ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK
Md. Torikur RAHMAN
torikurrahman@gmail.comUttara University, Department of Computer Science & Engineering, Dhaka (Bangladesh)
https://orcid.org/0000-0003-2173-6458
Mohammad ALAUDDIN
Uttara University (Bangladesh)
Uttam Kumar DEY
Uttara University (Bangladesh)
Dr. A.H.M. Saifullah SADI
Uttara University (Bangladesh)
Abstract
Nowadays Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to end users. Mobile Ad Hoc Networks (MANETs) are self-organizing wireless networks where nodes communicate with each other without a fixed infrastructure. Due to their unique characteristics, such as mobility, autonomy, and ad hoc connectivity, MANETs have become increasingly popular in various applications, including military, emergency response, and disaster management. However, the lack of infrastructure and dynamic topology of MANETs pose significant challenges to designing a secure and efficient routing protocol. This paper proposes an adaptive, secure, and efficient routing protocol that can enhance the performance of MANET. The proposed protocol incorporates various security mechanisms, including authentication, encryption, key management, and intrusion detection, to ensure secure routing. Additionally, the protocol considers energy consumption, network load, packet delivery fraction, route acquisition latency, packets dropped and Quality of Service (QoS) requirements of the applications to optimize network performance. Overall, the secure routing protocol for MANET should provide a reliable and secure communication environment that can adapt to the dynamic nature of the network. The protocol should ensure that messages are delivered securely and efficiently to the intended destination, while minimizing the risk of attacks and preserving the network resources Simulation results demonstrate that the proposed protocol outperforms existing routing protocols in terms of network performance and security. The proposed protocol can facilitate the deployment of various applications in MANET while maintaining security and efficiency.
Keywords:
MANETs,, ZRP, DoS, Encryption, HashingReferences
Agrawal, R., Faujdar, N., Romero, C. A. T., Sharma, O., Abdulsahib, G. M., Khalaf, O. I., Mansoor, R. F., & Ghoneim, O. A. (2022). Classification and comparison of ad hoc networks: A review. Egyptian Informatics Journal. 24(1), 1-25. https://doi.org/10.1016/j.eij.2022.10.004
DOI: https://doi.org/10.1016/j.eij.2022.10.004
Google Scholar
Aroulanandam, V. V., Latchoumi, T. P., Balamurugan, K., & Yookesh, T. L. (2020). Improving the energy efficiency in mobile Ad-Hoc network using learning-based routing. Revue d'Intelligence Artificielle, 34(3), 337-343. https://doi.org/10.18280/ria.340312
DOI: https://doi.org/10.18280/ria.340312
Google Scholar
Bagwari, A., Jee, R., Joshi, P., & Bisht, S. (2012, May). Performance of AODV routing protocol with increasing the MANET nodes and its effects on QoS of mobile ad hoc networks. 2012 International Conference on Communication Systems and Network Technologies (pp. 320-324). IEEE. https://doi.org/10.1109/CSNT.2012.76
DOI: https://doi.org/10.1109/CSNT.2012.76
Google Scholar
Bhattacharyya, A., Banerjee, A., Bose, D., Saha, H. N., & Bhattacharya, D. (2011). Different types of attacks in Mobile ADHOC Network. arXiv. https://doi.org/10.48550/arXiv.1111.4090
Google Scholar
Fotohi, R., & Jamali, S. (2014). A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks. International journal of Computer Science & Network Solutions, 2(5), 37-56.
Google Scholar
Goyal, P., Batra, S., & Singh, A. (2010). A literature review of security attack in mobile ad-hoc networks. International Journal of Computer Applications, 9(12), 11-15. https://doi.org/10.5120/1439-1947
DOI: https://doi.org/10.5120/1439-1947
Google Scholar
Hamdi, M. M., Audah, L., Abood, M. S., Rashid, S. A., Mustafa, A. S., Mahdi, H., & Al-Hiti, A. S. (2021). A review on various security attacks in vehicular ad hoc networks. Bulletin of Electrical Engineering and Informatics, 10(5), 2627-2635. https://doi.org/10.11591/eei.v10i5.3127
DOI: https://doi.org/10.11591/eei.v10i5.3127
Google Scholar
Hassan, H. J., Abdulsaheb, G. M., & Khalaf, O. I. (2022). Design of QoS on data collection in wireless sensor network for automation process. International Journal of Computer Applications in Technology, 68(3), 298-304. . https://doi.org/10.1504/IJCAT.2022.10049756
DOI: https://doi.org/10.1504/IJCAT.2022.124955
Google Scholar
Hinds, A., Ngulube, M., Zhu, S., & Al-Aqrabi, H. (2013). A review of routing protocols for mobile ad-hoc networks (manet). International journal of information and education technology, 3(1), 1-5. https://doi.org/10.7763/IJIET.2013.V3.223
DOI: https://doi.org/10.7763/IJIET.2013.V3.223
Google Scholar
Kariyannavar, S. S., Thakur, S., & Maheshwari, A. (2021, January). Security in mobile ADHOC networks: Survey. 2021 6th International Conference on Inventive Computation Technologies (ICICT) (pp. 135- 143). IEEE. https://doi.org/10.1109/ICICT50816.2021.9358611
DOI: https://doi.org/10.1109/ICICT50816.2021.9358611
Google Scholar
Lilhore, U. K., Khalaf, O. I., Simaiya, S., Tavera Romero, C. A., Abdulsahib, G. M., & Kumar, D. (2022). A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks. Symmetry, 15(2), 438. https://doi.org/10.3390/sym15020438
DOI: https://doi.org/10.1177/15501329221117118
Google Scholar
Liu, Y., Wu, H., Rezaee, K., Khosravi, M. R., Khalaf, O. I., Khan, A. A., ... & Qi, L. (2022). Interactionenhanced and time-aware graph convolutional network for successive point-of-interest recommendation in traveling enterprises. IEEE Transactions on Industrial Informatics, 19(1), 635-643. https://doi.org/10.1109/TII.2022.3200067
DOI: https://doi.org/10.1109/TII.2022.3200067
Google Scholar
Meddeb, R., Triki, B., Jemili, F., & Korbaa, O. (2017, May). A survey of attacks in mobile ad hoc networks. In 2017 international conference on engineering & MIS (ICEMIS) (pp. 1-7). IEEE. https://doi.org/10.1109/ICEMIS.2017.8273007
DOI: https://doi.org/10.1109/ICEMIS.2017.8273007
Google Scholar
Nagpal, S., Aggarwal, A., & Gaba, S. (2022, January). Privacy and security issues in vehicular Ad Hoc networks with preventive mechanisms. In Proceedings of International Conference on Intelligent Cyber-Physical Systems: ICPS 2021 (pp. 317-329). Springer Nature Singapore.
DOI: https://doi.org/10.1007/978-981-16-7136-4_24
Google Scholar
Navaneethan, T., & Lalli, M. (2014). Security attacks in Mobile Ad hoc Networks–A Literature Survey. International Jouranl of Computer Science and Mobile Applications, 2(4), 1-7.
Google Scholar
Pamarthi, S., & Narmadha, R. (2022). Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms. International Journal of Intelligent Unmanned Systems, 10(4), 482-506. https://doi.org/10.1108/IJIUS-05-2021-0028
Google Scholar
Pamarthi, S., & Narmadha, R. (2022). Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms. International Journal of Intelligent Unmanned Systems, 10(4), 482-506. https://doi.org/10.1108/IJIUS-05-2021-0028
DOI: https://doi.org/10.1108/IJIUS-05-2021-0028
Google Scholar
Ramphull, D., Mungur, A., Armoogum, S., & Pudaruth, S. (2021, May). A review of mobile ad hoc NETwork (MANET) Protocols and their Applications. 2021 5th international conference on intelligent computing and control systems (ICICCS) (pp. 204-211). IEEE. https://doi.org/10.1109/ICICCS51141.2021.9432258
DOI: https://doi.org/10.1109/ICICCS51141.2021.9432258
Google Scholar
Saminathan, K., & Thangavel, R. (2022). Energy efficient and delay aware clustering in mobile adhoc network: A hybrid fruit fly optimization algorithm and whale optimization algorithm approach. Concurrency and Computation: Practice and Experience, 34(11), e6867. https://doi.org/10.1002/cpe.6867
DOI: https://doi.org/10.1002/cpe.6867
Google Scholar
Schaumann, J. (2002). Analysis of the zone routing protocol.
Google Scholar
Shajin, F. H., & Rajesh, P. (2022). Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol. International Journal of Pervasive Computing and Communications, 18(5), 603-621. https://doi.org/10.1108/IJPCC-09-2020- 0136
DOI: https://doi.org/10.1108/IJPCC-09-2020-0136
Google Scholar
Shantaf, A. M., Kurnaz, S., & Mohammed, A. H. (2020, June). Performance evaluation of three mobile ad-hoc network routing protocols in different environments. 2020 International Congress on Human-Computer https://doi.org/10.1007/s11277-022-09722-x
DOI: https://doi.org/10.1109/HORA49412.2020.9152845
Google Scholar
Shekhar, S., Mahajan, M., & Kaur, S. (2022). A Comprehensive Review of Various Attacks in Mobile Ad Hoc Networks. 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 638-643). IEEE. https://doi.org/10.1109/ICOEI53556.2022.9777180
DOI: https://doi.org/10.1109/ICOEI53556.2022.9777180
Google Scholar
Sirajuddin, M., Rupa, C., Iwendi, C., & Biamba, C. (2021). TBSMR: A trust-based secure multipath routing protocol for enhancing the QoS of the mobile ad hoc network. Security and Communication Networks, 2021, 5521713. https://doi.org/10.1155/2021/5521713
DOI: https://doi.org/10.1155/2021/5521713
Google Scholar
Sirmollo, C. Z., & Bitew, M. A. (2021). Mobility-aware routing algorithm for mobile ad hoc networks. Wireless Communications and Mobile Computing, 2021, 1-12. https://doi.org/10.1155/2021/6672297
DOI: https://doi.org/10.1155/2021/6672297
Google Scholar
Sk, B., Reddy-B, V., Vellela, S. S., D, R., Yakubreddy, K., & Rao, M. V. (2023). Novel and Secure Protocol for Trusted Wireless Ad-hoc Network Creation. merging Technologies and Innovative Research, 10(3). https://ssrn.com/abstract=4429086
Google Scholar
Soomro, A. M., Fudzee, M. F. B. M., Hussain, M., Saim, H. M., Zaman, G., Atta-ur-Rahman, H. A., & Nabil, M. (2022). Comparative review of routing protocols in manet for future research in disaster management. Journal of Communications, 17(9). 734-744. https://doi.org/10.12720/jcm.17.9.734-744
DOI: https://doi.org/10.12720/jcm.17.9.734-744
Google Scholar
Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access, 10, 14260-14269. https://doi.org/10.1109/ACCESS.2022.3144679
DOI: https://doi.org/10.1109/ACCESS.2022.3144679
Google Scholar
Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile ad-hoc network (MANET). IEEE Access, 9, 11872-11883. https://doi.org/10.1109/ACCESS.2021.3051491
DOI: https://doi.org/10.1109/ACCESS.2021.3051491
Google Scholar
Tripathy, B. K., Jena, S. K., Bera, P., & Das, S. (2020). An adaptive secure and efficient routing protocol for mobile ad hoc networks. Wireless Personal Communications, 114, 1339-1370. https://doi.org/10.1007/s11277-020-07423-x
DOI: https://doi.org/10.1007/s11277-020-07423-x
Google Scholar
Tsao, K. Y., Girdler, T., & Vassilakis, V. G. (2022). A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Networks, 133, 102894. https://doi.org/10.1016/j.adhoc.2022.102894
DOI: https://doi.org/10.1016/j.adhoc.2022.102894
Google Scholar
Vinoth Kumar, V., Deepa, R., Ranjith, D., Balamurugan, M., & Balajee, J. M. (2022, February). Selection of routing protocol-based QoS improvement for mobile ad Hoc network. International Conference on Computing, Communication, Electrical and Biomedical Systems (pp. 317-330). Springer. https://doi.org/10.1007/978-3-030-86165-0_26
DOI: https://doi.org/10.1007/978-3-030-86165-0_26
Google Scholar
Xu, K., Hong, X., & Gerla, M. (2002, April). An ad hoc network with mobile backbones. 2002 IEEE international conference on communications. Conference Proceedings. ICC 2002 (Cat. No. 02CH37333) (Vol. 5, pp. 3138-3143). IEEE. https://doi.org/10.1109/ICC.2002.997415
DOI: https://doi.org/10.1109/ICC.2002.997415
Google Scholar
Authors
Md. Torikur RAHMANtorikurrahman@gmail.com
Uttara University, Department of Computer Science & Engineering, Dhaka Bangladesh
https://orcid.org/0000-0003-2173-6458
Authors
Mohammad ALAUDDINUttara University Bangladesh
Authors
Uttam Kumar DEYUttara University Bangladesh
Authors
Dr. A.H.M. Saifullah SADIUttara University Bangladesh
Statistics
Abstract views: 376PDF downloads: 178
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.
Most read articles by the same author(s)
- Md. Torikur RAHMAN, A NOVEL APPROACH TO ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK (MANET) THROUGH A NEW BANDWIDTH OPTIMIZATION TECHNIQUE , Applied Computer Science: Vol. 15 No. 2 (2019)
Similar Articles
- Denis Ratov, INTEGRATION WITH THE SOFTWARE INTERFACE OF THE COM SERVER FOR AUTHORIZED USER , Applied Computer Science: Vol. 17 No. 2 (2021)
- Raphael Olufemi AKINYEDE, Sulaiman Omolade ADEGBENRO, Babatola Moses OMILODI, A SECURITY MODEL FOR PREVENTING E-COMMERCE RELATED CRIMES , Applied Computer Science: Vol. 16 No. 3 (2020)
- Shadan Mohammed Jihad ABDALWAHID, Raghad Zuhair YOUSIF, Shahab Wahhab KAREEM, ENHANCING APPROACH USING HYBRID PAILLER AND RSA FOR INFORMATION SECURITY IN BIGDATA , Applied Computer Science: Vol. 15 No. 4 (2019)
You may also start an advanced similarity search for this article.