETs. In 2019 IEEE 11th international conference on communication software and networks (ICCSN) (pp. 46–50). IEEE.

  41. Jain, R., & Kashyap, I. (2019). An QoS aware link defined OLSR (LD-OLSR) routing protocol for MANETs. Wireless Personal Communications, 108(3), 1745–1758.

    Article  Google Scholar 

  42. Saif, A. A. A., & Kumar, K. (2022). Enhance the performance of AODV routing protocol in mobile ad-hoc networks. Journal of Physics: Conference Series (Vol. 2327, No. 1, p. 012057). IOP Publishing.

  43. M Haglan, H. (2021). Determining an optimum zone radius for zone routing protocol (ZRP) based on node mobility.

  44. Manhar, A., & Dembla, D. (2021). Design an improved hybrid routing protocol strategy to minimize delay and overhead for MANET. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(6), 2407–2419.

    Article  Google Scholar 

  45. Allimuthu, U., & Mahalakshmi, K. (2023). Efficient mobile ad hoc route maintenance against social distances using attacker detection automation. Mobile Networks and Applications, 28(1), 128–159.

    Article  Google Scholar 

  46. Qabajeh, M. M. (2022). SGMRP: Scalable geographic multicast routing protocol for mobile ad hoc networks.

  47. Qabajeh, L. K. (2022). a scalable multicast routing protocol for mobile ad-hoc networks. Journal of Telecommunications and Information Technology, (2).

  48. Jamaesha, S. S., & Bhavani, S. (2019). A secure and efficient cluster based location aware routing protocol in MANET. Cluster Computing, 22(Suppl 2), 4179–4186.

    Article  Google Scholar 

  49. Benazer, S. S., Dawood, M. S., Suganya, G., & Ramanathan, S. K. (2021). Performance analysis of modified on-demand multicast routing protocol for MANET using non forwarding nodes. Materials Today: Proceedings, 45, 2603–2605.

    Google Scholar 

  50. Kaur, G., & Midha, K. (2022). Review of MANET security features. Mathematical Statistician and Engineering Applications, 71(4), 2430–2439.

    Google Scholar 

  51. Sivapriya, N., & Mohandas, R. (2022). Analysis on essential challenges and attacks on MANET security appraisal. Journal of Algebraic Statistics, 13(3), 2578–2589.

    Google Scholar 

  52. Uthumansa, A., & Shantha, F. (2022). Lightweight security mechanism to mitigate active attacks in a mobile ad-hoc network.

  53. Al-Shareeda, M. A., & Manickam, S. (2022). Man-in-the-middle attacks in mobile ad hoc networks (MANETs): Analysis and evaluation. Symmetry, 14(8), 1543.

    Article  Google Scholar 

  54. Kumar, V., Shankar, M., Tripathi, A. M., Yadav, V., Rai, A. K., Khan, U., & Rahul, M. (2022). Prevention of Blackhole Attack in MANET using certificateless signature scheme. Journal of Scientific & Industrial Research, 81(10), 1061–1072.

    Google Scholar 

  55. Rao, P. V., Murthy, K. S., Krishnan, V. G., Divya, V., & Sathyamoorthy, K. Detection of sybil attack in MANET environment using Anfis with bloom filter algorithm.

  56. Esiefarienrhe, B. M., Phakathi, T., & Lugayizi, F. (2022). Node-based QoS-aware security framework for sinkhole attacks in mobile ad-hoc networks. In Telecom (Vol. 3, No. 3, pp. 407–432). MDPI.

  57. Narayanan, S. S., & Murugaboopathi, G. (2020). Prevention of rushing attack in MANET using threshold-based approach. International Journal of Internet Technology and Secured Transactions, 10(5), 576–584.

    Article  Google Scholar 

  58. Zardari, Z. A., He, J., Pathan, M. S., Qureshi, S., Hussain, M. I., Razaque, F., & Zhu, N. (2021). Detection and prevention of jellyfish attacks using knn algorithm and trusted routing scheme in manet. International Journal of Network Security, 23(1), 77–87.

    Google Scholar 

  59. Suseendran, G., Chandrasekaran, E., & Nayyar, A. (2019). Defending jellyfish attack in mobile ad hoc networks via novel fuzzy system rule. In Data management, analytics and innovation: Proceedings of ICDMAI 2018, Volume 2 (pp. 437–455). Springer, Singapore.

  60. Venkatasubramanian, S., Suhasini, A., & Hariprasath, S. Detection of black and grey hole attacks using hybrid cat with PSO-based deep learning algorithm in MANET. International Journal of Computer Networks and Applications (IJCNA), 724–735.

  61. Sbai, O., & Elboukhari, M. (2022). Mobile ad hoc networks intrusion detection system against packet dropping attacks. Indonesian Journal of Electrical Engineering and Computer Science, 26(2), 819–825.

    Article  Google Scholar 

  62. Narayana, V. L., & Bharathi, C. R. (2019). Multi-mode routing mechanism with cryptographic techniques and reduction of packet drop using 2ACK scheme MANETs. In Smart intelligent computing and applications: Proceedings of the second international conference on SCI 2018, Volume 1 (pp. 649–658). Springer, Singapore.

  63. Kannan, K. R., & Marimuthu, C. N. (2024). Energy efficient routing technique using enthalpy ant net routing for zone-based MANETS. IETE Journal of Research, 1–13.

  64. Panda, N., & Pattanayak, B. K. (2020). ACO-based secure routing protocols in MANETs. In New Paradigm in decision science and management: Proceedings of ICDSM 2018 (pp. 195–206). Springer, Singapore.

  65. Navamani, M. R., & Elamathi, N. (2022). Tversky Indexive Cramer–Shoup cryptography based deep structured belief neural learning for secured routing in MANET. Journal of Theoretical and Applied Information Technology100(12).

  66. Kumar, S. (2022). Security enhancement in mobile ad-hoc network using novel data integrity based hash protection process. Wireless Personal Communications, 123(2), 1059–1083.

    Article  MathSciNet  Google Scholar 

  67. Ben Brahim, G., Mohammad, N., El-Hajj, W., Parr, G., & Scotney, B. (2022). Performance evaluation and comparison study of adaptive MANET service location and discovery protocols for highly dynamic environments. EURASIP Journal on Wireless Communications and Networking, 2022(1), 1–21.

    Article  Google Scholar 

  68. Hande, J. Y., & Sadiwala, R. (2024). Data security-based routing in MANETs using key management mechanism. SN Computer Science, 5(1), 155.

    Article  Google Scholar 

  69. Singh, C. E., & Vigila, S. M. C. (2023). Fuzzy based intrusion detection system in MANET. Measurement: Sensors26, 100578.

  70. Olaniyan, O. M., Olusesi, A. T., Omodunbi, B. A., Wahab, W. B., Adetunji, O. J., & Olukoya, B. M. A data security model for mobile ad hoc network using linear function mayfly advanced encryption standard.

  71. Prasad, R. (2022). Enhanced energy efficient secure routing protocol for mobile ad-hoc network. Global Transitions Proceedings, 3(2), 412–423.

    Article  Google Scholar 

  72. Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access, 10, 14260–14269.

    Article  Google Scholar 

Download references

Acknowledgements

None.

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

Both the authors have contributed equally to the work.

Corresponding author

Correspondence to K. S. Prasanna.

Ethics declarations

Conflict of interest

The authors declare that they have no potential conflict of interest.

Ethical Approval

All applicable institutional and/or national guidelines for the care and use of animals were followed.

Informed Consent

For this type of analysis formal consent is not needed.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prasanna, K.S., Ramesh, B. A Review: An Efficient and Reliable Secure Routing Mechanism with the Prevention of Attacks in Mobile Ad-Hoc Network (MANET). Wireless Pers Commun 133, 2541–2580 (2023). https://doi.org/10.1007/s11277-024-10888-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-10888-9

Keywords

Navigation