JNACSISSN:2582-3817

Hybrid PSGWO Algorithm for Trust-Based Secure Routing in MANET

Abstract

In Mobile Ad Hoc Networks (MANETs), routing is considered an important issue because of the dynamic nature of the network. The interim communication associations are guaranteed because of the infrastructure-independent ability of MANET. However, with no appropriate centralized monitoring procedure that creates routing in MANETs regarding trust and security as a most important challenge. Hence, this works proposed the Advanced Encryption Standard-enabled Trust-based Secure Routing protocol on the basis of the proposed Particle Swarm-Grey Wolf Optimization Algorithm (AESTPSGWO), that is trust and energy-aware routing protocol. The proposed Particle Swarm -Grey Wolf Optimization Algorithm is affianced in the best route chosen on the basis of the modeled objective model on the basis of the trust factors, new trust, direct as well as indirect trust, historical trust, with respect to the distance delay, and link lifespan. The Particle Swarm-Grey Wolf Optimization Algorithm is the incorporation of Particle Swarm and Grey Wolf Optimization technique which takes over the faster global convergence.

References

  • Trilok Kumar Saini, Subhash C. Sharma,"Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classification, and key attributes", Ad Hoc Networks, Volume 89, 1 June 2019, Pages 58-77.

  • Dipika Sarkar, Swagata Choudhury, Abhishek Majumder,"Enhanced-Ant-AODV for optimal route selection in mobile ad-hoc network", Journal of King Saud University - Computer and Information Sciences, In press, corrected proof, Available online 28 August 2018.

  • Subramanian Balaji, Eanoch Golden Julie, Yesudhas Harold Robinson, Raghvendra Kumar, Le Hoang Son,"Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model", Computer Standards & Interfaces, Volume 66, October 2019.

  • M. Vigenesh, R. Santhosh,"An efficient stream region sink position analysis model for routing attack detection in mobile ad hoc networks",Computers & Electrical Engineering, Volume 74, March 2019, Pages 273-280.

  • Y. Harold Robinson, R. Santhana Krishnan, E. Golden Julie, Raghvendra Kumar, Pham Huy Thong,"Neighbor Knowledge-based Rebroadcast algorithm for minimizing the routing overhead in Mobile Ad-hoc Networks", Ad Hoc Networks, Volume 93, October 2019.

  • R. J. Cai, X. J. Li and P. H. J. Chong, "An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs," IEEE Transactions on Mobile Computing, vol. 18, no. 1, pp. 42-55, 1 Jan. 2019.

  • A. M. El-Semary and H. Diab, "BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map," IEEE Access, vol. 7, pp. 95197-95211, 2019.

  • J. Bai, Y. Sun, C. Phillips and Y. Cao, "Toward Constructive Relay-Based Cooperative Routing in MANETs,"IEEE Systems Journal, vol. 12, no. 2, pp. 1743-1754, June 2018.

  • Kannhavong B , Nakayama H , Nemoto Y , Kato N , Jamalipour A . A survey of routing attacks in mobile ad hoc networks. IEEE Wirel Commun 2007;14(5):85–91 .

  • Khabbazian M , Mercier H , Bhargava VK . Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans Wirel Commun 2009;8(2):736–45 .

  • Lavanya G , Kumar C , Rex Macedo Arokiaraj A . Secured backup routing protocol for ad hoc networks. In: Signal acquisition and processing, 2010. ICSAP’10. International conference on. IEEE; 2010. p. 45–50 .

  • Le A , Markopoulou A . On detecting pollution attacks in inter-session network coding. In: 2012 Proceedings IEEE INFOCOM. IEEE; 2012. p. 343–51 .

  • Mishra S , Satpathy SM , Mishra A . Energy efficiency in ad hoc networks. Int J Ad hoc Sen Ubiquit Comput 2011;2(1):139–45 .

  • Nait-Abdesselam F , Bensaou B , Taleb T . Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Commun Mag 2008;46(4):127–33 .

  • Nayak K , Gupta N . Energy efficient consumption based performance of AODV, DSR and ZRP routing protocol in MANET. Energy 2015;4(11):82–90

  • Oggier F , Fathi H . An authentication code against pollution attacks in network coding. IEEE/Acm Trans Network 2011;19(6):1587–96.

  • Bahrami, M., Bozorg-Haddad, O. and Chu, X. (2018) Cat Swarm Optimization (CSO) Algorithm. In Advanced Optimization by Nature-Inspired Algorithms, pp. 9–18. Springer, Singapore.

  • Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D. (2014) Security of the internet of things: perspectives and challenges. Wireless Netw., 20, 2481–2501. Comi,

  • A., Fotia, L., Messina, F., Pappalardo, G., Rosaci, D. and Sarné, G.M.L. (2015) A Reputation-Based Approach to Improve QoS in Cloud Service Composition. In Proc. of IEEE 24th Int. Conf. on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 15–17. IEEE, Larnaca, Cyprus.

  • Das, A. and Islam, M.M. (2012) SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans. Dependable Secure Comput., 9, 261–274.

  • Mingquan Zhang, Xiaorong Cheng, Huawei Mei and Jujie Zhang, "Research of routing optimization based on improved PSO algorithm in power communication network," 2011 International Conference on Electric Information and Control Engineering, Wuhan, 2011, pp. 2494-2497.

  • C. Hu, B. Hu and Y. Xiong, "Mobile agent routing using variable-dimension PSO algorithm based on chord-length parameterization," National Doctoral Academic Forum on Information and Communications Technology 2013, Beijing, 2013, pp. 1-8.

  • K. Anbumani, R. Ranihemamalini and G. Pechinathan, "GWO based tuning of PID controller for a heat exchanger process," 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS), Chennai, 2017, pp. 417-421.