ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK
Article Sidebar
Open full text
Issue Vol. 19 No. 3 (2023)
-
A LATIN AMERICAN MARKET ASSET VOLATILITY ANALYSIS: A COMPARISON OF GARCH MODEL, ARTIFICIAL NEURAL NETWORKS AND SUPPORT VECTOR REGRESSION
Victor CHUNG, Jenny ESPINOZA1-16
-
IMPACT OF FRICTION COEFFICIENT VARIATION ON TEMPERATURE FIELD IN ROTARY FRICTION WELDING OF METALS – FEM STUDY
Andrzej ŁUKASZEWICZ, Jerzy JÓZWIK, Kamil CYBUL17-27
-
FUZZY MULTIPLE CRITERIA GROUP DECISION-MAKING IN PERFORMANCE EVALUATION OF MANUFACTURING COMPANIES
Sara SALEHI28-46
-
NUMERICAL CALCULATIONS OF WATER DROP USING A FIREFIGHTING AIRCRAFT
Zbigniew CZYŻ, Paweł KARPIŃSKI, Krzysztof SKIBA, Szymon BARTKOWSKI47-63
-
EVALUATION OF SUPPORT VECTOR MACHINE BASED STOCK PRICE PREDICTION
Tilla IZSÁK, László MARÁK, Mihály ORMOS64-82
-
DATA ENGINEERING IN CRISP-DM PROCESS PRODUCTION DATA – CASE STUDY
Jolanta BRZOZOWSKA, Jakub PIZOŃ, Gulzhan BAYTIKENOVA, Arkadiusz GOLA, Alfiya ZAKIMOVA, Katarzyna PIOTROWSKA83-95
-
ROTATION-GAMMA CORRECTION AUGMENTATION ON CNN-DENSE BLOCK FOR SOIL IMAGE CLASSIFICATION
Sri INDRA MAIYANTI, Anita DESIANI, Syafrina LAMIN, P PUSPITAHATI, Muhammad ARHAMI, Nuni GOFAR, Destika CAHYANA96-115
-
RETRACTED PAPER: Enhancing 3D human pose estimation through multi-feature fusion
Xianlei GE, Vladimir MARIANO116-132
-
ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK
Md. Torikur RAHMAN, Mohammad ALAUDDIN, Uttam Kumar DEY, Dr. A.H.M. Saifullah SADI133-159
-
PERFORMANCE EVALUATION OF STOCK PREDICTION MODELS USING EMAGRU
Erizal ERIZAL, Mohammad DIQI160-173
Archives
-
Vol. 21 No. 3
2025-10-05 12
-
Vol. 21 No. 2
2025-06-27 12
-
Vol. 21 No. 1
2025-03-31 12
-
Vol. 20 No. 4
2025-01-31 12
-
Vol. 20 No. 3
2024-09-30 12
-
Vol. 20 No. 2
2024-08-14 12
-
Vol. 20 No. 1
2024-03-30 12
-
Vol. 19 No. 4
2023-12-31 10
-
Vol. 19 No. 3
2023-09-30 10
-
Vol. 19 No. 2
2023-06-30 10
-
Vol. 19 No. 1
2023-03-31 10
-
Vol. 18 No. 4
2022-12-30 8
-
Vol. 18 No. 3
2022-09-30 8
-
Vol. 18 No. 2
2022-06-30 8
-
Vol. 18 No. 1
2022-03-30 7
-
Vol. 17 No. 4
2021-12-30 8
-
Vol. 17 No. 3
2021-09-30 8
-
Vol. 17 No. 2
2021-06-30 8
-
Vol. 17 No. 1
2021-03-30 8
Main Article Content
DOI
Authors
Abstract
Nowadays Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to end users. Mobile Ad Hoc Networks (MANETs) are self-organizing wireless networks where nodes communicate with each other without a fixed infrastructure. Due to their unique characteristics, such as mobility, autonomy, and ad hoc connectivity, MANETs have become increasingly popular in various applications, including military, emergency response, and disaster management. However, the lack of infrastructure and dynamic topology of MANETs pose significant challenges to designing a secure and efficient routing protocol. This paper proposes an adaptive, secure, and efficient routing protocol that can enhance the performance of MANET. The proposed protocol incorporates various security mechanisms, including authentication, encryption, key management, and intrusion detection, to ensure secure routing. Additionally, the protocol considers energy consumption, network load, packet delivery fraction, route acquisition latency, packets dropped and Quality of Service (QoS) requirements of the applications to optimize network performance. Overall, the secure routing protocol for MANET should provide a reliable and secure communication environment that can adapt to the dynamic nature of the network. The protocol should ensure that messages are delivered securely and efficiently to the intended destination, while minimizing the risk of attacks and preserving the network resources Simulation results demonstrate that the proposed protocol outperforms existing routing protocols in terms of network performance and security. The proposed protocol can facilitate the deployment of various applications in MANET while maintaining security and efficiency.
Keywords:
References
Agrawal, R., Faujdar, N., Romero, C. A. T., Sharma, O., Abdulsahib, G. M., Khalaf, O. I., Mansoor, R. F., & Ghoneim, O. A. (2022). Classification and comparison of ad hoc networks: A review. Egyptian Informatics Journal. 24(1), 1-25. https://doi.org/10.1016/j.eij.2022.10.004 DOI: https://doi.org/10.1016/j.eij.2022.10.004
Aroulanandam, V. V., Latchoumi, T. P., Balamurugan, K., & Yookesh, T. L. (2020). Improving the energy efficiency in mobile Ad-Hoc network using learning-based routing. Revue d'Intelligence Artificielle, 34(3), 337-343. https://doi.org/10.18280/ria.340312 DOI: https://doi.org/10.18280/ria.340312
Bagwari, A., Jee, R., Joshi, P., & Bisht, S. (2012, May). Performance of AODV routing protocol with increasing the MANET nodes and its effects on QoS of mobile ad hoc networks. 2012 International Conference on Communication Systems and Network Technologies (pp. 320-324). IEEE. https://doi.org/10.1109/CSNT.2012.76 DOI: https://doi.org/10.1109/CSNT.2012.76
Bhattacharyya, A., Banerjee, A., Bose, D., Saha, H. N., & Bhattacharya, D. (2011). Different types of attacks in Mobile ADHOC Network. arXiv. https://doi.org/10.48550/arXiv.1111.4090
Fotohi, R., & Jamali, S. (2014). A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks. International journal of Computer Science & Network Solutions, 2(5), 37-56.
Goyal, P., Batra, S., & Singh, A. (2010). A literature review of security attack in mobile ad-hoc networks. International Journal of Computer Applications, 9(12), 11-15. https://doi.org/10.5120/1439-1947 DOI: https://doi.org/10.5120/1439-1947
Hamdi, M. M., Audah, L., Abood, M. S., Rashid, S. A., Mustafa, A. S., Mahdi, H., & Al-Hiti, A. S. (2021). A review on various security attacks in vehicular ad hoc networks. Bulletin of Electrical Engineering and Informatics, 10(5), 2627-2635. https://doi.org/10.11591/eei.v10i5.3127 DOI: https://doi.org/10.11591/eei.v10i5.3127
Hassan, H. J., Abdulsaheb, G. M., & Khalaf, O. I. (2022). Design of QoS on data collection in wireless sensor network for automation process. International Journal of Computer Applications in Technology, 68(3), 298-304. . https://doi.org/10.1504/IJCAT.2022.10049756 DOI: https://doi.org/10.1504/IJCAT.2022.124955
Hinds, A., Ngulube, M., Zhu, S., & Al-Aqrabi, H. (2013). A review of routing protocols for mobile ad-hoc networks (manet). International journal of information and education technology, 3(1), 1-5. https://doi.org/10.7763/IJIET.2013.V3.223 DOI: https://doi.org/10.7763/IJIET.2013.V3.223
Kariyannavar, S. S., Thakur, S., & Maheshwari, A. (2021, January). Security in mobile ADHOC networks: Survey. 2021 6th International Conference on Inventive Computation Technologies (ICICT) (pp. 135- 143). IEEE. https://doi.org/10.1109/ICICT50816.2021.9358611 DOI: https://doi.org/10.1109/ICICT50816.2021.9358611
Lilhore, U. K., Khalaf, O. I., Simaiya, S., Tavera Romero, C. A., Abdulsahib, G. M., & Kumar, D. (2022). A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks. Symmetry, 15(2), 438. https://doi.org/10.3390/sym15020438 DOI: https://doi.org/10.1177/15501329221117118
Liu, Y., Wu, H., Rezaee, K., Khosravi, M. R., Khalaf, O. I., Khan, A. A., ... & Qi, L. (2022). Interactionenhanced and time-aware graph convolutional network for successive point-of-interest recommendation in traveling enterprises. IEEE Transactions on Industrial Informatics, 19(1), 635-643. https://doi.org/10.1109/TII.2022.3200067 DOI: https://doi.org/10.1109/TII.2022.3200067
Meddeb, R., Triki, B., Jemili, F., & Korbaa, O. (2017, May). A survey of attacks in mobile ad hoc networks. In 2017 international conference on engineering & MIS (ICEMIS) (pp. 1-7). IEEE. https://doi.org/10.1109/ICEMIS.2017.8273007 DOI: https://doi.org/10.1109/ICEMIS.2017.8273007
Nagpal, S., Aggarwal, A., & Gaba, S. (2022, January). Privacy and security issues in vehicular Ad Hoc networks with preventive mechanisms. In Proceedings of International Conference on Intelligent Cyber-Physical Systems: ICPS 2021 (pp. 317-329). Springer Nature Singapore. DOI: https://doi.org/10.1007/978-981-16-7136-4_24
Navaneethan, T., & Lalli, M. (2014). Security attacks in Mobile Ad hoc Networks–A Literature Survey. International Jouranl of Computer Science and Mobile Applications, 2(4), 1-7.
Pamarthi, S., & Narmadha, R. (2022). Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms. International Journal of Intelligent Unmanned Systems, 10(4), 482-506. https://doi.org/10.1108/IJIUS-05-2021-0028
Pamarthi, S., & Narmadha, R. (2022). Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms. International Journal of Intelligent Unmanned Systems, 10(4), 482-506. https://doi.org/10.1108/IJIUS-05-2021-0028 DOI: https://doi.org/10.1108/IJIUS-05-2021-0028
Ramphull, D., Mungur, A., Armoogum, S., & Pudaruth, S. (2021, May). A review of mobile ad hoc NETwork (MANET) Protocols and their Applications. 2021 5th international conference on intelligent computing and control systems (ICICCS) (pp. 204-211). IEEE. https://doi.org/10.1109/ICICCS51141.2021.9432258 DOI: https://doi.org/10.1109/ICICCS51141.2021.9432258
Saminathan, K., & Thangavel, R. (2022). Energy efficient and delay aware clustering in mobile adhoc network: A hybrid fruit fly optimization algorithm and whale optimization algorithm approach. Concurrency and Computation: Practice and Experience, 34(11), e6867. https://doi.org/10.1002/cpe.6867 DOI: https://doi.org/10.1002/cpe.6867
Schaumann, J. (2002). Analysis of the zone routing protocol.
Shajin, F. H., & Rajesh, P. (2022). Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol. International Journal of Pervasive Computing and Communications, 18(5), 603-621. https://doi.org/10.1108/IJPCC-09-2020- 0136 DOI: https://doi.org/10.1108/IJPCC-09-2020-0136
Shantaf, A. M., Kurnaz, S., & Mohammed, A. H. (2020, June). Performance evaluation of three mobile ad-hoc network routing protocols in different environments. 2020 International Congress on Human-Computer https://doi.org/10.1007/s11277-022-09722-x DOI: https://doi.org/10.1109/HORA49412.2020.9152845
Shekhar, S., Mahajan, M., & Kaur, S. (2022). A Comprehensive Review of Various Attacks in Mobile Ad Hoc Networks. 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 638-643). IEEE. https://doi.org/10.1109/ICOEI53556.2022.9777180 DOI: https://doi.org/10.1109/ICOEI53556.2022.9777180
Sirajuddin, M., Rupa, C., Iwendi, C., & Biamba, C. (2021). TBSMR: A trust-based secure multipath routing protocol for enhancing the QoS of the mobile ad hoc network. Security and Communication Networks, 2021, 5521713. https://doi.org/10.1155/2021/5521713 DOI: https://doi.org/10.1155/2021/5521713
Sirmollo, C. Z., & Bitew, M. A. (2021). Mobility-aware routing algorithm for mobile ad hoc networks. Wireless Communications and Mobile Computing, 2021, 1-12. https://doi.org/10.1155/2021/6672297 DOI: https://doi.org/10.1155/2021/6672297
Sk, B., Reddy-B, V., Vellela, S. S., D, R., Yakubreddy, K., & Rao, M. V. (2023). Novel and Secure Protocol for Trusted Wireless Ad-hoc Network Creation. merging Technologies and Innovative Research, 10(3). https://ssrn.com/abstract=4429086
Soomro, A. M., Fudzee, M. F. B. M., Hussain, M., Saim, H. M., Zaman, G., Atta-ur-Rahman, H. A., & Nabil, M. (2022). Comparative review of routing protocols in manet for future research in disaster management. Journal of Communications, 17(9). 734-744. https://doi.org/10.12720/jcm.17.9.734-744 DOI: https://doi.org/10.12720/jcm.17.9.734-744
Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access, 10, 14260-14269. https://doi.org/10.1109/ACCESS.2022.3144679 DOI: https://doi.org/10.1109/ACCESS.2022.3144679
Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile ad-hoc network (MANET). IEEE Access, 9, 11872-11883. https://doi.org/10.1109/ACCESS.2021.3051491 DOI: https://doi.org/10.1109/ACCESS.2021.3051491
Tripathy, B. K., Jena, S. K., Bera, P., & Das, S. (2020). An adaptive secure and efficient routing protocol for mobile ad hoc networks. Wireless Personal Communications, 114, 1339-1370. https://doi.org/10.1007/s11277-020-07423-x DOI: https://doi.org/10.1007/s11277-020-07423-x
Tsao, K. Y., Girdler, T., & Vassilakis, V. G. (2022). A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Networks, 133, 102894. https://doi.org/10.1016/j.adhoc.2022.102894 DOI: https://doi.org/10.1016/j.adhoc.2022.102894
Vinoth Kumar, V., Deepa, R., Ranjith, D., Balamurugan, M., & Balajee, J. M. (2022, February). Selection of routing protocol-based QoS improvement for mobile ad Hoc network. International Conference on Computing, Communication, Electrical and Biomedical Systems (pp. 317-330). Springer. https://doi.org/10.1007/978-3-030-86165-0_26 DOI: https://doi.org/10.1007/978-3-030-86165-0_26
Xu, K., Hong, X., & Gerla, M. (2002, April). An ad hoc network with mobile backbones. 2002 IEEE international conference on communications. Conference Proceedings. ICC 2002 (Cat. No. 02CH37333) (Vol. 5, pp. 3138-3143). IEEE. https://doi.org/10.1109/ICC.2002.997415 DOI: https://doi.org/10.1109/ICC.2002.997415
Article Details
Abstract views: 575
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.
