Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

FractWhale-DSR: Fractional Whale Optimization Based Secure Dynamic Source Routing Algorithm for Mobile Ad-hoc Network

Author(s): Putra Suma* and Mohammed Ali Hussain

Volume 13, Issue 5, 2020

Page: [942 - 956] Pages: 15

DOI: 10.2174/2213275912666190715165444

Price: $65

Abstract

Background: Nodes in the mobile Ad-hoc network (MANET) have the dynamic nature due to their vast separation distance. The dynamic nature of the MANET nodes changes the routing path established for the communication. The dynamic secured routing (DSR) has gained popularity since they provide the routing path based on the demand provided by the source and destination nodes. Various literature works have discussed the DSR strategy for routing path establishment, but faces challenges since it consumes high energy during the route discovery phase.

Objectives: To overcome the challenges in the existing works, a DSR strategy based on the Fractional Whale optimization algorithm (FWOA) is introduced in this work.

Methods: The proposed algorithm uses the C 2 TE based selection criteria which depend on the connectivity, congestion, trust, and energy for selecting the suitable nodes for the communication. The proposed FractWhale-DSR algorithm finds the secured routing path in three phases.

Results: The parameters, such as throughput, delay, Packet Delivery Ratio (PDR), and the energy define the performance of the proposed model. From the simulation results, the proposed FractWhale- DSR algorithm has an overall better performance with the values of 0.57265, 0.005118, 0.786325, and 75.88636% for throughput, delay, PDR, and energy respectively at the round of 25 for the MANET with 100 nodes.

Conclusion: The proposed DSR strategy has the advantage of adaptability and scalability. Also, the router selects the alternate paths, when there is a link failure in the current network.

Keywords: Dynamic nature, dynamic secured routing, fractional whale optimization algorithm, connectivity, congestion, MANET.

Graphical Abstract
[1]
M.J.V. Prakash, and M. Kaliappan, "Development of a secure routing protocol using game theory model in mobile ad hoc networks", J. Commun. Netw. (Seoul), vol. 17, no. 1, pp. 75-83, 2015.
[http://dx.doi.org/10.1109/JCN.2015.000012]
[2]
P. Sethuraman, and N. Kannan, "Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET", Wirel. Netw., vol. 1, pp. 1-11, 2016.
[3]
S. Chatterjee, and S. Das, "Ant colony optimization based enhanced dynamic source routing algorithm for mobile Ad-hoc network", Inf. Sci., vol. 295, pp. 67-90, 2015.
[http://dx.doi.org/10.1016/j.ins.2014.09.039]
[4]
Y. Mao, and P. Zhu, "A game theoretical model for energy-aware DTN routing in MANETs with node’s selfishness", Mob. Netw. Appl., vol. 20, no. 5, pp. 593-603, 2015.
[http://dx.doi.org/10.1007/s11036-015-0610-7]
[5]
S. Shankar, G. Varaprasad, and H.N. Suresh, "Importance of on-demand modified power aware dynamic source routing protocol in mobile ad-hoc networks", IET Microw. Antennas Propag., vol. 8, no. 7, pp. 459-464, 2014.
[http://dx.doi.org/10.1049/iet-map.2013.0230]
[6]
M.K. Rafsanjani, and H. Fatemidokht, "FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzylogic in MANETs", Int. J. Electron. Commerce, vol. 69, no. 11, pp. 1613-1621, 2015.
[http://dx.doi.org/10.1016/j.aeue.2015.07.013]
[7]
G.M. Borkar, and A.R. Mahajan, "A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks", Wirel. Netw., vol. 23, pp. 1-18, 2016.
[8]
S. Tan, X. Li, and Q. Dong, "Trust based routing mechanism for securing OSLR-based MANET", Ad Hoc Netw., vol. 30, no. 3, pp. 84-98, 2015.
[http://dx.doi.org/10.1016/j.adhoc.2015.03.004]
[9]
G. Singh, N. Kumar, and A.K. Verma, "ANTALG:An innovative ACO based routing algorithm for MANETs", J. Netw. Comput. Appl., vol. 45, pp. 151-167, 2014.
[http://dx.doi.org/10.1016/j.jnca.2014.07.006]
[10]
G.V. Attimarad, and M.N.G. Prasad, "MECOR: Minimal energy consumption with optimized routing in MANET", Wirel. Pers. Commun., vol. 88, no. 4, pp. 963-983, 2016.
[http://dx.doi.org/10.1007/s11277-016-3223-y]
[11]
G. Varaprasad, and S.H. Narayanagowda, "Implementing a new power aware routing algorithm based on existing dynamic source routing protocol for mobile ad hoc networks", IET Networks, vol. 3, no. 2, pp. 137-142, 2014.
[http://dx.doi.org/10.1049/iet-net.2013.0050]
[12]
T. Singh, J. Singh, and S. Sharma, "Energy efficient secured routing protocol for MANETs", Wirel. Netw., vol. 23, pp. 1-9, 2016.
[13]
J. Kim, and G. Tsudik, "SRDP: Secure route discovery for dynamic source routing in MANETs", Ad Hoc Netw., vol. 7, no. 6, pp. 1097-1109, 2009.
[http://dx.doi.org/10.1016/j.adhoc.2008.09.007]
[14]
H. Moudni, M. Er-Rouidi, H. Mouncif, and B. El Hadadi, "Attacks against AODV routing protocol in mobile ad-hoc networks", Proceedings of IEEE 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV), 2016pp. 385-389
[http://dx.doi.org/10.1109/CGiV.2016.81]
[15]
T. Matsuda, H. Nakayama, X.S. Shen, Y. Nemoto, and N. Kato, "Gateway selection protocol in hybrid MANET using DYMO routing", Mob. Netw. Appl., vol. 15, no. 2, pp. 205-215, 2010.
[http://dx.doi.org/10.1007/s11036-009-0173-6]
[16]
J.Y. Yu, P.H.J. Chong, and M. Zhang, "Performance of efficient CBRP in mobile ad hoc networks (MANETS", Proceedings of IEEE International Conference on Vehicular Technology, 2008pp. 1-7
[http://dx.doi.org/10.1109/VETECF.2008.18]
[17]
H. Rifa-Pous, and J. Herrera-Joancomarti, "Secure dynamic MANET on-demand (SEDYMO) routing protocol", Proceedings of IEEE Fifth Annual Conference on Communication Networks and Services Research (CNSR), 2007pp. 372-380
[http://dx.doi.org/10.1109/CNSR.2007.57]
[18]
S. Imran, R.V. Karthick, and P. Visu, "DD-SARP: Dynamic Data secure anonymous routing protocol for MANETs in attacking environments", Proceedings of IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015pp. 39-46
[19]
V.S. Bhargavi, M. Seetha, and S. Viswanadharaju, A trust based secure routing scheme for MANETS.In 2016 6th International Conference-Cloud System and Big Data Engineering., Confluence, 2016, pp. 565-570.
[http://dx.doi.org/10.1109/CONFLUENCE.2016.7508183]
[20]
I. Sengupta, and S.K. Ghosh, "STACRP: A secure trusted auction oriented clustering based routing protocol for MANET", Cluster Comput., vol. 15, no. 3, pp. 303-320, 2012.
[http://dx.doi.org/10.1007/s10586-012-0198-7]
[21]
J. Cordasco, and S. Wetzel, "Cryptographic versus trust-based methods for MANET routing security", Electron. Notes Theor. Comput. Sci., vol. 197, pp. 131-140, 2008.
[http://dx.doi.org/10.1016/j.entcs.2007.12.022]
[22]
M. Kaliappan, and B. Paramasivan, "Enhancing secure routing in mobile ad hoc networks using a dynamic bayesian signalling game model", Comput. Electr. Eng., vol. 41, pp. 301-313, 2015.
[http://dx.doi.org/10.1016/j.compeleceng.2014.11.011]
[23]
A. Lewis, "The whale optimization algorithm", Adv. Eng. Softw., vol. 95, pp. 51-67, 2016.
[http://dx.doi.org/10.1016/j.advengsoft.2016.01.008]
[24]
D.B. Johnson, A.D. Maltz, and J. Broch, "DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks", Ad Hoc Networking: Addison-Wesley, vol. 5, pp. 139-172, 2001.
[25]
M. Aissani, M. Fenouche, H. Sadour, and A. Mellouk, "Ant-DSR: cache maintenance based routing protocol for mobile ad-hoc networks", The Third Advanced International Conference on Telecommunications, AICT 2007, 2007p. 35
[http://dx.doi.org/10.1109/AICT.2007.14]
[26]
A. Taha, R. Alsaqour, M. Uddin, M. Abdelhaq, and T. Saba, "Energy efficient multipath routing protocol for mobile ad-hoc network using the fitness function", IEEE Access, vol. 5, pp. 10369-10381, 2017.
[http://dx.doi.org/10.1109/ACCESS.2017.2707537]
[27]
I. Kacem, B. Sait, S. Mekhilef, and N. Sabeur, "A new routing approach for mobile ad hoc systems based on fuzzy petri nets and ant system", IEEE Access, vol. 6, pp. 65705-65720, 2018.
[http://dx.doi.org/10.1109/ACCESS.2018.2878145]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy