Skip to main content
Log in

Secure Routing in MANETS Using Adaptive Cuckoo Search and Entropy Based Signature Authentication

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

MANET (Mobile Ad hoc Network) is a collection of self-organizing mobile nodes that operate independently of centralized administration or existing infrastructure. MANETs are particularly vulnerable to a range of security risks as a result of this feature. Furthermore, most MANET routing methods are built on the assumption that the network contains no hostile nodes. As a result, various efforts and studies have gone into developing ad hoc networks, and a safe and reliable routing mechanism. Adaptive cuckoo search optimization and entropy-based signature authentication were proposed in this research for safe routing in MANETs. The network's nodes are first clustered using energy sigmoid-based fuzzy c-means clustering. The nodes in the cluster are then given an entropy-based signature. After that, the link lifetime and path distance are estimated to determine the node's future location. Adaptive cuckoo search optimization is then used to find further optimized routes. Finally, entropy-based signature verification is used to ensure secure routing. The experimental results show that the suggested secure routing technique surpasses existing techniques in terms of performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data Availability

Not applicable.

References

  1. Awatade, S., & Joshi, S. (2016). Improved EAACK: develop secure intrusion detection system for MANETs using hybrid cryptography. In 2016 International conference on computing communication control and automation (ICCUBEA) (pp. 1–4). IEEE.

  2. Kapur, R. K., & Khatri, S. K. (2015). Secure data transfer in MANET using symmetric and asymmetric cryptography. In 2015 4th International conference on reliability, infocom technologies and optimization (ICRITO), (trends and future directions) (pp. 1–5). IEEE.

  3. Tareq, M., Alsaqour, R., Abdelhaq, M., & Uddin, M. (2017). Mobile ad hoc network energy cost algorithm based on artificial bee colony. Wireless Communications and Mobile Computing, 2017.

  4. Banerjee, P. S., Das, K., Das, S., & Chaudhuri, S. R. B. (2014). AMSPR: A secure multipath routing in mobile ad hoc networks (MANET). In 2014 International conference on devices, circuits and communications (ICDCCom) (pp. 1–6).

  5. Sharma, S. K., Kumar, R., Gangwar, A., & Pakhre, K. (2014). Routing protocols and security issues in MANET: A survey. International Journal of Emerging Technology and Advanced Engineering (IJETAE), 4(4), 918–924.

    Google Scholar 

  6. JoshibhaBency, Annadurai, Ramkumar, Rajesh. (2019). Lightweight node authentication and establishing a secure AODV protocol in mobile ad hoc network. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8.

  7. Rajan, C., & N. Shanthi. (2013). Misbehaving attack mitigation technique for multicast security in mobile ad hoc networks (MANET). Journal of Theoretical & Applied Information Technology, 48(3).

  8. Rajamanickam, V., & Veerappan, D. (2014). Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks. IET Information Security, 8(4), 234–239.

    Article  Google Scholar 

  9. Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: Milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85–96.

    Article  Google Scholar 

  10. Chen, J. T., Boreli, R., & Sivaraman, V. (2012). Improving the efficiency of anonymous routing for MANETs. Computer Communications, 35(5), 619–627.

    Article  Google Scholar 

  11. Zhang, X. M., Wang, E. B., Xia, J. J., & Sung, D. K. (2013). A neighbor coverage-based probabilistic rebroadcast for reducing routing overhead in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 12(3), 424–433.

    Article  Google Scholar 

  12. Macone, D., Oddi, G., & Pietrabissa, A. (2013). MQ-Routing: Mobility-, GPS-and energy-aware routing protocol in MANETs for disaster relief scenarios. Ad Hoc Networks, 11(3), 861–878.

    Article  Google Scholar 

  13. Choudhury, P., Gaddam, R., Parisi, R. B., Dasari, M. B., & Vuppala, S. (2010). A new multi-language encryption technique for MANET. In International conference on advances in information and communication technologies (pp. 22–28). Springer.

  14. Mamatha, G. S., & Sharma, S. C. (2014). Analyzing the MANET variations, challenges, capacity and protocol issues. International Journal of Computer Science & Engineering Survey (IJCSES), 1(1), 14–21.

    Article  Google Scholar 

  15. Jabbar, W. A., Ismail, M., Nordin, R., & Arif, S. (2017). Power-efficient routing schemes for MANETs: A survey and open issues. Wireless Networks, 23(6), 1917–1952.

    Article  Google Scholar 

  16. Zougagh, H., Toumanari, A., Latif, R., Elmourabit, Y., & Idboufker, N. (2014). Modified olsr protocol for detection and prevention of packet dropping attack in MANET. International Journal of Computer Applications, 100(17).

  17. Taneja, S., & Kush, A. (2010). A survey of routing protocols in mobile ad hoc networks. International Journal of Innovation, Management and Technology, 1(3), 279.

    Google Scholar 

  18. Maan, F., & Mazhar, N.: MANET routing protocols vs mobility models: A performance evaluation. In 2011 Third international conference on ubiquitous and future networks (ICUFN) (pp. 179–184).

  19. Kodole, A., & Agarkar, P. M. (2015). A survey of routing protocols in mobile ad hoc networks. Multidisciplinary Journal of Research in Engineering and Technology, 2(1), 336–341.

    Google Scholar 

  20. Satheeshkumar, S., & Sengottaiyan, N. (2017). Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Cluster Computing, 1–12.

  21. Cai, R. J., Li, X. J., & Chong, P. H. J. (2018). An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Transactions on Mobile Computing, 18(1), 42–55.

    Article  Google Scholar 

  22. Ermiş, O., Bahtiyar, Ş, Anarım, E., & Çağlayan, M. U. (2017). A secure and efficient group key agreement approach for mobile ad hoc networks. Ad Hoc Networks, 67, 24–39.

    Article  Google Scholar 

  23. Hammamouche, A., Omar, M., Djebari, N., & Tari, A. (2018). Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. Journal of Information Security and Applications, 43, 12–20.

    Article  Google Scholar 

  24. Usman, M., Jan, M. A., He, X., & Nanda, P. (2018). QASEC: A secured data communication scheme for mobile ad-hoc networks. Future Generation Computer Systems.

  25. Anbarasan, M., Prakash, S., Antonidoss, A., & Anand, M. (2018). Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks. Multimedia Tools and Applications, 1–21.

  26. Sood, I., & Sharma, V. (2021). Comparing computational intelligent techniques for DDOS attacks detection. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(6), 4774–4789.

    Google Scholar 

  27. Han, L., Cao, S., Yang, X., & Zhang, Z. (2020). Privacy protection of VANET based on traceable ring signature on Ideal lattice. IEEE Access, 8, 206581–206591.

    Article  Google Scholar 

  28. Jamaesha, S. S., & Bhavani, S. (2019). A secure and efficient cluster based location aware routing protocol in MANET. Cluster Computing, 22(2), 4179–4186.

    Article  Google Scholar 

  29. Sathiya, D., & Gomathy, B. (2019). Improved security and routing path learning in MANETs using Beer-Quiche game theoritical model in cloud computing. Cluster Computing, 22(1), 21–31.

    Article  Google Scholar 

Download references

Funding

In this research article has not been funded by anyone.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Srinivas Aluvala.

Ethics declarations

Conflict of Interest

All authors do not have any conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aluvala, S., Rajasekhar, K. Secure Routing in MANETS Using Adaptive Cuckoo Search and Entropy Based Signature Authentication. Wireless Pers Commun 128, 1519–1541 (2023). https://doi.org/10.1007/s11277-022-10008-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10008-5

Keywords

Navigation