Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

General Research Article

Multi-objective Optimization Model for Clustering Based Secure Routing with Congestion Avoidance in Mobile ADHOC Networks

Author(s): Srinivasan Murugan* and Jeyakarthic Mohan

Volume 15, Issue 4, 2022

Published on: 09 September, 2020

Article ID: e220322185760 Pages: 12

DOI: 10.2174/2666255813999200909105620

Price: $65

Abstract

Introduction: In Mobile Ad-Hoc Network (MANET), some of the major design issues are clustering, routing, and security. Clustering and routing techniques distribute the load to many network correlations so as to attain better utilization of resources, improved throughput and reduction in response time and workload. Besides, trust-based schemes help in sending messages in a secured manner and prevent the data from attackers by integrating authorized sender and receiver inside the network.

Aims: The aim of the research article is to propose a new Multi-Objective Optimization (MOO) technique which intends to allocate the available networking resources properly, and balance the load in network, security, and effective data transmission.

Methods: The projected model operates on three major processes such as clustering, secured routing and data aggregation-based transmission scheme. MOO model involves different processes such as Fuzzy Logic (FL)-based clustering process, Lion Whale optimization algorithm with Congestion Avoidance (LW-CA) technique for routing process and integrated XOR and Huffman (IXH)-based data transmission process. So, the proposed model is collectively called FCAXH technique which achieves energy efficiency, proper load balancing and security.

Results: Simulations were carried out using network simulator tool and the model was verified with and without the presence of attackers. The proposed method attained the maximum results in terms of throughput, Packet Delivery Ratio (PDR) and energy efficiency.

Conclusion: The projected FCAXH model achieved energy efficiency, proper load balancing and security over other compared approaches even under the presence of attackers in the network.

Keywords: Clustering, MANET, MOO model, routing, PDR, FCAXH.

Graphical Abstract

[1]
C. Deverapalli, and S.M. Yoo, "Performance comparison of various routing protocols in mobile ad hoc networks", International Conference on Wire- less Networks LasVegas, Nevada, USA, 2002.
[2]
O.H. Hussien, T.N. Saadawi, and M.J. Lee, "Probability routing algorithm for mobile ad hoc networks’ resources management", IEEE J. Sel. Areas Comm., vol. 23, no. 12, pp. 2248-2259, Jan 2005.
[3]
Y. Zeng, K. Xiang, D. Li, and A.V. Vasilakos, "Directional routing and scheduling for green vehicular delay tolerant networks", Wirel. Netw., vol. 19, no. 2, pp. 161-173, Feb 2013.
[http://dx.doi.org/10.1007/s11276-012-0457-9]
[4]
Y. Yao, Q. Cao, V. Athanasios, and A.V. Vasilakos, "EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks", In 2013 IEEE 10th International Conference On Mobile Ad-Hoc and Sensor Systems, 2013pp. 182-190
[5]
J. Liu, Y. Li, H. Wang, D. Jin, L. Su, L. Zeng, and T. Vasilakos, "Leveraging software-defined networking for security policy enforcement", Inf. Sci., vol. 327, pp. 288-299, Jan 2016.
[http://dx.doi.org/10.1016/j.ins.2015.08.019]
[6]
L. Zhou, N. Xiong, L. Shu, A.V. Vasilakos, and S.S. Yeo, "Context-aware middleware for multimedia services in heterogeneous networks", IEEE Intell. Syst., vol. 25, no. 2, pp. 40-47, Mar 2010.
[http://dx.doi.org/10.1109/MIS.2010.48]
[7]
Y. Song, L. Liu, H. Ma, and A.V. Vasilakos, "A biology-based algorithm to minimal exposure problem of wireless sensor networks", IEEE eTrans. Netw. Serv. Manag., vol. 11, no. 3, pp. 417-430, Aug 2014.
[http://dx.doi.org/10.1109/TNSM.2014.2346080]
[8]
C. Busch, R. Kannan, and A.V. Vasilakos, "Approximating congestion + dilation networks via “quality of routing games”", IEEE Trans. Comput., vol. 61, no. 9, pp. 1270-1283, July 2012.
[9]
A.L. Jeeva, V. Palanisamy, and K. Kanagaram, "Comparative analysis of performance efficiency and security measures of some encryption algorithms", Int. J. Eng. Res. Appl., vol. 2, no. 3, pp. 3033-3037, May-June 2012.
[10]
M. Khabbazian, I.F. Blake, and V.K. Bhargava, "Local broadcast algorithms in wireless ad hoc networks: Reducing the number of transmissions", IEEE Trans. Mobile Comput., vol. 11, no. 3, pp. 402-413, Apr 2012.
[http://dx.doi.org/10.1109/TMC.2011.67]
[11]
G. Swathi, and R. Saravanan, "Secure routing in MANET using synchronization and data authencity", Cybern. Inf. Technol., vol. 14, no. 2, pp. 24-30, Jan 2014.
[http://dx.doi.org/10.2478/cait-2014-0016]
[12]
P. Vamsi, P. Batra, and K. Kant, BT-GPSR: An integrated trust model for secure geographic routing in wireless sensor networksIn 2014 Students Conference on Engineering and Systems, IEEE, 2014, pp. 1-6.
[13]
T. Leinmu¨ller, C. Maiho¨fer, E. Schoch, and F. Kargl, "Improved security in geographic ad hoc routing through autonomous position verification", In Proceedings of the 3rd international workshop on vehicular ad hoc networks, 2006pp. 57-66
[http://dx.doi.org/10.1145/1161064.1161075]
[14]
D. Koutsonikolas, S. Das, Y. Hu, and I. Stojmenovic, "Hierarchical geographic multicast routing for wireless sensor networks", Wirel. Netw., vol. 16, no. 2, pp. 449-466, Dec 2008.
[http://dx.doi.org/10.1007/s11276-008-0146-x]
[15]
K. El Defrawy, and G. Tsudik, "ALARM: Anonymous location-aided routing in suspicious MANETs", IEEE Trans. Mobile Comput., vol. 10, no. 9, pp. 1345-1358, Sept 2011.
[http://dx.doi.org/10.1109/TMC.2010.256]
[16]
Q. Chen, S. Kanhere, and M. Hassan, "Adaptive position update for geographic routing in mobile ad hoc networks", IEEE Trans. Mobile Comput., vol. 12, no. 3, pp. 489-501, Jan 2012.
[http://dx.doi.org/10.1109/TMC.2012.20]
[17]
K. Defrawy, and G. Tsudik, "Privacy-preserving location-based on-demand routing in MANETs", IEEE J. Sel. Areas Comm., vol. 29, no. 10, pp. 1926-1934, Nov 2011.
[http://dx.doi.org/10.1109/JSAC.2011.111203]
[18]
H. Xia, Z. Jia, X. Li, L. Ju, and E. Sha, "Trust prediction and trust-based source routing in mobile ad hoc networks", Ad Hoc Netw., vol. 11, no. 7, pp. 2096-2114, Sept 2013.
[http://dx.doi.org/10.1016/j.adhoc.2012.02.009]
[19]
H. Xia, E. Sha, and Z. Jia, "Research of trust model based on fuzzy theory in mobile ad hoc networks", IET Inf. Secur., vol. 8, no. 2, pp. 88-103, Mar 2014.
[http://dx.doi.org/10.1049/iet-ifs.2012.0145]
[20]
M. Kuchaki Rafsanjani, and H. Fatemidokht, "FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs", AEU Int. J. Electron. Commun., vol. 69, no. 11, pp. 1613-1621, Nov 2015.
[http://dx.doi.org/10.1016/j.aeue.2015.07.013]
[21]
P.S. Barma, J. Dutta, and A. Mukherjee, "“A 2-opt guided discrete antlion optimization algorithm for multi-depot vehicle routing problem”, Decis. Mak. Appl. in Manag", Eng., vol. 2, no. 2, pp. 112-125, 2019.
[22]
A. Roy, A. Manna, and S. Maity, "“A novel memetic genetic algorithm for solving traveling salesman problem based on multi-parent crossover technique”, Decis. Mak. Appl. in Manag", Eng., vol. 2, no. 2, pp. 100-111, Oct 2019.
[http://dx.doi.org/10.31181/dmame1902076r]
[23]
X. Cai, Y. Sun, Z. Cui, W. Zhang, and J. Chen, "Optimal LEACH protocol with improved bat algorithm in wireless sensor networks", Trans. Internet Inf. Syst., vol. 13, no. 5, pp. 2469-2490, May 2019.
[24]
Y. Wang, P. Wang, J. Zhang, X. Cai, W. Li, and Y. Ma, "A novel DV-Hop method based on coupling algorithm used for wireless sensor network localisation", Int. J. Wirel. Mob. Comput., vol. 16, no. 2, pp. 128-137, Jan 2019.
[http://dx.doi.org/10.1504/IJWMC.2019.099027]
[25]
X. Cai, P. Wang, L. Du, Z. Cui, W. Zhang, and J. Chen, "Multi-objective three-dimensional DV-hop localization algorithm with NSGA-II", IEEE Sens. J., vol. 19, no. 21, pp. 10003-10015, July 2019.
[http://dx.doi.org/10.1109/JSEN.2019.2927733]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy