Abstract
Background: Nodes in the mobile Ad-hoc network (MANET) have the dynamic nature due to their vast separation distance. The dynamic nature of the MANET nodes changes the routing path established for the communication. The dynamic secured routing (DSR) has gained popularity since they provide the routing path based on the demand provided by the source and destination nodes. Various literature works have discussed the DSR strategy for routing path establishment, but faces challenges since it consumes high energy during the route discovery phase.
Objectives: To overcome the challenges in the existing works, a DSR strategy based on the Fractional Whale optimization algorithm (FWOA) is introduced in this work.
Methods: The proposed algorithm uses the C 2 TE based selection criteria which depend on the connectivity, congestion, trust, and energy for selecting the suitable nodes for the communication. The proposed FractWhale-DSR algorithm finds the secured routing path in three phases.
Results: The parameters, such as throughput, delay, Packet Delivery Ratio (PDR), and the energy define the performance of the proposed model. From the simulation results, the proposed FractWhale- DSR algorithm has an overall better performance with the values of 0.57265, 0.005118, 0.786325, and 75.88636% for throughput, delay, PDR, and energy respectively at the round of 25 for the MANET with 100 nodes.
Conclusion: The proposed DSR strategy has the advantage of adaptability and scalability. Also, the router selects the alternate paths, when there is a link failure in the current network.
Keywords: Dynamic nature, dynamic secured routing, fractional whale optimization algorithm, connectivity, congestion, MANET.
Graphical Abstract
[http://dx.doi.org/10.1109/JCN.2015.000012]
[http://dx.doi.org/10.1016/j.ins.2014.09.039]
[http://dx.doi.org/10.1007/s11036-015-0610-7]
[http://dx.doi.org/10.1049/iet-map.2013.0230]
[http://dx.doi.org/10.1016/j.aeue.2015.07.013]
[http://dx.doi.org/10.1016/j.adhoc.2015.03.004]
[http://dx.doi.org/10.1016/j.jnca.2014.07.006]
[http://dx.doi.org/10.1007/s11277-016-3223-y]
[http://dx.doi.org/10.1049/iet-net.2013.0050]
[http://dx.doi.org/10.1016/j.adhoc.2008.09.007]
[http://dx.doi.org/10.1109/CGiV.2016.81]
[http://dx.doi.org/10.1007/s11036-009-0173-6]
[http://dx.doi.org/10.1109/VETECF.2008.18]
[http://dx.doi.org/10.1109/CNSR.2007.57]
[http://dx.doi.org/10.1109/CONFLUENCE.2016.7508183]
[http://dx.doi.org/10.1007/s10586-012-0198-7]
[http://dx.doi.org/10.1016/j.entcs.2007.12.022]
[http://dx.doi.org/10.1016/j.compeleceng.2014.11.011]
[http://dx.doi.org/10.1016/j.advengsoft.2016.01.008]
[http://dx.doi.org/10.1109/AICT.2007.14]
[http://dx.doi.org/10.1109/ACCESS.2017.2707537]
[http://dx.doi.org/10.1109/ACCESS.2018.2878145]