Routing in mobile ad hoc networks (MANETs) is a hectic challenge due to the dynamic nature of the network. The provisional communication links are assured due to the infrastructure-independent capability of MANET, but with no proper centralized monitoring process, which makes routing in MANETs with respect to the security and trust a major issue. Thus, the paper introduces Advanced Encryption Standard-enabled Trust-based Secure Routing protocol based on the proposed Dolphin Cat Optimizer (AES-TDCO), which is an energy and trust-aware routing protocol. The proposed Dolphin Cat Optimizer is engaged in the optimal route selection based on the modeled objective function based on the trust factors, recent trust, historical trust, direct and indirect trust in addition to delay, distance and link lifetime. The Dolphin Cat Optimizer is the integration of Dolphin Echolocation and Cat Swarm Optimization algorithm that inherits the faster global convergence. The simulation using 75 nodes revealed that the proposed routing protocol acquired the maximal throughput, minimal delay, minimal packet drop and detection rate of 0.6531, 0.0107, 0.3267 and 0.9898 in the absence of network attacks and 0.7693, 0.0112, 0.3605 and 0.9961 in the presence of the network attacks.
Mobile ad hoc networks (MANETs) are independent networks, where mobile nodes communicate with other nodes through wireless links by multihop transmission. Security is still an issue to be fixed in MANETs. Hence, a routing protocol named encrypted trust-based dolphin glowworm optimization (DGO) (E-TDGO) is designed using Advanced Encryption and trust-based optimization model for secure routing in MANET. The proposed E-TDGO protocol includes three phases, namely, k-path discovery, optimal path selection, and communication. At first, k paths are discovered based on the distance and the trust level of the nodes. From the k paths discovered, the optimal path is selected using a novel algorithm, DGO, which is developed by combining glowworm swarm optimization (GSO) algorithm and dolphin echolocation algorithm (DEA). Once the optimal path is selected, communication begins in the network such that E-TDGO protocol ensures security. The routing messages are encrypted using AES-128 with shared code and key to offer security. The experimental results show that the proposed E-TDGO could attain throughput of 0.11, delay of 0.01 second, packet drop of 0.44, and detection rate of 0.99, at the maximum number of rounds considered in the network of 75 nodes with attack consideration. K E Y W O R D SAES-128, mobility, optimization algorithm, route discovery, routing, security, trust | INTRODUCTIONPresently, ad hoc networks, being a popular and widely used network, are employed in various kinds of applications. These are the wireless networks that are self-organized having no centralized or fixed infrastructures. Ad hoc networks are composed of nodes, which can be both clients and routers. 1 Wireless ad hoc networks (WANETs) 2,3 are selfconfiguring and decentralized wireless network. One of the major features of ad hoc network is that it is independent of any preexisting infrastructure like routers in a wired network and every node in the network involves in routing. 4 The network functionality can be divided into three planes, namely, data plane, control plane, and management plane. The data plane handles the data packets, whereas the control plane implements the routing algorithms. Meanwhile, the network is configured and monitored by the management plane. In the data plane, ad hoc networks undergo several attacks due to certain characteristics, such as openness and dynamic topology. There are two types of attacks, such as (a) attacks interrupting normal delivery of packets in the data plane and (b) attacks diverting the network elements from using exact protocol and management policies in the control and the management planes. The attacks in the data plane are more complicated to detect and avoid, as they do not violate the protocol rules. 1 The two important aspects of these networks are routing and information broadcasting.Mobile ad hoc network (MANET) is an application of WANET, where the objective is to establish an efficient route between a pair of nodes such that the messages are delivered in a proper time interval. If rout...
Several sensor nodes in the wireless network collect the data rigorously which aids in many of the applications. The network with high and the consistent data load is the only requirement of the wireless sensor networks. Due to the limited sources of the network and the high data loads, networks may be affected by congestion. Congestion is a highly objectionable issue which leads to information loss and the deprived performance of the wireless sensor networks. In this paper, an adaptive cuckoo search based optimal rate adjustment (ACSRO) for the congestion avoidance and control is proposed. The rate adjustment regulates the share rate of the node to mitigate the congestion. The performance of the proposed rate optimization approach is evaluated using the evaluation metrics such as throughput, delay, normalized packet loss, normalized queue size, and congestion level. The results of the proposed rate optimization show that the congestion is compacted and the performance of the WSN is improved. Ó 2016 Faculty of Engineering, Alexandria University. Production and hosting by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.