Abstract
MANET (Mobile Ad hoc Network) is a collection of self-organizing mobile nodes that operate independently of centralized administration or existing infrastructure. MANETs are particularly vulnerable to a range of security risks as a result of this feature. Furthermore, most MANET routing methods are built on the assumption that the network contains no hostile nodes. As a result, various efforts and studies have gone into developing ad hoc networks, and a safe and reliable routing mechanism. Adaptive cuckoo search optimization and entropy-based signature authentication were proposed in this research for safe routing in MANETs. The network's nodes are first clustered using energy sigmoid-based fuzzy c-means clustering. The nodes in the cluster are then given an entropy-based signature. After that, the link lifetime and path distance are estimated to determine the node's future location. Adaptive cuckoo search optimization is then used to find further optimized routes. Finally, entropy-based signature verification is used to ensure secure routing. The experimental results show that the suggested secure routing technique surpasses existing techniques in terms of performance.
Similar content being viewed by others
Data Availability
Not applicable.
References
Awatade, S., & Joshi, S. (2016). Improved EAACK: develop secure intrusion detection system for MANETs using hybrid cryptography. In 2016 International conference on computing communication control and automation (ICCUBEA) (pp. 1–4). IEEE.
Kapur, R. K., & Khatri, S. K. (2015). Secure data transfer in MANET using symmetric and asymmetric cryptography. In 2015 4th International conference on reliability, infocom technologies and optimization (ICRITO), (trends and future directions) (pp. 1–5). IEEE.
Tareq, M., Alsaqour, R., Abdelhaq, M., & Uddin, M. (2017). Mobile ad hoc network energy cost algorithm based on artificial bee colony. Wireless Communications and Mobile Computing, 2017.
Banerjee, P. S., Das, K., Das, S., & Chaudhuri, S. R. B. (2014). AMSPR: A secure multipath routing in mobile ad hoc networks (MANET). In 2014 International conference on devices, circuits and communications (ICDCCom) (pp. 1–6).
Sharma, S. K., Kumar, R., Gangwar, A., & Pakhre, K. (2014). Routing protocols and security issues in MANET: A survey. International Journal of Emerging Technology and Advanced Engineering (IJETAE), 4(4), 918–924.
JoshibhaBency, Annadurai, Ramkumar, Rajesh. (2019). Lightweight node authentication and establishing a secure AODV protocol in mobile ad hoc network. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8.
Rajan, C., & N. Shanthi. (2013). Misbehaving attack mitigation technique for multicast security in mobile ad hoc networks (MANET). Journal of Theoretical & Applied Information Technology, 48(3).
Rajamanickam, V., & Veerappan, D. (2014). Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks. IET Information Security, 8(4), 234–239.
Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: Milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85–96.
Chen, J. T., Boreli, R., & Sivaraman, V. (2012). Improving the efficiency of anonymous routing for MANETs. Computer Communications, 35(5), 619–627.
Zhang, X. M., Wang, E. B., Xia, J. J., & Sung, D. K. (2013). A neighbor coverage-based probabilistic rebroadcast for reducing routing overhead in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 12(3), 424–433.
Macone, D., Oddi, G., & Pietrabissa, A. (2013). MQ-Routing: Mobility-, GPS-and energy-aware routing protocol in MANETs for disaster relief scenarios. Ad Hoc Networks, 11(3), 861–878.
Choudhury, P., Gaddam, R., Parisi, R. B., Dasari, M. B., & Vuppala, S. (2010). A new multi-language encryption technique for MANET. In International conference on advances in information and communication technologies (pp. 22–28). Springer.
Mamatha, G. S., & Sharma, S. C. (2014). Analyzing the MANET variations, challenges, capacity and protocol issues. International Journal of Computer Science & Engineering Survey (IJCSES), 1(1), 14–21.
Jabbar, W. A., Ismail, M., Nordin, R., & Arif, S. (2017). Power-efficient routing schemes for MANETs: A survey and open issues. Wireless Networks, 23(6), 1917–1952.
Zougagh, H., Toumanari, A., Latif, R., Elmourabit, Y., & Idboufker, N. (2014). Modified olsr protocol for detection and prevention of packet dropping attack in MANET. International Journal of Computer Applications, 100(17).
Taneja, S., & Kush, A. (2010). A survey of routing protocols in mobile ad hoc networks. International Journal of Innovation, Management and Technology, 1(3), 279.
Maan, F., & Mazhar, N.: MANET routing protocols vs mobility models: A performance evaluation. In 2011 Third international conference on ubiquitous and future networks (ICUFN) (pp. 179–184).
Kodole, A., & Agarkar, P. M. (2015). A survey of routing protocols in mobile ad hoc networks. Multidisciplinary Journal of Research in Engineering and Technology, 2(1), 336–341.
Satheeshkumar, S., & Sengottaiyan, N. (2017). Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Cluster Computing, 1–12.
Cai, R. J., Li, X. J., & Chong, P. H. J. (2018). An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Transactions on Mobile Computing, 18(1), 42–55.
Ermiş, O., Bahtiyar, Ş, Anarım, E., & Çağlayan, M. U. (2017). A secure and efficient group key agreement approach for mobile ad hoc networks. Ad Hoc Networks, 67, 24–39.
Hammamouche, A., Omar, M., Djebari, N., & Tari, A. (2018). Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. Journal of Information Security and Applications, 43, 12–20.
Usman, M., Jan, M. A., He, X., & Nanda, P. (2018). QASEC: A secured data communication scheme for mobile ad-hoc networks. Future Generation Computer Systems.
Anbarasan, M., Prakash, S., Antonidoss, A., & Anand, M. (2018). Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks. Multimedia Tools and Applications, 1–21.
Sood, I., & Sharma, V. (2021). Comparing computational intelligent techniques for DDOS attacks detection. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(6), 4774–4789.
Han, L., Cao, S., Yang, X., & Zhang, Z. (2020). Privacy protection of VANET based on traceable ring signature on Ideal lattice. IEEE Access, 8, 206581–206591.
Jamaesha, S. S., & Bhavani, S. (2019). A secure and efficient cluster based location aware routing protocol in MANET. Cluster Computing, 22(2), 4179–4186.
Sathiya, D., & Gomathy, B. (2019). Improved security and routing path learning in MANETs using Beer-Quiche game theoritical model in cloud computing. Cluster Computing, 22(1), 21–31.
Funding
In this research article has not been funded by anyone.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
All authors do not have any conflict of interest.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Aluvala, S., Rajasekhar, K. Secure Routing in MANETS Using Adaptive Cuckoo Search and Entropy Based Signature Authentication. Wireless Pers Commun 128, 1519–1541 (2023). https://doi.org/10.1007/s11277-022-10008-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-10008-5