A Hybrid Genetic Algorithm–Based Secure Multipath Routing Protocol with Trust-Aware Clustering for Performance Optimization in MANETs
DOI:
https://doi.org/10.31838/NJAP/08.02.16Keywords:
Mobile Adhoc Network, Routing, Security, Efficiency, OptimizationAbstract
Due to significant improvements in wireless communication, Mobile Ad Hoc Networks (MANET) have been utilized in different fields, such as power conservation, and the Internet of Things (IoT), etc.The present routing protocols employed in MANETs are limited by the concomitant issues. The network's design challenges include limiting energy consumption and ensuring node security. This article presents the Hybrid Secured Routing Protocol (HSRP), which utilizes a Genetic Algorithm (GA) and an optimization approach to choose the most effective route in a multipath scenario. The research focused on selecting the most optimal route to reach the destination. The path with the most significant fitness score is considered optimalusing density maxima and selected Cluster Heads (CHs) according to recent, indirect, and direct trusts. CHs select the best route using the cumulative characteristics of the ideal route, such as throughput, delay, and routing overhead.By obtaining a 17% improved packet delivery ratio, a 11% reduction in routing overhead with minimal attack detection time (68.6 sec) when compared to conventional procedures, the suggested HSRP model shows notable advantages over current approaches. These developments highlight the model's supremacy in energy conservation and dependable network performance.
References
1. Koot, M., &Wijnhoven, F., 2021. Usage impact on data center electricity needs: A system dynamic forecasting model. Applied Energy, 291, 116798 https://doi.org/10.1016/j.apenergy.2021.116798
2. Quy, V. K., Nam, V. H., Linh, D. M., & Ngoc, L. A., 2022. Routing algorithms for MANET-IoT networks: a comprehensive survey. Wireless Personal Communications, 125(4), pp.3501-3525 https://doi.org/10.1007/s11277-022-09722-x
3. Gurung, S., & Chauhan, S., “A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability,” Wireless Networks, vol. 26, 1981-2011, 2019, https://doi.org/10.1007/s11276-019-01966-z
4. Benatia, S. E., Smail, O., Meftah, B., Rebbah, M., & Cousin, B., “A reliable multipath routing protocol based on link quality and stability for MANETs in urban areas,” Simulation Modelling Practice and Theory, 113, 102397, 2021, https://doi.org/10.1016/j.simpat.2021.102397
5. Pamarthi, S., &Narmadha, R., “Intelligent privacy preservation protocol in wireless MANET for IoT applications using hybrid crow search-harrishawks optimization,” Wireless Networks, 28(6), 2713-2729 https://doi.org/10.1007/s11276-022-02986-y
6. Srilakshmi, U., Veeraiah, N., Alotaibi, Y., Alghamdi, S. A., Khalaf, O. I., &Subbayamma, B. V., “An improved hybrid secure multipath routing protocol for MANET,” IEEE Access, vol. 9, 163043-163053, 2021, https://doi.org/10.1109/ACCESS.2021.3133882
7. Chen, Z., Zhou, W., Wu, S., & Cheng, L., “An adaptive on-demand multipath routing protocol with QoS support for high-speed MANET,” IEEE Access, vol. 8, 44760-44773https://doi.org/10.1109/ACCESS.2020.2978582
8. K. Muthumanickam, S. Elango, P.C. Senthil Mahesh and P. Vijayalakshmi, "EASS: Encryption and Authentication Based Security Scheme to Prevent Power Exhausting Attacks in Wireless Sensor Networks". Ad Hoc & Sensor Wireless Networks, Vol. 45, pp. 253–273, 2019
9. Shah, N., El-Ocla, H., & Shah, P., “Adaptive routing protocol in mobile ad-hoc networks using genetic algorithm,” IEEE Access, vol. 10, 132949-132964, 2022, https://doi.org/10.1109/ACCESS.2022.3230991
10. K. Gowsic, K. Muthumanickam, A. Arthi and M.Saravanan, "An Enhanced Clustering Method for Optimal Energy Utilization and Improved Network Lifetime in IoT based WSN". Ad Hoc & Sensor Wireless Networks, Vol. 55, pp. 257–280, 2023
11. Singal, G., Laxmi, V., Gaur, M. S., Rao, D. V., Kushwaha, R., Garg, D., & Kumar, N., 2021. QoS–aware mesh-based multicast routing protocols in edge ad hoc networks: Concepts and challenges. ACM Transactions on Internet Technology (TOIT), 22(1), pp.1-27 https://doi.org/10.1145/3428150
12. Prema, S., & Divya, M. P. (2023). Two-Tier Architecture for Congestion-Free Routing in Manet Using a Hybrid Optimization Algorithm. Wireless Personal Communications, 131(1), 507-526 https://doi.org/10.1007/s11277-023-10442-z
13. Baird, I.; Wadhaj, I.; Ghaleb, B.; Thomson, C. Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs). Electronics 2024, 13, 3314.
14. Anish Pon Yamini, K., Suthendran, K., Arivoli, T., & Ravi, V. (2022). New approach for advanced energy efficiency in MANET (AEE-M) is improving optimized link state routing protocol version 2 (OLSRv2). Wireless Personal Communications, 125(3), pp.2369-2392https://doi.org/10.1007/s11277-022-09663-5
15. Shafi, S., Mounika, S. & Velliangiri, S. Machine learning and trust based AODV routing protocol to mitigate flooding and blackhole attacks in MANET. Procedia Comput. Sci. 218, 2309–2318 (2023)
16. Abu Bakar, R., Huang, X., Javed, M. S., Hussain, S. & Majeed, M. F. An intelligent agent-based detection system for DDoS attacks using automatic feature extraction and selection. Sensors 23(6), 3333 (2023)
17. Ali, A. M., Ngadi, M. A., Sham, R., &Al_Barazanchi, I. I. Enhanced QoS routing protocol for an unmanned ground vehicle based on the ACO approach. Sensors, 23(3) (2022) 1431https://doi.org/10.3390/s23031431
18. Yadav, K. et al. A secure multi-path communication through dynamic path identifiers to prevent denial-of-service flooding attacks. Inter. J. Intell. Syst. Appl. Eng., vol. 11, no. 3s, pp. 22–28, (2023)
19. Monfared, S. K., &Shokrollahi, S., 2023. DARVAN: A fully decentralized anonymous and reliable routing for VANets. Computer Networks, 223, 109561https://doi.org/10.1016/j.comnet.2023.109561
20. Mughaid, S. et al. Improved dropping attacks detecting system in 5 g networks using machine learning and deep learning approaches. Multi Tools Appl. 82(9), 13973–13995 (2023)
21. K. Baskar, P. Vijayalakshmi, K. Muthumanickam, A. Arthi, "A Novel Authentication and Access Scheduling Scheme to improve the Performance of WSN". Neural Network World, 33(4), pp. 205-225, 2023.
22. Abdelhamid, M. S., Elsayed, A. D., Jurcut & Azer, M. A. A Lightweight anomaly detection system for black hole attack. Electronics 12(6), 1294 (2023)
23. Pramodh Krishna D., E. Sandhya, Khaja Shareef Sk, Srihari Varma Mantena,Venkata Subbaiah Desanamukula, Ch Koteswararao, Srinivasa Rao Vemula & Maruthi Vemula, "Enhancing security and efficiency in Mobile Ad Hoc Networks using a hybrid deep learning model for flooding attack detection". Scientific Reports, 15:818, 2025.
24. Pantula, P. D., Miriyala, S. S., & Mitra, K., 2020. An evolutionary neuro-fuzzy C-means clustering technique. Engineering Applications of Artificial Intelligence, 89, 103435
25. Rath, M., &Pattanayak, B. K., 2021. Performance evaluation of optimized protocol in MANET. International. Journal of Information and Computer Security, 14(3-4), pp.318-326 https://doi.org/10.1504/ijics.2021.114708
26. Sinwar, D., Sharma, N., Maakar, S. K., & Kumar, S., 2020. Analysis and comparison of ant colony optimization algorithm with DSDV, AODV, and AOMDV based on the shortest path in MANET. Journal of Information and Optimization Sciences, 41(2), pp.621-632 https://doi.org/10.1080/02522667.2020.1733193




