ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK

Md. Torikur RAHMAN

torikurrahman@gmail.com
Uttara University, Department of Computer Science & Engineering, Dhaka (Bangladesh)
https://orcid.org/0000-0003-2173-6458

Mohammad ALAUDDIN


Uttara University (Bangladesh)

Uttam Kumar DEY


Uttara University (Bangladesh)

Dr. A.H.M. Saifullah SADI


Uttara University (Bangladesh)

Abstract

Nowadays Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to end users. Mobile Ad Hoc Networks (MANETs) are self-organizing wireless networks where nodes communicate with each other without a fixed infrastructure. Due to their unique characteristics, such as mobility, autonomy, and ad hoc connectivity, MANETs have become increasingly popular in various applications, including military, emergency response, and disaster management. However, the lack of infrastructure and dynamic topology of MANETs pose significant challenges to designing a secure and efficient routing protocol. This paper proposes an adaptive, secure, and efficient routing protocol that can enhance the performance of MANET. The proposed protocol incorporates various security mechanisms, including authentication, encryption, key management, and intrusion detection, to ensure secure routing. Additionally, the protocol considers energy consumption, network load, packet delivery fraction, route acquisition latency, packets dropped and Quality of Service (QoS) requirements of the applications to optimize network performance. Overall, the secure routing protocol for MANET should provide a reliable and secure communication environment that can adapt to the dynamic nature of the network. The protocol should ensure that messages are delivered securely and efficiently to the intended destination, while minimizing the risk of attacks and preserving the network resources Simulation results demonstrate that the proposed protocol outperforms existing routing protocols in terms of network performance and security. The proposed protocol can facilitate the deployment of various applications in MANET while maintaining security and efficiency.


Keywords:

MANETs,, ZRP, DoS, Encryption, Hashing

Agrawal, R., Faujdar, N., Romero, C. A. T., Sharma, O., Abdulsahib, G. M., Khalaf, O. I., Mansoor, R. F., & Ghoneim, O. A. (2022). Classification and comparison of ad hoc networks: A review. Egyptian Informatics Journal. 24(1), 1-25. https://doi.org/10.1016/j.eij.2022.10.004
DOI: https://doi.org/10.1016/j.eij.2022.10.004   Google Scholar

Aroulanandam, V. V., Latchoumi, T. P., Balamurugan, K., & Yookesh, T. L. (2020). Improving the energy efficiency in mobile Ad-Hoc network using learning-based routing. Revue d'Intelligence Artificielle, 34(3), 337-343. https://doi.org/10.18280/ria.340312
DOI: https://doi.org/10.18280/ria.340312   Google Scholar

Bagwari, A., Jee, R., Joshi, P., & Bisht, S. (2012, May). Performance of AODV routing protocol with increasing the MANET nodes and its effects on QoS of mobile ad hoc networks. 2012 International Conference on Communication Systems and Network Technologies (pp. 320-324). IEEE. https://doi.org/10.1109/CSNT.2012.76
DOI: https://doi.org/10.1109/CSNT.2012.76   Google Scholar

Bhattacharyya, A., Banerjee, A., Bose, D., Saha, H. N., & Bhattacharya, D. (2011). Different types of attacks in Mobile ADHOC Network. arXiv. https://doi.org/10.48550/arXiv.1111.4090
  Google Scholar

Fotohi, R., & Jamali, S. (2014). A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks. International journal of Computer Science & Network Solutions, 2(5), 37-56.
  Google Scholar

Goyal, P., Batra, S., & Singh, A. (2010). A literature review of security attack in mobile ad-hoc networks. International Journal of Computer Applications, 9(12), 11-15. https://doi.org/10.5120/1439-1947
DOI: https://doi.org/10.5120/1439-1947   Google Scholar

Hamdi, M. M., Audah, L., Abood, M. S., Rashid, S. A., Mustafa, A. S., Mahdi, H., & Al-Hiti, A. S. (2021). A review on various security attacks in vehicular ad hoc networks. Bulletin of Electrical Engineering and Informatics, 10(5), 2627-2635. https://doi.org/10.11591/eei.v10i5.3127
DOI: https://doi.org/10.11591/eei.v10i5.3127   Google Scholar

Hassan, H. J., Abdulsaheb, G. M., & Khalaf, O. I. (2022). Design of QoS on data collection in wireless sensor network for automation process. International Journal of Computer Applications in Technology, 68(3), 298-304. . https://doi.org/10.1504/IJCAT.2022.10049756
DOI: https://doi.org/10.1504/IJCAT.2022.124955   Google Scholar

Hinds, A., Ngulube, M., Zhu, S., & Al-Aqrabi, H. (2013). A review of routing protocols for mobile ad-hoc networks (manet). International journal of information and education technology, 3(1), 1-5. https://doi.org/10.7763/IJIET.2013.V3.223
DOI: https://doi.org/10.7763/IJIET.2013.V3.223   Google Scholar

Kariyannavar, S. S., Thakur, S., & Maheshwari, A. (2021, January). Security in mobile ADHOC networks: Survey. 2021 6th International Conference on Inventive Computation Technologies (ICICT) (pp. 135- 143). IEEE. https://doi.org/10.1109/ICICT50816.2021.9358611
DOI: https://doi.org/10.1109/ICICT50816.2021.9358611   Google Scholar

Lilhore, U. K., Khalaf, O. I., Simaiya, S., Tavera Romero, C. A., Abdulsahib, G. M., & Kumar, D. (2022). A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks. Symmetry, 15(2), 438. https://doi.org/10.3390/sym15020438
DOI: https://doi.org/10.1177/15501329221117118   Google Scholar

Liu, Y., Wu, H., Rezaee, K., Khosravi, M. R., Khalaf, O. I., Khan, A. A., ... & Qi, L. (2022). Interactionenhanced and time-aware graph convolutional network for successive point-of-interest recommendation in traveling enterprises. IEEE Transactions on Industrial Informatics, 19(1), 635-643. https://doi.org/10.1109/TII.2022.3200067
DOI: https://doi.org/10.1109/TII.2022.3200067   Google Scholar

Meddeb, R., Triki, B., Jemili, F., & Korbaa, O. (2017, May). A survey of attacks in mobile ad hoc networks. In 2017 international conference on engineering & MIS (ICEMIS) (pp. 1-7). IEEE. https://doi.org/10.1109/ICEMIS.2017.8273007
DOI: https://doi.org/10.1109/ICEMIS.2017.8273007   Google Scholar

Nagpal, S., Aggarwal, A., & Gaba, S. (2022, January). Privacy and security issues in vehicular Ad Hoc networks with preventive mechanisms. In Proceedings of International Conference on Intelligent Cyber-Physical Systems: ICPS 2021 (pp. 317-329). Springer Nature Singapore.
DOI: https://doi.org/10.1007/978-981-16-7136-4_24   Google Scholar

Navaneethan, T., & Lalli, M. (2014). Security attacks in Mobile Ad hoc Networks–A Literature Survey. International Jouranl of Computer Science and Mobile Applications, 2(4), 1-7.
  Google Scholar

Pamarthi, S., & Narmadha, R. (2022). Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms. International Journal of Intelligent Unmanned Systems, 10(4), 482-506. https://doi.org/10.1108/IJIUS-05-2021-0028
  Google Scholar

Pamarthi, S., & Narmadha, R. (2022). Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms. International Journal of Intelligent Unmanned Systems, 10(4), 482-506. https://doi.org/10.1108/IJIUS-05-2021-0028
DOI: https://doi.org/10.1108/IJIUS-05-2021-0028   Google Scholar

Ramphull, D., Mungur, A., Armoogum, S., & Pudaruth, S. (2021, May). A review of mobile ad hoc NETwork (MANET) Protocols and their Applications. 2021 5th international conference on intelligent computing and control systems (ICICCS) (pp. 204-211). IEEE. https://doi.org/10.1109/ICICCS51141.2021.9432258
DOI: https://doi.org/10.1109/ICICCS51141.2021.9432258   Google Scholar

Saminathan, K., & Thangavel, R. (2022). Energy efficient and delay aware clustering in mobile adhoc network: A hybrid fruit fly optimization algorithm and whale optimization algorithm approach. Concurrency and Computation: Practice and Experience, 34(11), e6867. https://doi.org/10.1002/cpe.6867
DOI: https://doi.org/10.1002/cpe.6867   Google Scholar

Schaumann, J. (2002). Analysis of the zone routing protocol.
  Google Scholar

Shajin, F. H., & Rajesh, P. (2022). Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol. International Journal of Pervasive Computing and Communications, 18(5), 603-621. https://doi.org/10.1108/IJPCC-09-2020- 0136
DOI: https://doi.org/10.1108/IJPCC-09-2020-0136   Google Scholar

Shantaf, A. M., Kurnaz, S., & Mohammed, A. H. (2020, June). Performance evaluation of three mobile ad-hoc network routing protocols in different environments. 2020 International Congress on Human-Computer https://doi.org/10.1007/s11277-022-09722-x
DOI: https://doi.org/10.1109/HORA49412.2020.9152845   Google Scholar

Shekhar, S., Mahajan, M., & Kaur, S. (2022). A Comprehensive Review of Various Attacks in Mobile Ad Hoc Networks. 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 638-643). IEEE. https://doi.org/10.1109/ICOEI53556.2022.9777180
DOI: https://doi.org/10.1109/ICOEI53556.2022.9777180   Google Scholar

Sirajuddin, M., Rupa, C., Iwendi, C., & Biamba, C. (2021). TBSMR: A trust-based secure multipath routing protocol for enhancing the QoS of the mobile ad hoc network. Security and Communication Networks, 2021, 5521713. https://doi.org/10.1155/2021/5521713
DOI: https://doi.org/10.1155/2021/5521713   Google Scholar

Sirmollo, C. Z., & Bitew, M. A. (2021). Mobility-aware routing algorithm for mobile ad hoc networks. Wireless Communications and Mobile Computing, 2021, 1-12. https://doi.org/10.1155/2021/6672297
DOI: https://doi.org/10.1155/2021/6672297   Google Scholar

Sk, B., Reddy-B, V., Vellela, S. S., D, R., Yakubreddy, K., & Rao, M. V. (2023). Novel and Secure Protocol for Trusted Wireless Ad-hoc Network Creation. merging Technologies and Innovative Research, 10(3). https://ssrn.com/abstract=4429086
  Google Scholar

Soomro, A. M., Fudzee, M. F. B. M., Hussain, M., Saim, H. M., Zaman, G., Atta-ur-Rahman, H. A., & Nabil, M. (2022). Comparative review of routing protocols in manet for future research in disaster management. Journal of Communications, 17(9). 734-744. https://doi.org/10.12720/jcm.17.9.734-744
DOI: https://doi.org/10.12720/jcm.17.9.734-744   Google Scholar

Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access, 10, 14260-14269. https://doi.org/10.1109/ACCESS.2022.3144679
DOI: https://doi.org/10.1109/ACCESS.2022.3144679   Google Scholar

Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile ad-hoc network (MANET). IEEE Access, 9, 11872-11883. https://doi.org/10.1109/ACCESS.2021.3051491
DOI: https://doi.org/10.1109/ACCESS.2021.3051491   Google Scholar

Tripathy, B. K., Jena, S. K., Bera, P., & Das, S. (2020). An adaptive secure and efficient routing protocol for mobile ad hoc networks. Wireless Personal Communications, 114, 1339-1370. https://doi.org/10.1007/s11277-020-07423-x
DOI: https://doi.org/10.1007/s11277-020-07423-x   Google Scholar

Tsao, K. Y., Girdler, T., & Vassilakis, V. G. (2022). A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Networks, 133, 102894. https://doi.org/10.1016/j.adhoc.2022.102894
DOI: https://doi.org/10.1016/j.adhoc.2022.102894   Google Scholar

Vinoth Kumar, V., Deepa, R., Ranjith, D., Balamurugan, M., & Balajee, J. M. (2022, February). Selection of routing protocol-based QoS improvement for mobile ad Hoc network. International Conference on Computing, Communication, Electrical and Biomedical Systems (pp. 317-330). Springer. https://doi.org/10.1007/978-3-030-86165-0_26
DOI: https://doi.org/10.1007/978-3-030-86165-0_26   Google Scholar

Xu, K., Hong, X., & Gerla, M. (2002, April). An ad hoc network with mobile backbones. 2002 IEEE international conference on communications. Conference Proceedings. ICC 2002 (Cat. No. 02CH37333) (Vol. 5, pp. 3138-3143). IEEE. https://doi.org/10.1109/ICC.2002.997415
DOI: https://doi.org/10.1109/ICC.2002.997415   Google Scholar

Download


Published
2023-09-30

Cited by

RAHMAN, M. T., ALAUDDIN, M., DEY, U. K. ., & SADI, D. A. S. . (2023). ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK. Applied Computer Science, 19(3), 133–159. https://doi.org/10.35784/acs-2023-29

Authors

Md. Torikur RAHMAN 
torikurrahman@gmail.com
Uttara University, Department of Computer Science & Engineering, Dhaka Bangladesh
https://orcid.org/0000-0003-2173-6458

Authors

Mohammad ALAUDDIN 

Uttara University Bangladesh

Authors

Uttam Kumar DEY 

Uttara University Bangladesh

Authors

Dr. A.H.M. Saifullah SADI 

Uttara University Bangladesh

Statistics

Abstract views: 391
PDF downloads: 182


License

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.