access icon free M-LionWhale: multi-objective optimisation model for secure routing in mobile ad-hoc network

Mobile ad-hoc network (MANET) is an emerging technology that comes under the category of wireless network. Even though the network assumes that all its mobile nodes are trusted, it is impossible in the real world as few nodes may be malicious. Therefore, it is essential to put forward a mechanism that can provide security by selecting an optimal route for data forwarding. In this study, a goal programming model is designed using a hybrid optimisation algorithm, called M-LionWhale, for secure routing. M-LionWhale is an optimisation algorithm that incorporates lion algorithm (LA) into whale optimisation algorithm (WOA) for the optimal selection of the path in MANET. The multi-objective optimisation model considers several quality of service (QoS) parameters, namely energy, distance, link lifetime, delay, and trust. With the estimated multi-objective parameters, a fitness function is developed for the best selection of routes. The performance of the proposed algorithm is evaluated using three metrics, such as packet delivery ratio (PDR), throughput, and energy and is compared with that of existing trust-based QoS routing model, LA, and WOA. The proposed M-LionWhale algorithm could attain the maximum performance with 24.1313% residual energy, throughput of 0.2966 kbps, and PDR of 0.3051 at maximum simulation time.

Inspec keywords: optimisation; quality of service; telecommunication network routing; routing protocols; mobile ad hoc networks; mobile radio; ad hoc networks; telecommunication security

Other keywords: ad-hoc network Mobile; mobile nodes; multiobjective parameters; data forwarding; called M-LionWhale; optimal route; multiobjective optimisation model; whale optimisation algorithm; hybrid optimisation algorithm; QoS routing model; goal programming model; emerging technology; optimal selection; MANET; wireless network; M-LionWhale algorithm; secure routing; lion algorithm

Subjects: Protocols; Optimisation techniques; Communication network design, planning and routing; Optimisation techniques; Mobile radio systems

References

    1. 1)
      • 1. Balachandra, M., Prema, K.V., Makkithaya, K.: ‘Multiconstrained and multipath QoS aware routing protocol for MANETs’, Wirel. Netw., 2014, 20, (8), pp. 23952408.
    2. 2)
      • 20. Moustafa, H., Labiod, H.: ‘Multicast routing in mobile ad hoc networks’, Telecommun. Syst., 2004, 25, (1-2), pp. 6588.
    3. 3)
      • 19. Mirjalili, S., Lewis, A.: ‘The Whale optimization algorithm’, Adv. Eng. Softw., 2016, 95, pp. 5167.
    4. 4)
      • 17. Chang, J.M., Tsou, P.C., Woungang, I., et al: ‘Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach’, IEEE Syst. J., 2015, 9, (1), pp. 6575.
    5. 5)
      • 14. Muthusenthil, B., Murugavalli, S.: ‘The impact of location based attacks on geographical routing protocols’, J. Theor. Appl. Inf. Technol., 2014, 60, (2), pp. 189199.
    6. 6)
      • 8. Ertaul, L., Ibrahim, D.: ‘Evaluation of secure routing protocols in mobile ad hoc networks (MANETs)’, Security and Management, 2009, pp. 363369.
    7. 7)
      • 5. Persis, D.J., Robert, T.P.: ‘Ant based multi-objective routing optimization in mobile AD-HOC network’, Indian J. Sci. Technol., 2015, 8, (9), pp. 875888.
    8. 8)
      • 2. Achankunju, M., Pushpalakshmi, R., Kumar, A.V.A.: ‘Particle swarm optimization based secure QoS clustering for mobile ad hoc network’. Proc. of IEEE Int. Conf. on Communication and Signal Processing, Melmaruvathur, India, 2013, pp. 16.
    9. 9)
      • 25. Rajakumar, B.R.: ‘Lion algorithm for standard and large scale bilinear system identification: a global optimization based on Lion's social behavior’. 2014 IEEE Congress on Evolutionary Computation (CEC), Beijing, China, 2014, pp. 21162123.
    10. 10)
      • 9. Dey, R, Saha, H.N.: ‘Secure routing protocols for mobile ad-hoc network (MANETs) – a review’, Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS), 2016, 5, (1), pp. 7479.
    11. 11)
      • 3. Cervera, G., Barbeau, M., Alfaro, J.G., et al: ‘A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs’, J. Netw. Comput. Appl., 2013, 36, (2), pp. 744755.
    12. 12)
      • 7. Borkar, G.M., Mahajan, A.R.: ‘A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks’, Wirel. Netw., 2017, 23, (8), pp. 24552472.
    13. 13)
      • 22. Ali, H., Shahzad, W., Khan, F.A.: ‘Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization’, Appl. Soft Comput., 2012, 12, (7), pp. 19131928.
    14. 14)
      • 16. Mohanapriya, M., Krishnamurthi, I.: ‘Modified DSR protocol for detection and removal of selective black hole attack in MANET’, Comput. Electr. Eng., 2014, 40, (2), pp. 530538.
    15. 15)
      • 13. Marimuthu, M., Krishnamurthi, I.: ‘Enhanced OLSR for defense against DOS attack in ad hoc networks’, IEEE Journal of Communications and Networks, 2013, 15, (1), pp. 3137.
    16. 16)
      • 27. Biswas, J., Gupta, A., Singh, D.: ‘WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol’. Proc. of IEEE Int. Conf. on Industrial and Information Systems, Gwalior, India, 2014, pp. 16.
    17. 17)
      • 29. Yadav, A.K., Tripathi, S.: ‘QMRPRNS: design of QoS multicast routing protocol using reliable node selection scheme for MANETs’, Peer-to-Peer Netw. Appl., 2017, 10,(4), pp. 897909.
    18. 18)
      • 18. Shabut, A.M., Dahal, K.P., Bista, S.K., et al: ‘Recommendation based trust model with an effective defence scheme for MANETs’, IEEE Trans. Mob. Comput., 2015, 14, (10), pp. 21012115.
    19. 19)
      • 26. Gurung, S., Chauhan, S.: ‘A novel approach for mitigating gray hole attack in MANET’, Wirel. Netw., 2018, 24, (2) pp. 565579.
    20. 20)
      • 4. Moussaoui, A., Semchedine, F., Boukerram, A.: ‘A link-state QoS routing protocol based on link stability for mobile ad hoc networks’, J. Netw. Comput. Appl., 2014, 39, pp. 117125.
    21. 21)
      • 21. Chander, S., Vijaya, P., Dhyani, P.: ‘Fractional lion algorithm – an optimization algorithm for data clustering’, J. Comput. Sci., 2016, 12, (7), pp. 323340.
    22. 22)
      • 28. Dorri, A.: ‘An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET’, Wirel. Netw., 2017, 23, (6), pp. 17671778.
    23. 23)
      • 10. Sun, H.M., Chen, C.H., Ku, Y.F.: ‘A novel acknowledgment-based approach against collude attacks in MANET’, Expert Syst. Appl., 2012, 39, (9), pp. 79687975.
    24. 24)
      • 12. Schweitzer, N., Stulman, A., Shabtai, A., et al: ‘Mitigating denial of service attacks in OLSR protocol using fictitious nodes’, IEEE Trans. Mob. Comput., 2016, 15, (1), pp. 163172.
    25. 25)
      • 6. Wang, B., Chen, X., Chang, W.: ‘A light-weight trust-based QoS routing algorithm for ad hoc networks’, Pervasive Mob. Comput., 2014, 13, pp. 164180.
    26. 26)
      • 15. Hussain, Z., Balakrishna, R.: ‘A survey on manets – types, characteristics, applications and protocols used’. National Conf. on Frontiers & Advances in Information Science and Technology, 2014.
    27. 27)
      • 11. Soni, S.J., Nayak, S.D.: ‘Enhancing security features & performance of AODV protocol under attack for MANET’. Proc. of IEEE Int. Conf. on Intelligent Systems and Signal Processing, Gujarat, India, 2013, pp. 324328.
    28. 28)
      • 24. Dand, P., Radhakrishnan, S.: ‘An ant colony-based multi objective quality of service routing for mobile ad hoc networks’, EURASIP J. Wirel. Commun. Netw., 2011, 153, pp. 112.
    29. 29)
      • 23. Rajan, C., Shanthi, N.: ‘Genetic based optimization for multicast routing algorithm for MANET’, Indian Acad. Sci., 2015, 40, (8), pp. 23412352.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2017.1279
Loading

Related content

content/journals/10.1049/iet-com.2017.1279
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading