Abstract
Introduction: In Mobile Ad-Hoc Network (MANET), some of the major design issues are clustering, routing, and security. Clustering and routing techniques distribute the load to many network correlations so as to attain better utilization of resources, improved throughput and reduction in response time and workload. Besides, trust-based schemes help in sending messages in a secured manner and prevent the data from attackers by integrating authorized sender and receiver inside the network.
Aims: The aim of the research article is to propose a new Multi-Objective Optimization (MOO) technique which intends to allocate the available networking resources properly, and balance the load in network, security, and effective data transmission.
Methods: The projected model operates on three major processes such as clustering, secured routing and data aggregation-based transmission scheme. MOO model involves different processes such as Fuzzy Logic (FL)-based clustering process, Lion Whale optimization algorithm with Congestion Avoidance (LW-CA) technique for routing process and integrated XOR and Huffman (IXH)-based data transmission process. So, the proposed model is collectively called FCAXH technique which achieves energy efficiency, proper load balancing and security.
Results: Simulations were carried out using network simulator tool and the model was verified with and without the presence of attackers. The proposed method attained the maximum results in terms of throughput, Packet Delivery Ratio (PDR) and energy efficiency.
Conclusion: The projected FCAXH model achieved energy efficiency, proper load balancing and security over other compared approaches even under the presence of attackers in the network.
Keywords: Clustering, MANET, MOO model, routing, PDR, FCAXH.
Graphical Abstract
[http://dx.doi.org/10.1007/s11276-012-0457-9]
[http://dx.doi.org/10.1016/j.ins.2015.08.019]
[http://dx.doi.org/10.1109/MIS.2010.48]
[http://dx.doi.org/10.1109/TNSM.2014.2346080]
[http://dx.doi.org/10.1109/TMC.2011.67]
[http://dx.doi.org/10.2478/cait-2014-0016]
[http://dx.doi.org/10.1145/1161064.1161075]
[http://dx.doi.org/10.1007/s11276-008-0146-x]
[http://dx.doi.org/10.1109/TMC.2010.256]
[http://dx.doi.org/10.1109/TMC.2012.20]
[http://dx.doi.org/10.1109/JSAC.2011.111203]
[http://dx.doi.org/10.1016/j.adhoc.2012.02.009]
[http://dx.doi.org/10.1049/iet-ifs.2012.0145]
[http://dx.doi.org/10.1016/j.aeue.2015.07.013]
[http://dx.doi.org/10.31181/dmame1902076r]
[http://dx.doi.org/10.1504/IJWMC.2019.099027]
[http://dx.doi.org/10.1109/JSEN.2019.2927733]