IEEE Access (Jan 2021)

Trust Aware Secure Energy Efficient Hybrid Protocol for MANET

  • Neenavath Veeraiah,
  • Osamah Ibrahim Khalaf,
  • C. V. P. R. Prasad,
  • Youseef Alotaibi,
  • Abdulmajeed Alsufyani,
  • Saleh Ahmed Alghamdi,
  • Nawal Alsufyani

DOI
https://doi.org/10.1109/ACCESS.2021.3108807
Journal volume & issue
Vol. 9
pp. 120996 – 121005

Abstract

Read online

Mobile ad hoc network (MANETs) is infrastructure-less, self-organizing, fast deployable wireless network, so they truly are exceptionally appropriate for purposes between special outside occasions, communications in locations without a radio infrastructure, crises, and natural disasters, along with military surgeries. Security could be the primary weak spot in manet on account of this flexibility of structures and always changing dynamic topology, that will be very exposed to your selection of strikes like eavesdropping, routing, and alteration of programs. MANET is affected with security issues, surpassing Quality of services (QoS). So, intrusion tracking which modulates your system to recognize some other violation weakness would be that the top approach to guarantee security for MANET. Detecting intrusions has a critical part in supplying protections and functions as beyond layer of defenses against access. Power collapse of the cellular node maybe not merely alter the node alone but its capacity to forwards packets which is based on total system life. This also caused the institution of the routing protocol to its stable optimal choice of this multi-path to increase the navigation MANETs. Provision of energy-efficient and secure routing is a challenge given the changing topology and restricted resources of this kind of network. To address the energy efficiency and security we suggest a trust-based secure energy efficient navigation in MANETs employing the hybrid algorithm, cat slap single-player algorithm (C-SSA), that selects the best jumps in advancing the routing. In the beginning, the fuzzy clustering is put on, and the cluster heads (CHs) are picked predicated maximum worth of indirect, direct, and recent trust. Predicated on trust threshold worth nodes additionally discovered. Even the CHs are participated from the multi hop routing, and the assortment of the best route relies upon the projected hybrid protocol, and that selects the best routes determined by the delay, throughput, along with connectivity within this course. The proposed method obtained a minimal energy of 0.11m joules, a negligible delay of 0.005 msec, a maximum throughput of 0.74 bps, a maximum packet delivery ratio of 0.99 %, and a maximum detection rate of 90%. The proposed method compared with the existing techniques in the presence and absent of the selective packet dropping attack.

Keywords