Smart, Secure, and Energy-Efficient Routing Algorithm for MANETs

Authors

  • Lingaraj K Rao Bahadur Y Mahabaleshwarappa Engineering College, Ballari, Karnataka, India
  • Lokesh KS Rao Bahadur Y Mahabaleshwarappa Engineering College, Ballari, Karnataka, India

Keywords:

Smart, Secure, Energy, MANETs, AODV

Abstract

Energy consumption and security are two critical aspects of Mobile Ad Hoc Networks (MANETs). In MANETs, application security can be ensured through trust management, key management, firewalls, and intrusion detection. Additionally, secure communication is crucial in military applications where urgent and reliable transmission of sensitive information is required. However, most existing routing algorithms do not adequately address both energy efficiency and security in their design. Since these factors are essential for reliable communication in MANETs, it is imperative to incorporate them into routing algorithms. Enhancing security in routing protocols and employing cluster-based routing can significantly reduce energy consumption by preventing security attacks. To address these challenges, we propose a novel secured routing protocol called Cluster-based Energy Efficient Secure Routing Algorithm (CEESRA). This energy-efficient protocol leverages cluster-based routing, where trust scores are used to identify and mitigate intrusions effectively. By integrating intelligent agents for decision-making, CEESRA significantly reduces Denial of Service (DoS) attacks, ensuring a more secure and efficient routing process. Experimental results demonstrate that our proposed trust-based secured routing algorithm not only enhances security but also reduces energy consumption and routing delays, making it a robust solution for MANETs.

References

Yan, Z., & Prehofer, C., Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 8(6), pp.810–823, 2011.

Li, F., & Wu, J., Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), pp.1035–1048, 2010.

Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., & Kannan, A., Intelligent feature selection and classification techniques for intrusion detection in networks: A survey. EURASIP-Journal of Wireless Communications and Networking, 2013(271), pp.1–16, 2013.

Singh, V. P., & Kumar, K., Literature survey on power control algorithms for mobile ad-hoc network. Wireless Personal Communications, 60(4), pp.679–685, 2011.

De Sanctis, M., Cianca, E., & Joshi, V., Energy efficient wireless networks towards green communications. Wireless Personal Communications, 59(3), pp.537–552, 2011.

Rohokale, V. M., Inamdar, S., Prasad, N. R., & Prasad, R., Energy efficient four level cooperative opportunistic communication for wireless personal area networks (WPAN). Wireless Personal Communications, 69(3), pp.1087–1096, 2013.

Madsen, T., Fitzek, F. H., Prasad, R., & Schulte, G., Connectivity probability of wireless ad hoc networks: definition, evaluation, comparison. Wireless Personal Communications, 35(1), pp.135–151, 2005.

Dang, H., & Wu, H., Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Transactions on Wireless Communications, 9(6), pp.1874–1881, 2010.

Bao, F., Chen, I. R., Chang, M., & Cho, J.-H., Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions Network and Service Management, 9(2), pp.169–183, 2012.

Wang, Y., & Li, L., Two-dimensional trust rating aggregations in service-oriented applications. IEEE Transactions on Services Computing, 4(4), pp.257–271, 2011.

Nikulin, V., Weighted threshold-based clustering for intrusion detection systems. International Journal of Computational Intelligence and Applications, 6(1), pp.1–19, 2006.

Luo, M., Li, X., & Xie, S., An intrusion detection research based on spectral clustering. In Proceedings of 4th international conference on wireless communications, networking and mobile computing WiCOM’ 08, pp.1–4, 2008.

Jianliang, M., Haikun, S., & Ling, B., The application on intrusion detection based on K-means cluster algorithm. In Proceedings of international forum on information technology and applications, IFITA’09 2009, vol.1, pp.150–152, 2009.

Jemili, I., Chaabouni, N., Belghith, A., & Mosbah, M., A multipath layered cluster based routing for ad hoc networks. In 2012 5th international conference on new technologies, mobility and security (NTMS) 2012, pp.1–5, 2012.

Chen, A., Xu, G., & Yang, Y., A cluster-based trust model for mobile ad hoc networks. In 4th International conference on wireless communications, networking and mobile computing, pp.1–4, 2008.

Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H., Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), pp.212–232, 2010.

Das, A., & Islam, M. M., Secured trust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), pp.261–274, 2012.

Serique, L. F. S., & De Sousa, R. T., Evaluating trust in Ad Hoc network routing by induction of decision trees. IEEE Latin America Transactions, 10(1), pp.1332–1343, 2012.

Downloads

Published

2025-11-11

How to Cite

[1]
K. Lingaraj and K. Lokesh, “Smart, Secure, and Energy-Efficient Routing Algorithm for MANETs”, Int. J. Comp. Sci. Eng., vol. 5, no. 2, pp. 168–175, Nov. 2025.

Issue

Section

Research Article