Smart, Secure, and Energy-Efficient Routing Algorithm for MANETs
Keywords:
Smart, Secure, Energy, MANETs, AODVAbstract
Energy consumption and security are two critical aspects of Mobile Ad Hoc Networks (MANETs). In MANETs, application security can be ensured through trust management, key management, firewalls, and intrusion detection. Additionally, secure communication is crucial in military applications where urgent and reliable transmission of sensitive information is required. However, most existing routing algorithms do not adequately address both energy efficiency and security in their design. Since these factors are essential for reliable communication in MANETs, it is imperative to incorporate them into routing algorithms. Enhancing security in routing protocols and employing cluster-based routing can significantly reduce energy consumption by preventing security attacks. To address these challenges, we propose a novel secured routing protocol called Cluster-based Energy Efficient Secure Routing Algorithm (CEESRA). This energy-efficient protocol leverages cluster-based routing, where trust scores are used to identify and mitigate intrusions effectively. By integrating intelligent agents for decision-making, CEESRA significantly reduces Denial of Service (DoS) attacks, ensuring a more secure and efficient routing process. Experimental results demonstrate that our proposed trust-based secured routing algorithm not only enhances security but also reduces energy consumption and routing delays, making it a robust solution for MANETs.
References
Yan, Z., & Prehofer, C., Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 8(6), pp.810–823, 2011.
Li, F., & Wu, J., Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), pp.1035–1048, 2010.
Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., & Kannan, A., Intelligent feature selection and classification techniques for intrusion detection in networks: A survey. EURASIP-Journal of Wireless Communications and Networking, 2013(271), pp.1–16, 2013.
Singh, V. P., & Kumar, K., Literature survey on power control algorithms for mobile ad-hoc network. Wireless Personal Communications, 60(4), pp.679–685, 2011.
De Sanctis, M., Cianca, E., & Joshi, V., Energy efficient wireless networks towards green communications. Wireless Personal Communications, 59(3), pp.537–552, 2011.
Rohokale, V. M., Inamdar, S., Prasad, N. R., & Prasad, R., Energy efficient four level cooperative opportunistic communication for wireless personal area networks (WPAN). Wireless Personal Communications, 69(3), pp.1087–1096, 2013.
Madsen, T., Fitzek, F. H., Prasad, R., & Schulte, G., Connectivity probability of wireless ad hoc networks: definition, evaluation, comparison. Wireless Personal Communications, 35(1), pp.135–151, 2005.
Dang, H., & Wu, H., Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Transactions on Wireless Communications, 9(6), pp.1874–1881, 2010.
Bao, F., Chen, I. R., Chang, M., & Cho, J.-H., Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions Network and Service Management, 9(2), pp.169–183, 2012.
Wang, Y., & Li, L., Two-dimensional trust rating aggregations in service-oriented applications. IEEE Transactions on Services Computing, 4(4), pp.257–271, 2011.
Nikulin, V., Weighted threshold-based clustering for intrusion detection systems. International Journal of Computational Intelligence and Applications, 6(1), pp.1–19, 2006.
Luo, M., Li, X., & Xie, S., An intrusion detection research based on spectral clustering. In Proceedings of 4th international conference on wireless communications, networking and mobile computing WiCOM’ 08, pp.1–4, 2008.
Jianliang, M., Haikun, S., & Ling, B., The application on intrusion detection based on K-means cluster algorithm. In Proceedings of international forum on information technology and applications, IFITA’09 2009, vol.1, pp.150–152, 2009.
Jemili, I., Chaabouni, N., Belghith, A., & Mosbah, M., A multipath layered cluster based routing for ad hoc networks. In 2012 5th international conference on new technologies, mobility and security (NTMS) 2012, pp.1–5, 2012.
Chen, A., Xu, G., & Yang, Y., A cluster-based trust model for mobile ad hoc networks. In 4th International conference on wireless communications, networking and mobile computing, pp.1–4, 2008.
Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H., Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), pp.212–232, 2010.
Das, A., & Islam, M. M., Secured trust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), pp.261–274, 2012.
Serique, L. F. S., & De Sousa, R. T., Evaluating trust in Ad Hoc network routing by induction of decision trees. IEEE Latin America Transactions, 10(1), pp.1332–1343, 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
