SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 133
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
------------------------------------------------------------------------***-------------------------------------------------------------------------
Abstract
Keywords: Cluster heads, Trust model, BFOA, Intruder detection, Misbehaving nodes.
1. Introduction
The MANETs are flexible wireless networks with dynamic topology. The MANETs are formed through the
collection of mobile nodes which are connected with wireless links. The topology of MANET changes as the mobile nodes
enter and leave the network. When a node along a path leaves the network, the packets along that route must be routed
through another alternate path. These frequent topology changes and related routing problems are the major issues in the
development of routing protocols for MANETs. The second design issue is related to the power resources availability. The
mobile devices depend on one or another form of the exhaustible power source. When the power supply is exhausted at a
node, it becomes a dead node and cannot take part in the transmission of the packets. The other problem is the presence of
attackers inside and outside the network. In MANETs, there is no centralized monitoring mechanism to detect and prevent
intruders.
Here, we propose an integrated approach to solve the routing issues in MANETs. This method uses a fuzzy
clustering algorithm that determines the CHs through an effective adaptive trust model. As it selects the nodes with
maximum trust values and sets the threshold for trust values, the intruder nodes can be easily and effectively identified. It
provides multiple paths between the source and destination. In the second stage, an optimal route is selected employing
BFOA that uses ideal hops to determine the route.
2. Related works
In paper [1], M. Jabirulla and A. Kumar discuss how to plan and analyze obstacles, mobility, and power for optimal
MANET routing. It uses a routing protocol framework to uncover viable investigations of obstacles, power, and mobility.
The paper aims to solve issues caused by mobility, interface quality, and battery imperative of mobile hubs between overlay
associations. The proposed method selects routing choices by deciding the optimal course with energy-productive hubs to
keep up network dependability and lifetime. The power mindful utilizations obstacle recognition algorithm for the choice of
optimal middle-of-the-road hubs dependent on the available energy level, mobility, and connection quality boundaries. In
Mobile Ad Hoc Networks (MANETs), the absence of centralized infrastructure, changes in the network topology, device
mobility and data transmission over wireless channels make multi-hop routing a very challenging task. The MANETs can be
deployed in many critical applications and developing a routing protocol that deals with these challenges through the design
of a Quality of Service (QoS)-assured protocol is a major problem. As the movement of mobile nodes in MANETs occurs
frequently, a proper approach with robustness and QoS assurance is required. S. Mostafavi et. al. [2] proposed QMAR-AODV,
which is an optimized version of the AODV protocol called the QoS-assured Mobility-Aware Routing protocol. It outperforms
E2E-LREEMR and reduces route instability, end-to-end delay, data retransmissions and packet loss while increasing data
reception and network throughput, compared to E2E-LREEMR routing protocol. There is a need for a secure protocol for
MWSN with mechanisms that take into account the limited resources of the nodes and the dynamism of its nodes’ locations
which are included in the research of O. Oladayo and A. Ashraf [3]. Background and Objective Mobile Wireless Sensor
Network (MWSN) is a specialized wireless network made up of a large number of mobile sensors, where each sensor is
This paper aims to integrate different machine learning algorithms to get an optimized and secured routing
technique for Mobile Ad-hoc NETworks(MANETs). Routing of packets are highly challenging in MANETs, as they are
infrastructure-less networks formed with mobile nodes, connected by flexible wireless links. The main routing challenges
in MANETs are the frequent topological changes, limited availability of power resources and vulnerabilities to attacks. This
method suggests a technique that is trustworthy that provides fast convergence for topological changes with minimum
energy utilization per packet. In this method, a trust-based and energy-efficient fuzzy clustering routing algorithm is used.
The Cluster Heads(CHs) are selected depending on the various trust values that provide multi-paths to the destination.
Then Bacteria for Aging Optimization Algorithm (BFOA) selects the best path by finding ideal hops to the destination
avoiding the misbehaving nodes. The proposed method offers better security, reduced delay and better energy utilization.
Dr.D. Chitra, Professor, Department of Electronics and Communication engineering Mahendra Engineering College
Divya K, PG student, Department of Electronics and Communication Engineering, Mahendra Engineering College
Dr. D. CHITRA, DIVYA.K
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 134
capable of changing its location and relaying data to either the base station or neighbouring nodes. Therefore it is not suitable
for WSN that is energy-constraint with mobile sensors. This protocol is capable of selecting the optimal multi-hop route
among available routes for the source node and securely hops the data to the destination nodes through intermediary nodes.
To make sure about the security level of the protocol, formal and informal security analysis of the routing protocol is done.
The development of Remotely Piloted Aircrafts (RPAS) for civil applications has been rapidly growing over the past
years. To achieve this task a two-layered approach is proposed [4]. The Ant Colony Optimization(ACO) which is based on
Swarm Intelligence(SI) are well suited for MANETs. An inexpensive and feasible solution for real-world implementation is
provided by the Potential Field method. It is shown that the algorithms perform reasonably well in several scenarios. Even
though the network assumes that all its mobile nodes are trusted, it is impossible in the real world as few nodes may be
malicious. Therefore, it is essential to put forward a mechanism that can provide security by selecting an optimal route for
data forwarding as suggested by A. M. Chintalapalli and V. R. Ananthula[5]. A fitness function is developed for the selection of
the best routes using the multi-objective parameters. The performance of this algorithm is evaluated using three metrics,
such as packet delivery ratio (PDR), throughput, and energy and is compared with that of existing trust-based QoS routing
model, LA, and WOA. Energy harvesting is crucial for IoT devices as it eliminates the need for frequent energy source
replacement. With advancements in EH techniques, the design procedures of routing protocols have undergone a dramatic
change for energy-harvesting wireless sensor network-based IoT applications. T. D. Nguyen et. al. [6] proposed a new
routing algorithm called EHARA that improves energy efficiency and satisfies QoS requirements of distributed IoT
networks. In [7], a noble route selection technique based on the mobility of the nodes in ad-hoc networks are presented.
The mobility factor is used to select nodes to establish a path between source and destination nodes. Simulations of
dynamic source routing and ad hoc on-demand distance vector routing protocols with and without the proposed technique
show that the proposed protocols outperform existing protocols.
The remaining part of this paper is organized as : Section III describes the methodology Section IV the Output and
Section V gives the Conclusion.
3. The Methodology
An efficient MANET routing technique provides the transmission of data packets without much delay and without any
loss. In the proposed method, the use of BFOA reduces the transmission energy losses and enhances the system's lifetime.
The various steps used in this method are:
1. Application of fuzzy clustering algorithm and selection of CHs based on direct, indirect and recent trust values.
2. Application of BFOA algorithm for the optimum route selection avoiding the intruder nodes.
3.1 CH selection
Using the fuzzy clustering algorithm CHs are selected based on the direct, indirect and recent trust values. The
trust management mechanism is very effective to deal with security issues in MANETs. The traditional trust management
systems are not effective, as frequent communication may lead to congestion, high energy consumption and large
transmission delay between the source and destination. In this method, the use of adaptive factors with space and time
constraints improves the accuracy of the trust value evaluation and also speeds up the detection of malicious nodes. Using
the CH formation secure multi paths can be obtained and the best secure path avoiding the misbehaving nodes is selected
using BFOA.
Trust values indicate the degree of trust depending on the behaviour of the nodes. A trust model is composed of
the following 5 components.
Trust Composition – This involves the computation of the trust values.
Trust formation – It determines the trust attributes for the computation of the trust values.
Trust propagation – It represents the ways in which trust information is propagated to other nodes.
Trust aggregation – It aggregates trust information from the various trust values such as direct, indirect and recent
trust values.
Trust update – It determines when the trust values are to be updated using trust aggregation.
Direct Trust (DT): It is the difference between the actual time and predicted time for the ith node to authenticate the public
key that was generated by the kth destination node.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 135
InDirect Trust (IDT): DT depends on the information exchanged between the neighbouring nodes. If the communication is
not effective or the channel or the neighbouring nodes are malicious, then DT values cannot measure the credibility of the
nodes.
𝐼𝐷𝑇𝑖
𝑘
(𝑡) =
1
𝑛
∑ 𝐷𝑇𝑖
𝑘
(𝑑)
𝑛
𝑖=1 (1)
where n is the number of neighbouring nodes of ith node.
Recent Trust(RT): Recent trust values are used for local trust synthesis. RT is designed to be
𝑅𝑇𝑖
𝑘
(𝑡) = 𝛼 ∗ 𝐷𝑇𝑖
𝑘
(𝑡) + (1 − 𝛼) ∗ 𝐼𝐷𝑇𝑖
𝑘
(𝑡) (2)
where 𝛼 = 0.3
3.2 The BFOA
The bio-inspired BFOA is used to identify the ideal hops for the ideal route selection for MANETs. BFOA can be used to
solve several difficult numerical problems quickly and effectively. For searching the nutrients, a bacterium uses a process
called Chemo taxis to follow a path. To stimulate the chemo-toxic movement, the bacteria communicate with each other
through signals. The underlying optimization method can be used to solve numerous optimization problems. Bacteria can
tumble or swim to travel with the help of Flagella. When placed in a semi-solid matrix with a single chemo-effector, a group
of E. coli cells arrange themselves in a traveling ring by moving up the nutrient gradient. The cells aggregate into groups
when they are stimulated by a high level of succinate and move as concentric swarm patterns. This is called swarming. This
process continues for the entire life span. The cell-to-cell signalling can be represented by an objective function. In the
reproduction stage, the less healthy bacteria will die and healthier bacteria go to the next generation by breaking into two,
which are placed in the same location. This mechanism keeps the swarm size stable. Elimination and Dispersal is the stage
where a bacterium population undergoes a gradual or sudden change. Due to various reasons, there may be a gradual or
sudden changes in the bacterium population lives. In some cases, all the bacteria in a region are killed or a group is moved
into a new location.
The BFOA Algorithm
Step 1: All variables are initialized, and counters are set for the elimination-dispersal loop(l), reproduction loop(k),
chemotactic loop(j) and swim counter(w) is set to zero Step 2: Bacterium index (i) is set to zero Step 3: Elimination-
dispersal loop is started by setting l = l + 1 Step 4: Start the reproduction loop by setting k = k + l Step 5: Start the
chemotaxis loop by setting j = j + 1
Step 1: Initialize all variables and set counters for elimination-dispersal loop(l), reproduction loop(k), chemotactic loop(j)
and swim counter(w)
Step 2: Start the elimination-dispersal loop
Step 3: Start the reproduction loop
Step 4: Start the chemotaxis loop, compute the fitness function and go to next bacterium to process next.
Step 5: Continue chemotaxis if the lifespan of the bacteria is not over.
Step 6: Start the reproduction process
Step 7: Start the next-generation process.
Step 8: Eliminate and disperse each bacterium to keep the number of bacteria in the group constant.
Step 9: End if the dispersal loop is completed; otherwise go to step 2.
This section presents the performance analysis of the suggested method based on different metrics.
Time delay
It represents the end-to-end delay time elapsed from the generation of the packet at the source node to the
successful delivery of that packet to the destination. The table 1 shows a comparison of the delays experienced by different
methods and we see can see that the proposed method experiences less delay. With an adaptive trust value model, the
delay of the packets at the malicious nodes can be avoided.
4. Results and Discussions
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 136
Table 1 Delay time of existing and proposed methods
Number of nodes EA-DRP (Sec) EE-OHRA (Sec) Proposed method (Sec)
10 80 83 67
20 90 92 85
30 77 79 74
40 89 97 83
50 73 78 69
60 93 98 88
Packet Delivery Ratio (PDR)
PDR represents the ratio of the packets that are successfully delivered to the destination node out of the number of
packets that are sent by the source. Table 2 shows a comparative analysis of the PDR.
Table 2 Packet delivery ratio of existing and proposed method
Number of nodes EA-DRP (%) EE-OHRA (%) Proposed method(%)
10 79.5 70.8 83.6
20 77.87 75.7 86.9
30 80.5 78.63 84.5
40 78.08 76.73 87.43
50 81.83 80.72 85.75
60 80.5 81.98 89.85
As the proposed system uses an effective trust management model, misbehaving nodes can be accurately determined. The
use BFOA for the best path selection effectively avoids the paths through malicious nodes. This mechanism ensures no
packet loss in the transmission which yields a high packet delivery ratio.
Routing Overhead (RO)
The optimal route discovery and successful transmission of the packets demand for more control packets. The
comprehensive trust values of the trusted neighbouring nodes calculated by the sink nodes reduce the network overheads
and thus reduces congestion. The routing overhead of existing and proposed methods have been summarized in table 3.
Table 3 Routing Overhead of existing and proposed methods
Number of nodes EA-DRP (%) EE-OHRA (%) Proposed method (%)
10 33.5 30 27.4
20 28.7 29.3 25.9
30 31.9 30.4 27.98
40 35.75 33.67 29.54
50 25.8 24.9 20.6
60 37.06 34.7 25
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 137
5. Conclusion
The effect of major constraints in the design of a routing protocol for MANETs can be reduced to a significant level
in this proposed method. From the results, we can see that the BFOA is well-suited for efficient route determination in
MANETs. In the first stage of this method, fuzzy clustering is used to determine the cluster heads based on an adaptive
trust model that uses direct, indirect and recent trust values. The packets are routed through the cluster heads avoiding the
paths involving misbehaving nodes. With the proper settings of the threshold values of the trust, malicious nodes can be
effectively identified and those nodes can be dropped while selecting the best path using the BFOA algorithm. This results
in reduced loss of packets. The suggested method shows faster convergence toward topological changes in the network.
The use of ideal hops by BFOA reduces the delay in the transmission and also reduces energy consumption. Thus, the
method proposed with BFOA with an enhanced trust model improves the overall efficiency of the network.
References
1. M. Jabirulla and A. Kumar, ‘‘Design and analysis of obstacle, mobility and power aware optimal MANET
routing—A review,’’ Solid State Technol., vol. 63, no. 3, pp. 46–55, 2020.
2. S. Mostafavi, V. Hakami, and F. Paydar, ‘‘A QoS-assured and mobility aware routing protocol for MANETs,’’ Int. J.
Informat. Visualizat., vol. 4, no. 1, pp. 1–9, Feb. 2020.
3. O. Oladayo and A. Ashraf, ‘‘A secure and energy-aware routing protocol for optimal routing in mobile wireless
sensor networks (MWSNs),’’ Int. J. Sensors, Wireless Commun. Control, vol. 9, no. 4, pp. 507–520, Sep. 2019.
4. J. M. M. Alves, ‘‘Path planning and collision avoidance algorithms for small RPAS,’’ M.S. thesis, Dept. Aerosp. Eng.,
Tecnico LISBOA, Lisbon, Portugal, 2017.
5. R. M. Chintalapalli and V. R. Ananthula, ‘‘M-LionWhale: Multi-objective optimisation model for secure routing in
mobile ad-hoc network,’’ IET Commun., vol. 12, pp. 1406–1415, 2018.
Figure 1: Various stages in cluster head formation and malicious nodes identification.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 138
6. T. D. Nguyen, J. Y. Khan, and D. T. Ngo, ‘‘A distributed energy-harvestingaware routing algorithm for
heterogeneous IoT networks,’’ IEEE Trans. Green Commun. Netw., vol. 2, no. 4, pp. 1115–1127, Dec. 2018.
7. S. Sarkar and R. Datta, ‘‘Mobility-aware route selection technique for mobile ad hoc networks,’’ IET Wireless
Sensor Syst., vol. 7, no. 3, pp. 55–64, Jun. 2017.
8. Mallikarjuna and V. C. Patil, ‘‘PUSR: Position update secure routing protocol for MANET,’’ Int. J. Intell. Eng. Syst.,
vol. 14, no. 1, pp. 93–102, Feb. 2021.
9. S. R. Halhalli, S. R. Sugave, and B. N. Jagdale, ‘‘Optimisation driven-based secure routing in MANET using atom
whale optimization algorithm,’’ Int. J. Commun. Netw. Distrib. Syst., vol. 27, no. 1, p. 77, 2021.
10. V. Alappatt and J. P. P. M., ‘‘Trust-based energy efficient secure multipath routing in MANET using LF-SSO and
SH2E,’’ Int. J. Comput. Netw. Appl., vol. 8, no. 4, p. 400, Aug. 2021.
11. Vahid Heydari 2012, “A new acknowledgment-based scheme against malicious nodes and collusion attack in
MANETs”, IEEE 14th International Conference on Communication Technology, pp. 784 – 788.
12. Abdulsalam Basabaa, Tarek Sheltami and Elhadi Shakshuki 2014, “Implementation of A3ACKs Intrusion
Detection System under Various Mobility Speeds”, Procedia Computer Science, vol.32, pp. 571-578.
13. DaehoKang, Hyung-SinKim, ChangheeJoo and SaewoongBahk 2018, “ORGMA: Reliable opportunistic routing
with gradient forwarding for MANETs”, Elsevier Journals- Computer Networks, vol.131, pp. 52-64.
14. ParthPatel, RajeshBansode and BhushanNemade 2016, “Performance Evaluation of MANET Network
Parameters Using AODV Protocol for HEAACK Enhancement”, Elsevier Journals- Procedia Computer Science,
vol.79, pp. 932-939.
15. Kamini Maheshwar, S. Veenadhari, "Secure Cluster based Routing Protocol for WSN", 2022 IEEE International
Conference on Current Development in Engineering and Technology (CCET), pp.1-6, 2022.
16. Hanbing Xie, Gui Zou, Lin Ma, "A Hierarchical Routing Protocol Based on AODV for Unmanned Aerial Vehicle
Swarm Network", 2022 IEEE International Conference on Unmanned Systems (ICUS), pp.1113-1117, 2022.
17. Moaath Alshaikh, Akram Morie, "Development of Multipath Dynamic Address Routing Protocol in MANET to
Improve Data Transfer in Poor Infrastructure Environment", 2022 International Conference on Computer
Science and Software Engineering (CSASE), pp.368-373, 2022.
18. Uppalapati Srilakshmi, Neenavath Veeraiah, Youseef Alotaibi, Saleh Ahmed Alghamdi, Osamah Ibrahim Khalaf,
Bhimineni Venkata Subbayamma, "An Improved Hybrid Secure Multipath Routing Protocol for MANET", IEEE
Access, vol.9, pp.163043-163053, 2021.
19. Uppalapati Srilakshmi, Saleh Ahmed Alghamdi, Veera Ankalu Vuyyuru, Neenavath Veeraiah, Youseef Alotaibi, "A
Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks", IEEE Access, vol.10, pp.14260-14269,
2022.
20. Samreen Banu Kazi and Mohammed Azharuddin Adhoni “Secure IDS to detect malevolent node in MANETs”
International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), India, pp. 1363 –
1368, March-2016
21. Rasika R. Mali and Sudhir T. Bagade “Detection of Misbehaving node using Secure Acknowledgement in MANET”
International Conference on Computing, Analytics and Security Trends (CAST), India, pp. 611 - 616, December-
2016.

More Related Content

Similar to AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS

A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsIRJET Journal
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc NetworksIOSR Journals
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...IRJET Journal
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkIOSR Journals
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...AM Publications,India
 
IRJET - Performance Evaluation of QoS by Enhanced ACO in Hybrid Protocols in ...
IRJET - Performance Evaluation of QoS by Enhanced ACO in Hybrid Protocols in ...IRJET - Performance Evaluation of QoS by Enhanced ACO in Hybrid Protocols in ...
IRJET - Performance Evaluation of QoS by Enhanced ACO in Hybrid Protocols in ...IRJET Journal
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkeSAT Journals
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkeSAT Publishing House
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
Reliable and efficient data dissemination scheme in VANET: a review
Reliable and efficient data dissemination scheme in VANET:  a review Reliable and efficient data dissemination scheme in VANET:  a review
Reliable and efficient data dissemination scheme in VANET: a review IJECEIAES
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 

Similar to AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS (20)

A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
 
VANET Clustering
VANET ClusteringVANET Clustering
VANET Clustering
 
C0941017
C0941017C0941017
C0941017
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
 
Ijetr021261
Ijetr021261Ijetr021261
Ijetr021261
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
 
IRJET - Performance Evaluation of QoS by Enhanced ACO in Hybrid Protocols in ...
IRJET - Performance Evaluation of QoS by Enhanced ACO in Hybrid Protocols in ...IRJET - Performance Evaluation of QoS by Enhanced ACO in Hybrid Protocols in ...
IRJET - Performance Evaluation of QoS by Enhanced ACO in Hybrid Protocols in ...
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
Reliable and efficient data dissemination scheme in VANET: a review
Reliable and efficient data dissemination scheme in VANET:  a review Reliable and efficient data dissemination scheme in VANET:  a review
Reliable and efficient data dissemination scheme in VANET: a review
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 

AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 133 AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS ------------------------------------------------------------------------***------------------------------------------------------------------------- Abstract Keywords: Cluster heads, Trust model, BFOA, Intruder detection, Misbehaving nodes. 1. Introduction The MANETs are flexible wireless networks with dynamic topology. The MANETs are formed through the collection of mobile nodes which are connected with wireless links. The topology of MANET changes as the mobile nodes enter and leave the network. When a node along a path leaves the network, the packets along that route must be routed through another alternate path. These frequent topology changes and related routing problems are the major issues in the development of routing protocols for MANETs. The second design issue is related to the power resources availability. The mobile devices depend on one or another form of the exhaustible power source. When the power supply is exhausted at a node, it becomes a dead node and cannot take part in the transmission of the packets. The other problem is the presence of attackers inside and outside the network. In MANETs, there is no centralized monitoring mechanism to detect and prevent intruders. Here, we propose an integrated approach to solve the routing issues in MANETs. This method uses a fuzzy clustering algorithm that determines the CHs through an effective adaptive trust model. As it selects the nodes with maximum trust values and sets the threshold for trust values, the intruder nodes can be easily and effectively identified. It provides multiple paths between the source and destination. In the second stage, an optimal route is selected employing BFOA that uses ideal hops to determine the route. 2. Related works In paper [1], M. Jabirulla and A. Kumar discuss how to plan and analyze obstacles, mobility, and power for optimal MANET routing. It uses a routing protocol framework to uncover viable investigations of obstacles, power, and mobility. The paper aims to solve issues caused by mobility, interface quality, and battery imperative of mobile hubs between overlay associations. The proposed method selects routing choices by deciding the optimal course with energy-productive hubs to keep up network dependability and lifetime. The power mindful utilizations obstacle recognition algorithm for the choice of optimal middle-of-the-road hubs dependent on the available energy level, mobility, and connection quality boundaries. In Mobile Ad Hoc Networks (MANETs), the absence of centralized infrastructure, changes in the network topology, device mobility and data transmission over wireless channels make multi-hop routing a very challenging task. The MANETs can be deployed in many critical applications and developing a routing protocol that deals with these challenges through the design of a Quality of Service (QoS)-assured protocol is a major problem. As the movement of mobile nodes in MANETs occurs frequently, a proper approach with robustness and QoS assurance is required. S. Mostafavi et. al. [2] proposed QMAR-AODV, which is an optimized version of the AODV protocol called the QoS-assured Mobility-Aware Routing protocol. It outperforms E2E-LREEMR and reduces route instability, end-to-end delay, data retransmissions and packet loss while increasing data reception and network throughput, compared to E2E-LREEMR routing protocol. There is a need for a secure protocol for MWSN with mechanisms that take into account the limited resources of the nodes and the dynamism of its nodes’ locations which are included in the research of O. Oladayo and A. Ashraf [3]. Background and Objective Mobile Wireless Sensor Network (MWSN) is a specialized wireless network made up of a large number of mobile sensors, where each sensor is This paper aims to integrate different machine learning algorithms to get an optimized and secured routing technique for Mobile Ad-hoc NETworks(MANETs). Routing of packets are highly challenging in MANETs, as they are infrastructure-less networks formed with mobile nodes, connected by flexible wireless links. The main routing challenges in MANETs are the frequent topological changes, limited availability of power resources and vulnerabilities to attacks. This method suggests a technique that is trustworthy that provides fast convergence for topological changes with minimum energy utilization per packet. In this method, a trust-based and energy-efficient fuzzy clustering routing algorithm is used. The Cluster Heads(CHs) are selected depending on the various trust values that provide multi-paths to the destination. Then Bacteria for Aging Optimization Algorithm (BFOA) selects the best path by finding ideal hops to the destination avoiding the misbehaving nodes. The proposed method offers better security, reduced delay and better energy utilization. Dr.D. Chitra, Professor, Department of Electronics and Communication engineering Mahendra Engineering College Divya K, PG student, Department of Electronics and Communication Engineering, Mahendra Engineering College Dr. D. CHITRA, DIVYA.K
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 134 capable of changing its location and relaying data to either the base station or neighbouring nodes. Therefore it is not suitable for WSN that is energy-constraint with mobile sensors. This protocol is capable of selecting the optimal multi-hop route among available routes for the source node and securely hops the data to the destination nodes through intermediary nodes. To make sure about the security level of the protocol, formal and informal security analysis of the routing protocol is done. The development of Remotely Piloted Aircrafts (RPAS) for civil applications has been rapidly growing over the past years. To achieve this task a two-layered approach is proposed [4]. The Ant Colony Optimization(ACO) which is based on Swarm Intelligence(SI) are well suited for MANETs. An inexpensive and feasible solution for real-world implementation is provided by the Potential Field method. It is shown that the algorithms perform reasonably well in several scenarios. Even though the network assumes that all its mobile nodes are trusted, it is impossible in the real world as few nodes may be malicious. Therefore, it is essential to put forward a mechanism that can provide security by selecting an optimal route for data forwarding as suggested by A. M. Chintalapalli and V. R. Ananthula[5]. A fitness function is developed for the selection of the best routes using the multi-objective parameters. The performance of this algorithm is evaluated using three metrics, such as packet delivery ratio (PDR), throughput, and energy and is compared with that of existing trust-based QoS routing model, LA, and WOA. Energy harvesting is crucial for IoT devices as it eliminates the need for frequent energy source replacement. With advancements in EH techniques, the design procedures of routing protocols have undergone a dramatic change for energy-harvesting wireless sensor network-based IoT applications. T. D. Nguyen et. al. [6] proposed a new routing algorithm called EHARA that improves energy efficiency and satisfies QoS requirements of distributed IoT networks. In [7], a noble route selection technique based on the mobility of the nodes in ad-hoc networks are presented. The mobility factor is used to select nodes to establish a path between source and destination nodes. Simulations of dynamic source routing and ad hoc on-demand distance vector routing protocols with and without the proposed technique show that the proposed protocols outperform existing protocols. The remaining part of this paper is organized as : Section III describes the methodology Section IV the Output and Section V gives the Conclusion. 3. The Methodology An efficient MANET routing technique provides the transmission of data packets without much delay and without any loss. In the proposed method, the use of BFOA reduces the transmission energy losses and enhances the system's lifetime. The various steps used in this method are: 1. Application of fuzzy clustering algorithm and selection of CHs based on direct, indirect and recent trust values. 2. Application of BFOA algorithm for the optimum route selection avoiding the intruder nodes. 3.1 CH selection Using the fuzzy clustering algorithm CHs are selected based on the direct, indirect and recent trust values. The trust management mechanism is very effective to deal with security issues in MANETs. The traditional trust management systems are not effective, as frequent communication may lead to congestion, high energy consumption and large transmission delay between the source and destination. In this method, the use of adaptive factors with space and time constraints improves the accuracy of the trust value evaluation and also speeds up the detection of malicious nodes. Using the CH formation secure multi paths can be obtained and the best secure path avoiding the misbehaving nodes is selected using BFOA. Trust values indicate the degree of trust depending on the behaviour of the nodes. A trust model is composed of the following 5 components. Trust Composition – This involves the computation of the trust values. Trust formation – It determines the trust attributes for the computation of the trust values. Trust propagation – It represents the ways in which trust information is propagated to other nodes. Trust aggregation – It aggregates trust information from the various trust values such as direct, indirect and recent trust values. Trust update – It determines when the trust values are to be updated using trust aggregation. Direct Trust (DT): It is the difference between the actual time and predicted time for the ith node to authenticate the public key that was generated by the kth destination node.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 135 InDirect Trust (IDT): DT depends on the information exchanged between the neighbouring nodes. If the communication is not effective or the channel or the neighbouring nodes are malicious, then DT values cannot measure the credibility of the nodes. 𝐼𝐷𝑇𝑖 𝑘 (𝑡) = 1 𝑛 ∑ 𝐷𝑇𝑖 𝑘 (𝑑) 𝑛 𝑖=1 (1) where n is the number of neighbouring nodes of ith node. Recent Trust(RT): Recent trust values are used for local trust synthesis. RT is designed to be 𝑅𝑇𝑖 𝑘 (𝑡) = 𝛼 ∗ 𝐷𝑇𝑖 𝑘 (𝑡) + (1 − 𝛼) ∗ 𝐼𝐷𝑇𝑖 𝑘 (𝑡) (2) where 𝛼 = 0.3 3.2 The BFOA The bio-inspired BFOA is used to identify the ideal hops for the ideal route selection for MANETs. BFOA can be used to solve several difficult numerical problems quickly and effectively. For searching the nutrients, a bacterium uses a process called Chemo taxis to follow a path. To stimulate the chemo-toxic movement, the bacteria communicate with each other through signals. The underlying optimization method can be used to solve numerous optimization problems. Bacteria can tumble or swim to travel with the help of Flagella. When placed in a semi-solid matrix with a single chemo-effector, a group of E. coli cells arrange themselves in a traveling ring by moving up the nutrient gradient. The cells aggregate into groups when they are stimulated by a high level of succinate and move as concentric swarm patterns. This is called swarming. This process continues for the entire life span. The cell-to-cell signalling can be represented by an objective function. In the reproduction stage, the less healthy bacteria will die and healthier bacteria go to the next generation by breaking into two, which are placed in the same location. This mechanism keeps the swarm size stable. Elimination and Dispersal is the stage where a bacterium population undergoes a gradual or sudden change. Due to various reasons, there may be a gradual or sudden changes in the bacterium population lives. In some cases, all the bacteria in a region are killed or a group is moved into a new location. The BFOA Algorithm Step 1: All variables are initialized, and counters are set for the elimination-dispersal loop(l), reproduction loop(k), chemotactic loop(j) and swim counter(w) is set to zero Step 2: Bacterium index (i) is set to zero Step 3: Elimination- dispersal loop is started by setting l = l + 1 Step 4: Start the reproduction loop by setting k = k + l Step 5: Start the chemotaxis loop by setting j = j + 1 Step 1: Initialize all variables and set counters for elimination-dispersal loop(l), reproduction loop(k), chemotactic loop(j) and swim counter(w) Step 2: Start the elimination-dispersal loop Step 3: Start the reproduction loop Step 4: Start the chemotaxis loop, compute the fitness function and go to next bacterium to process next. Step 5: Continue chemotaxis if the lifespan of the bacteria is not over. Step 6: Start the reproduction process Step 7: Start the next-generation process. Step 8: Eliminate and disperse each bacterium to keep the number of bacteria in the group constant. Step 9: End if the dispersal loop is completed; otherwise go to step 2. This section presents the performance analysis of the suggested method based on different metrics. Time delay It represents the end-to-end delay time elapsed from the generation of the packet at the source node to the successful delivery of that packet to the destination. The table 1 shows a comparison of the delays experienced by different methods and we see can see that the proposed method experiences less delay. With an adaptive trust value model, the delay of the packets at the malicious nodes can be avoided. 4. Results and Discussions
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 136 Table 1 Delay time of existing and proposed methods Number of nodes EA-DRP (Sec) EE-OHRA (Sec) Proposed method (Sec) 10 80 83 67 20 90 92 85 30 77 79 74 40 89 97 83 50 73 78 69 60 93 98 88 Packet Delivery Ratio (PDR) PDR represents the ratio of the packets that are successfully delivered to the destination node out of the number of packets that are sent by the source. Table 2 shows a comparative analysis of the PDR. Table 2 Packet delivery ratio of existing and proposed method Number of nodes EA-DRP (%) EE-OHRA (%) Proposed method(%) 10 79.5 70.8 83.6 20 77.87 75.7 86.9 30 80.5 78.63 84.5 40 78.08 76.73 87.43 50 81.83 80.72 85.75 60 80.5 81.98 89.85 As the proposed system uses an effective trust management model, misbehaving nodes can be accurately determined. The use BFOA for the best path selection effectively avoids the paths through malicious nodes. This mechanism ensures no packet loss in the transmission which yields a high packet delivery ratio. Routing Overhead (RO) The optimal route discovery and successful transmission of the packets demand for more control packets. The comprehensive trust values of the trusted neighbouring nodes calculated by the sink nodes reduce the network overheads and thus reduces congestion. The routing overhead of existing and proposed methods have been summarized in table 3. Table 3 Routing Overhead of existing and proposed methods Number of nodes EA-DRP (%) EE-OHRA (%) Proposed method (%) 10 33.5 30 27.4 20 28.7 29.3 25.9 30 31.9 30.4 27.98 40 35.75 33.67 29.54 50 25.8 24.9 20.6 60 37.06 34.7 25
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 137 5. Conclusion The effect of major constraints in the design of a routing protocol for MANETs can be reduced to a significant level in this proposed method. From the results, we can see that the BFOA is well-suited for efficient route determination in MANETs. In the first stage of this method, fuzzy clustering is used to determine the cluster heads based on an adaptive trust model that uses direct, indirect and recent trust values. The packets are routed through the cluster heads avoiding the paths involving misbehaving nodes. With the proper settings of the threshold values of the trust, malicious nodes can be effectively identified and those nodes can be dropped while selecting the best path using the BFOA algorithm. This results in reduced loss of packets. The suggested method shows faster convergence toward topological changes in the network. The use of ideal hops by BFOA reduces the delay in the transmission and also reduces energy consumption. Thus, the method proposed with BFOA with an enhanced trust model improves the overall efficiency of the network. References 1. M. Jabirulla and A. Kumar, ‘‘Design and analysis of obstacle, mobility and power aware optimal MANET routing—A review,’’ Solid State Technol., vol. 63, no. 3, pp. 46–55, 2020. 2. S. Mostafavi, V. Hakami, and F. Paydar, ‘‘A QoS-assured and mobility aware routing protocol for MANETs,’’ Int. J. Informat. Visualizat., vol. 4, no. 1, pp. 1–9, Feb. 2020. 3. O. Oladayo and A. Ashraf, ‘‘A secure and energy-aware routing protocol for optimal routing in mobile wireless sensor networks (MWSNs),’’ Int. J. Sensors, Wireless Commun. Control, vol. 9, no. 4, pp. 507–520, Sep. 2019. 4. J. M. M. Alves, ‘‘Path planning and collision avoidance algorithms for small RPAS,’’ M.S. thesis, Dept. Aerosp. Eng., Tecnico LISBOA, Lisbon, Portugal, 2017. 5. R. M. Chintalapalli and V. R. Ananthula, ‘‘M-LionWhale: Multi-objective optimisation model for secure routing in mobile ad-hoc network,’’ IET Commun., vol. 12, pp. 1406–1415, 2018. Figure 1: Various stages in cluster head formation and malicious nodes identification.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 138 6. T. D. Nguyen, J. Y. Khan, and D. T. Ngo, ‘‘A distributed energy-harvestingaware routing algorithm for heterogeneous IoT networks,’’ IEEE Trans. Green Commun. Netw., vol. 2, no. 4, pp. 1115–1127, Dec. 2018. 7. S. Sarkar and R. Datta, ‘‘Mobility-aware route selection technique for mobile ad hoc networks,’’ IET Wireless Sensor Syst., vol. 7, no. 3, pp. 55–64, Jun. 2017. 8. Mallikarjuna and V. C. Patil, ‘‘PUSR: Position update secure routing protocol for MANET,’’ Int. J. Intell. Eng. Syst., vol. 14, no. 1, pp. 93–102, Feb. 2021. 9. S. R. Halhalli, S. R. Sugave, and B. N. Jagdale, ‘‘Optimisation driven-based secure routing in MANET using atom whale optimization algorithm,’’ Int. J. Commun. Netw. Distrib. Syst., vol. 27, no. 1, p. 77, 2021. 10. V. Alappatt and J. P. P. M., ‘‘Trust-based energy efficient secure multipath routing in MANET using LF-SSO and SH2E,’’ Int. J. Comput. Netw. Appl., vol. 8, no. 4, p. 400, Aug. 2021. 11. Vahid Heydari 2012, “A new acknowledgment-based scheme against malicious nodes and collusion attack in MANETs”, IEEE 14th International Conference on Communication Technology, pp. 784 – 788. 12. Abdulsalam Basabaa, Tarek Sheltami and Elhadi Shakshuki 2014, “Implementation of A3ACKs Intrusion Detection System under Various Mobility Speeds”, Procedia Computer Science, vol.32, pp. 571-578. 13. DaehoKang, Hyung-SinKim, ChangheeJoo and SaewoongBahk 2018, “ORGMA: Reliable opportunistic routing with gradient forwarding for MANETs”, Elsevier Journals- Computer Networks, vol.131, pp. 52-64. 14. ParthPatel, RajeshBansode and BhushanNemade 2016, “Performance Evaluation of MANET Network Parameters Using AODV Protocol for HEAACK Enhancement”, Elsevier Journals- Procedia Computer Science, vol.79, pp. 932-939. 15. Kamini Maheshwar, S. Veenadhari, "Secure Cluster based Routing Protocol for WSN", 2022 IEEE International Conference on Current Development in Engineering and Technology (CCET), pp.1-6, 2022. 16. Hanbing Xie, Gui Zou, Lin Ma, "A Hierarchical Routing Protocol Based on AODV for Unmanned Aerial Vehicle Swarm Network", 2022 IEEE International Conference on Unmanned Systems (ICUS), pp.1113-1117, 2022. 17. Moaath Alshaikh, Akram Morie, "Development of Multipath Dynamic Address Routing Protocol in MANET to Improve Data Transfer in Poor Infrastructure Environment", 2022 International Conference on Computer Science and Software Engineering (CSASE), pp.368-373, 2022. 18. Uppalapati Srilakshmi, Neenavath Veeraiah, Youseef Alotaibi, Saleh Ahmed Alghamdi, Osamah Ibrahim Khalaf, Bhimineni Venkata Subbayamma, "An Improved Hybrid Secure Multipath Routing Protocol for MANET", IEEE Access, vol.9, pp.163043-163053, 2021. 19. Uppalapati Srilakshmi, Saleh Ahmed Alghamdi, Veera Ankalu Vuyyuru, Neenavath Veeraiah, Youseef Alotaibi, "A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks", IEEE Access, vol.10, pp.14260-14269, 2022. 20. Samreen Banu Kazi and Mohammed Azharuddin Adhoni “Secure IDS to detect malevolent node in MANETs” International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), India, pp. 1363 – 1368, March-2016 21. Rasika R. Mali and Sudhir T. Bagade “Detection of Misbehaving node using Secure Acknowledgement in MANET” International Conference on Computing, Analytics and Security Trends (CAST), India, pp. 611 - 616, December- 2016.