245
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Hybrid Secure Cluster-Based Routing Algorithm for Enhanced Security and Efficiency in Mobile Ad Hoc Networks

&
Article: 2341357 | Received 30 Mar 2023, Accepted 27 Mar 2024, Published online: 23 Apr 2024

ABSTRACT

This research addresses critical gaps in Mobile Ad hoc Networks (MANETs) by proposing a hybrid secure cluster-based routing algorithm, focusing on enhancing network security, robustness, and reliability through multipath routing. Methodologically, the approach integrates Convolutional Neural Networks (CNN) for optimal path routing and Emperor Penguin Optimization (EPO) for clustering, introducing a novel combination for efficient cluster head selection. A novel contribution lies in the development of a prediction technique utilizing a trust assessment algorithm to calculate direct trust ratings at each node, incorporating fuzzy values between zero and one. Trust values are further influenced by node performance, adding a dynamic dimension to the trust evaluation process. Key novelties include the emphasis on energy efficiency, network longevity, remaining energy, security level, bandwidth, and packet delivery ratio as evaluation criteria. The proposed CNN-EPO model demonstrates superior results compared to traditional routing protocols, achieving a remarkable 95% energy efficiency, a heightened security level of 99%, and a throughput reaching up to 8 Mbps. Additionally, the Packet Delivery Ratio (PDR) attains close to 99% and routing overhead remains below 0.5, ensuring efficiency in challenging network scenarios with 50 adversaries. In summary, this research contributes a comprehensive solution to MANET challenges, introducing a novel hybrid routing algorithm, incorporating advanced methodologies for path optimization and clustering. These outcomes highlight how important the suggested strategy is to improve the existing state of the art in MANETs.

Introduction

High node portability and erratic wireless connectivity define Vehicular Ad Hoc Networks (VANETs), a difficult segment of Mobile Ad Hoc Networks, (MANETs) (Janani and Manikandan Citation2020; Xu et al. Citation2020). Developing a reliable navigation strategy for VANETs is crucial, given the dynamic nature of nearby vehicles and the inherent irregularities in wireless connectivity. MANETs, in general, have faced vulnerabilities due to their flexible and configurable nature, making them susceptible to attacks (BrijilalRuban and Paramasivan Citation2021; El-Semary and Diab Citation2019; Veeraiah et al. Citation2021). Because of its changing structure and limited funding, ad hoc networks present challenges for implementing a secure and priority Quality of Service (QoS) routing mechanism.

This study addresses these challenges through the introduction of the Movement-Aware Routing Protocol based on Hybrid Optimization (MARP-HO) for MANETs. Emphasizing the importance of secure data transfer, the research integrates advanced optimization techniques and encryption methods to enhance both energy efficiency and security in ad hoc networks (Jabbar, Saad, and Ismail Citation2018; Kaliyamurthi and Palanisamy Citation2021). The issues of energy consumption and potential cluster head failures in MANETs are tackled through a practical approach. Cooperative communication (CC) in MANETs, particularly its benefits in energy management and path selection, is explored. A hybrid inter-group operating method is proposed, leveraging cluster and place routing techniques to manage the constant movement of network nodes effectively. The study recognizes the flexibility of setting up and connecting wireless nodes in MANETs without preexisting infrastructure or centralized administration (Devi and Hegde Citation2018; Krishnakumar and Asokan Citation2022). It also highlights the limitations of traditional routing protocols that focus solely on the shortest path, overlooking factors like queuing delays and link latency. The dynamic topology of VANETs allows nodes to freely join or leave, making it a complex field of vehicle communication. The study acknowledges the added complexity introduced by transmissions and potential attacks on communication channels, including black hole or wormhole attacks. The research introduces the approach, integrating collaborative optimization with AES-128 encryption for secure routing in MANETs. For Unmanned Aerial Vehicles (UAVs) in FANETs, it prioritizes energy-efficient route design to enhance reliability and Packet Delivery Ratio. Recognizing Underwater Acoustic Networks (UWANs’) security challenges, it highlights the threat of energy leakage, emphasizing the need for stability. The study also proposes a CNN-based secure routing system for automotive ad hoc networks, crucial for spreading emergency messages in dynamic scenarios.

The proposed system innovatively combines Emperor Penguin Optimization, Convolutional Neural Networks, and robust trust management to address critical challenges in MANETs and the Internet of Things (IoT). Motivated by the need for secure, efficient, and dependable network communication, the study introduces a hybrid safe cluster-based routing algorithm. This algorithm not only ensures high throughput, security, and clustering but also dynamically selects cluster heads, progressively enhancing the network’s lifespan. The innovation lies in the integration of novel methods such as Emperor Penguin Optimization for clustering and Convolutional Neural Networks for optimal path routing. The contribution of this study is multifold, introducing a comprehensive defense mechanism against Blackhole, Wormhole, and Man in the Middle attacks. Additionally, the trust management system, utilizing TEBACA and a “rating friends” approach, ensures the selection of trustworthy cluster heads, fostering network stability. The secure routing strategy based on CNN evaluation and XOR-based encryption further fortifies the system against malicious threats. In summary, this study pioneers a holistic approach to MANET-IoT communication, offering advancements in routing, security, and trust management for a more resilient and efficient wireless network. The proposed approach holds significant industrial relevance by providing robust solutions to critical challenges in various ad hoc networks, including VANETs, UWANs, and FANETs. Its integration of advanced optimization, encryption, and neural network-based routing not only enhances network security and efficiency but also aligns with the evolving demands of industries relying on seamless and secure communication in dynamic and resource-constrained environments.

Related Work

(El-Semary and Diab Citation2019) proposes a clustering-based routing mechanism for MANETs, utilizing mobility information such as node degree and vehicle velocity. The circular base function neural net technique identifies cluster heads, demonstrating superior throughput, packet transmission rate, and total delay in simulations compared to other approaches (Arulselvan and Rajaram Citation2023) offers a hybrid trust-based secured routing system for MANETs that tackles the difficulties of environmental monitoring.The model employs the Skill Optimization Technique for node clustering, Deep Q-Learning for trust computation, and Diffusion Convolutional Neural Networks (DCNN) for routing. The approach effectively identifies and compares routing attacks, enhancing communication for environmental risk assessment (Ilakkiya and Rajaram Citation2024). introduces BL-IDS, a decentralized Blockchain-powered intrusion detection system for MANETs. The solution uses hybrid authentication, a similarity index for cluster formation, and wild horse optimization for routing. Results show enhanced efficiency across various metrics, demonstrating the effectiveness of the lightweight IDS in bolstering MANET performance and security.

(Karthick and Asokan Citation2021) presents MARP-HO, a Hybrid optimization-based mobility-aware routing algorithm for metropolitan area networks. The improved optimization for ant colonies (IACO) algorithm is used for router path calculation, while the new animal migration optimization (IAMO) technique is used for energy-efficient clustering. The evaluation shows enhanced performance across a range of metrics.

(Selvakumar and Sudhakar Citation2022) introduces EECSRP, an energy-efficient clustering with a secure routing protocol for MANETs. The model employs hybrid evolutionary algorithms for cluster head selection and route selection. Evaluation using NS2 shows superior performance across various parameters, affirming its efficacy in enhancing energy efficiency and reliability (Thamizhmaran and Charles Citation2023). focuses on CHRN-SHSP, a cluster head-based energy-efficient approach with a secure and shortest path selection routing protocol for MANETs. The model considers both obstacle and non-obstacle environments, demonstrating effectiveness in improving routing efficiency and energy management compared to existing relay node protocols (Jubair et al. Citation2022) proposes the QoS+ routing protocol for VANETs, addressing mobility and security challenges. QoS+ combines QoS-based CH selection and hybrid cryptography using AES and ECC. Evaluation in NS2 shows QoS+ outperforming previous works in various scenarios, with notable excellence in CH efficiency and cluster member efficiency (Rathish et al. Citation2021). introduces DCAIDS, a clustering-based Intrusion Detection System (IDS) for MANETs. DCAIDS employs the Weighted Clustering Algorithm (DCA) for path establishment, detecting intruder attacks, isolating affected nodes, and optimizing communication pathways.

(MVSS and Babu Citation2020) proposes EESSC, an energy-efficient stable and secure clustering technique for MANETs. EESSC employs fuzzy logic for CH selection and introduces Standby CH (SBCH) for improved stability and security. Simulation results demonstrate effectiveness with fewer CH changes over a 250s period (Abdulhae, Mandeep, and Islam Citation2022) provides a thorough analysis of cluster-based routing methods (CBRPs) for UAV-based Flight Ad-Hoc Nets (FANETs) (Deepa and Latha Citation2019). The review analyzes 21 CBRPs, providing insights into their strengths, weaknesses, applications, and performance measures, while identifying open issues for future research (Raj Citation2020) proposes a hybrid optimization model for routing in Flying Ad-Hoc Networks (FANETs), leveraging bee colony optimization (Wheeb and Naser Citation2021). The optimized routing strategy demonstrates superior performance by reducing delay and communication overhead compared to traditional routing protocols (Reka et al. Citation2023) proposes the utilization of Enhanced Chicken Swarm Optimization (ECSO) in MANETs for mobility and energy efficiency. ECSO is incorporated into the cluster head selection process of the Adaptive Position Routing Protocol (APRP), showcasing superior performance in various metrics in simulations.

(Zhou, Tan, and Iroshan Citation2023) proposes a novel authentication and key agreement scheme for Vehicle Ad Hoc Networks (VANETs), (Ilakkiya and Rajaram, Citation2023) addressing security issues. The scheme ensures mutual authentication, secure communication, and dynamic vehicle management, with efficiency evaluated to be approximately 35% lower computing and communication overhead compared to existing schemes (Zhang Citation2023) introduces the metaverse as a transformative technological advancement, emphasizing its potential for immersive interactions and personalized learning experiences for preschoolers (Wheeb Citation2022). The research highlights the significance of strong security protocols, such as encrypting and authentication using multiple factors, in guaranteeing a safe virtual space under the dynamic of the multiverse. Overall summary of existing works are shown in below .

Table 1. Summarization of related works.

Proposed Work

System Model

Naeem et al., (Citation2023) The proposed system model has n mobile nodes that are free to roam about the network, such as N_1,N_2,…,N_n. The minimum and maximum mobility of the nodes is denoted by [minμ,maxμ], and the nodes have various velocities. On the basis of distance and movement metrics, the whole network is divided into several clusters. The nodes that are closest to one another and have comparable mobility are grouped together.

In , the suggested MANET-IoT is seen. The internet includes both certified and untrusted nodes, which are as depicted in the picture (malicious or attacker) (Wheeb et al., Citation2023). Presumably, there are always fewer assailant nodes (m) than normal nodes (n), or m<n. . Provides a summary of the danger models under consideration.

Figure 1. Proposed network model.

Figure 1. Proposed network model.

Each MANET is a technology needs effective forwarding to handle the potential for network failures, attempts at hacking, and constraints on resources. This study proposes a method for a hybrid safe cluster-based routing algorithm, delivering high throughput, security, clustering, and picking cluster heads, in order to make it possible to gradually increase the network’s life duration. In this analysis, the results are contrasted with the conventional routing protocol. At first, CNN is considered for optimal route routing, while EPO is demonstrated for clustering. Both of these are offered as first methods. Our method of prediction utilizes a trust evaluation algorithm at each node, which is then normalized as a fuzzy number between zero and one. This allows us to determine the direct trust rating. In addition to this, the trust value is determined by the performance of each node. The experimental results are evaluated based on a number of parameters, include energy efficiency, network durability, residual energy, level of security, bandwidth, and the percentage of packets delivered. According to the investigation, the suggested routing algorithm has the ability to offer MANET-IoT a lot more organized, longer network lifetime, higher quality of service, and more cost-effective routes than the current approaches.

Threat Model

This work detects and mitigates the following attacks:

  • Blackhole: The attacker injects routing sensor data into the network, sends packets in the direction of the problem, and then drops them. The attacker in a black hole attack will brag to the defenders that their route is the quickest. If this answer comes in before the true one, a false route including the harmful network node will be constructed. A packet may now be dropped by this malicious node. The throughput and packet-to-delivery ratio of the AODV protocol may be evaluated using a black hole attack by stationing an attacker on a single node.

  • Wormhole: In a worm hole attack, a malicious node seizes data from one section of the network and sends it via a hidden tunnel to another. Disruptions in the network may occur if information regarding fault routing leaked. Using encryption and node location data, the authors of established a way to defend MANET from this assault.

Attack known as the “Man in the Middle”

This type of assault involves a malevolent node positioned in between the source and the target. After that, it gathers all of the messages and either alters or deletes them. Since MANET transfers data hop-by-hop, it is susceptible. Both authentication and encryption provide robust defenses against such an attempt.

Clustering

The cluster’s leader amasses all the information and authority from the group’s members. This data is utilized to identify the most appropriate cluster head for transmission to the command center. The information collected from mobile nodes will be used by the ground station to decide which nodes will act as CHs. Here, the cluster head is identified in terms of the network’s health using Emperor penguin optimization. The best nodes may be clustered using this method. The basics of optimizing for the Emperor Penguin are as follows:

  • Set the initial huddle perimeter.

  • Determine the temperature distribution in the area of the group

  • Determine the fitness value.

  • The ideal fitness function may be attained by relocating the best mover.

Set the Huddle Boundary to Zero.

The imperial penguin will determine the first huddle boundary according to the minimum & maximal range of a wireless sensor network. Boundary values vary with context. The perimeter of the cluster is in the shape of an L. The emperor penguin serves as the focal point of the L-shaped polygon. As a Emperor Penguin makes a move, the others all shift to follow suit. The most efficient worker is selected in this group discussion. We pinpoint the most influential driver in forming clusters of functional sensors. A number of emperor penguins are dispersed over the shape. The emperor penguin shares its habitat with at least 2 other species of penguin. Despite its rapid appearance, the penguin is really much slower than the wind.

The wind speed is used to determine the Huddle limit for the emperor penguin Vw and its gradientφw. Here, we provide the correlation between wind speed and slope in EquationEquation 1.

(1) φw=Vw(1)

Hence, the initialization of the huddle border is as EquationEquation 2, where v is the wind velocity.

(2) Fw=φw+iΩ(2)

Calculating the Temperature Profile

The temperature is a major consideration when it comes to exploring & profiting just on huddle’s search space. The penguins are huddling together to stay warm, with the dominating emperor penguin in the center. The vibe of the group embrace TH is depends on the radius of the huddle RH. It is given by the following EquationEquations 3 and Equation4.

(3) TH=0;ifRH>1(3)
(4) TH=1;ifRH<1(4)

The temperature profile is adjusted after each repetition by solving the following EquationEquation 5.

(5) TH=TImiIm(5)

The iteration number I is represented in the preceding equation by the term I and Im as many times as possible. With the help of the three equations, the temperature profile at the huddle border is adjusted.

Analysis of Fitness Function Criterions

Analysis of Energy Consumption

The total energy Et consumed as EquationEquation 6

(6) Etsi,d=siE+siεfsd2,dd0siE+siεmpd2,d>d0(6)

Where do=εfsεmp

Where E indicates the energy used to forward or accept one bit message; εfs is the amplification coefficient of free-space signal and εmp is the multi-path fading signal intensification coefficient, its rates based on the path amplifier model and d indicates the distance among transmitter and receiver; si is the bit quantity of transmitting data packets.

Mobility Prediction

Velocity or stability is a vital factor in decide the CHs. To avoid frequent CH change this present scheme is wanted to select a CH that does not travel very rapidly. Whether the CH node travels quick means the nodes might be dividing from the CH and as an output of a re-affiliation occur. This can enlarge computation and processing, that does not an attractive characteristic. The stability of the connection will also increase the strength of the group. The node’s displacement along the rate of that displacement indicate the stability of every connation. EquationEquation 7 can be used for estimating the duration of any link.

(7) LD=ab+cd+a2+c22adbc2a2+c2(7)

Where, a=vicosθivjcosθj,b=xixj,c=visinθivjsinθj,b=yiyj and vi, vjare speeds of mobility. Some GPS data is required to determine the node’s level of stability. After estimation, LD (Link Delay) is reverse. stability of a node-to-node communication as measured by EquationEquation 8.

(8) LNs=eLD(8)

Where, the Minimum rate of Ns offers extra stable connection.

Evaluate the Fitness Function

The amount of power that a sensor node consumes is the fitness function in this investigation. In an attempt to reach its full fitness potential, an imperial penguin is marching toward its fellow species’ representative in the center. The penguin constantly changes its posture based on the most efficient movers it has identified. The current emperor penguin population size is compared to the original emperor penguin population size to determine the position update.

The distances between emperor penguins are determined by the following factors:

  • Things that make the greatest emperor penguin inevitable SEp.

  • Considerations for avoiding collisions AEP and CEP.

  • The most effective penguin posture PB

  • Where are emperor penguins right now PEp

  • Present version i.

Using these factors, we can solve for the distances between penguin using EquationEquation 9.

(9) D=absSEpAEP.PBiCEP.PEpi(9)

Both of these elements are critical to the emperor penguin’s social structure f and 1. The emperor penguin’s forays into and use of the huddle area are driven by these two criteria. EquationEquation 10 below provides the formula.

(10) SEp=f.ei/lei(10)

The crash evading features AEP and CEP is considered spending the following EquationEquations 11Equation13.

(11) AEP=2TH+PgridaccuracyrandTH(11)

The Pgrid The optimum emperor penguin location minus the actual emperor penguin location is the measure of accuracy.

(12) Pgridaccuracy=PBPEp(12)

A random number between 0 and 1 is used as the collision avoidance factor.

(13) CEP=rand0,1(13)

To calculate the difference between the current empire penguins and the best imperial penguin, substitute Equation (EquationEq 10, Equation11, Equation12, & Equation13 in EquationEq 6. Hence, the effective movers are identified, and the imperial penguins’ distributions are revised.

Relocation of the Emperor Penguin

At each iteration, the emperor penguins move about until they find the best spot. The most recent information on the emperor penguin’s location is as follows EquationEq. 14.

(14) PEpi+1=PEpiAEP.D(14)

The emperor penguin’s position will be constantly updated when the loop is severed. The optimal position of a emperor penguin reveals which cluster members are active, and its value reveals the vitality of the nodes.

After the stopping requirement is reached, an emperor penguin will stop executing EquationEqs 3-Equation11. Using Emperor penguin optimization, the best cluster heads for a MANET-IoT may be identified. On the basis of these cluster masters, the reliable CN is employed for data transport.

Trust Management

The routing procedure starts off with the determination of each cluster’s head. A trustworthy hub is required of the cluster’s leader. No malicious, self-serving, or gray hole-attacking nodes may be elected as cluster leaders. Hence, controlling trust is essential. The most reliable nodes in the cluster may be identified with the use of a challenge evaluation process i.e TCHALLENGE, In order to strengthen the network’s stability and collect information about each other for a friends list, one possible technique is a “rating friends” one, in which each node ranks its nearby neighbors. During the friend-sharing phase, node A will ask node B for its buddy list and then update its own list accordingly. If nodes A or node B are friends, and if node C is also a neighbor of node B yet not of nodes A, then node A may determine its confidence in node C by node B. B i.e TRECOMMENDED.

Each mobile site in a cluster is given a trustworthiness score based on the parameters listed above. The honesty, proximity, collaboration, and energy reserves of a node are the determining factors in its reliability (i.e., values of QoS trust metrics). Hence, TEBACA is relied upon, since it combines information from its own ideas and its interactions with its neighbors into a single score is shown in EquationEq 15.

(15) Trust,T=w1×EREMAINING+w2×ceilTCHALLENGE×10+w3×ceilTRECOMMENDED(15)

A node on a friend list may have a trustworthiness between 0 and 10. If a node’s value is higher above 10, it is considered hostile. Hence, bonds formed between friends are held in high regard. Nodes that perform very well in three metrics – residual Energy, network throughput, and node connection – are selected as cluster leaders. Due to the dynamic nature of a cluster’s nodes, we offer a method for periodically updating the cluster’s trustworthiness. With this updated trust value, we’ll be more able to identify attackers and select a new cluster leader.

When every one of the nodes has completed their calculations, they will then share their neighborhood views with their neighbors, or the gadgets within a hop count of each other. The local perspectives of a node’s neighbors may influence the node’s own viewpoint. This method takes a simplistic tack by averaging out all of the regional viewpoints. Within the equation n1 represents node and T1 represents old trust value of node and T2 represents changed value.

Secure Routing

The increasing popularity of mobile and IoT applications has increased the need for a reliable wireless network routing mechanism [25]. This is because traditional routing methods can’t improve routing depending on how well a network has performed in the past. To this end, we suggest a CNN-based routing strategy is shown in . We introduce a routing approach that decides on routes depending on how well the CNN thinks the network is doing. The characteristics of the flow and security systems, in addition to the intermediate nodes, are added to the network feature matrix, which improves the CNN’s evaluation of the network’s performance.

Figure 2. CNN-Based routing strategy for enhanced network performance evaluation.

Figure 2. CNN-Based routing strategy for enhanced network performance evaluation.

The variables are given as EquationEq 16Equation18,

(16) SK=SK1,SK2,SK3,SK4,SK5,SK6,SK7,SK8(16)
(17) R=R1,R2,R3,R4,R5,R6,R7,R8(17)
(18) IV=IV1,IV2,IV3,IV4(18)

It works upon operations of 16-bit words. To safeguard the data, restricted OR actions and addition modulus procedures are used [26]. The plaintext portion (PT_i), or data packet, is secured in the following way: EquationEquation 19.

(19) CTi=WD16R4it3,K5,K6,K7,K8R1i(19)

Then, this ciphertext (CTi) is transmitted through optimal route.

Results and Discussion

Simulation Setup

The simulation program Network Simulator Version 3 (NS-3.25) is used to construct the suggested MANET network [28]. The events network management simulator, ns-3.25, is used for setting up the network using the computer dialects C++ and TCL. As a matter of fact, ns-3.25 allows for the integration of Blockchain and implements most wireless protocols used for connectivity. As a result, we used ns-3 for computations. displays the key approximated variables.

Table 2. Simulation parameters.

By a network with cloud server, a hundred nodes are taken into account, as shown in .

Comparative Analysis

The effectiveness of the suggested system is assessed using a variety of measures, such as the use of power, power remained the ratio of packet delivery (PDR), productivity, network lifespan, routing above, and security. We analyze historical efforts in comparison to where AODV, Trust Routing, and E-MAT are right now [27].

Analysis on Energy Efficiency

The efficiency with which network nodes utilize the energy given to them is quantified by the fraction of that energy that is actually used.

. compares the thermal efficiency of the projected and current works. The desired effort is preferable to the alternates, as the outcomes demonstrate. The proposed model employs a method of route selection that maximizes the energy efficiency of the network and can bring that efficiency up to 95%. This is far better than existing AODV routing and trust based routing. In AODV, the route is selected only based on the availability while trust-routing selects route based on the trust value alone. Due to this limited metric consideration the existing works fail to achieve energy efficiency below 80%. Thus, involvement of optimum cluster formation and route selection improves the overall energy efficiency. The main reason behind this result is involvement of cluster formation and optimal routing in the proposed approach [29].

Figure 3. Comparison on energy efficiency.

Figure 3. Comparison on energy efficiency.

Analysis on Network Lifetime

When a network has living links with leftover energy above its foundation, it is said to have a “lifetime.”The number of nodes alive for the specified time period is compared in . The total number of live nodes steadily decreases as the time in seconds increases. There are 100 nodes alive when the time is first started, or 1 second. As the period is extended, this number decreases. In the course of trust-based forwarding strategy, AODV has just twenty active nodes while the scheme with 30 live nodes is used. Nevertheless, in 100s of hours of simulation, 70 nodes are still alive in the suggested task.

Figure 4. Comparison on number of nodes alive.

Figure 4. Comparison on number of nodes alive.

compares the total amount of nodes and the total number of attackers that have attacked the network over its existence. The lifespan of the system rises in accordance to the link count. On the other hand, a higher number of attackers results in a shorter network lifetime. In other words, an attacker’s engagement in the network significantly reduces its longevity. When 10 attacker nodes are involved, the suggested network can withstand 75 rounds, compared to 9 rounds with the AODV and 18 rounds for Trust-based route. Thus, the proposed methodology is far better than existing works in providing better network lifetime by controlling attacks involvement in the network [30].

Figure 5. Comparison on network lifetime.

Figure 5. Comparison on network lifetime.

Analysis on Residual Energy

Each network node’s current energy condition is described by the critical performance metric known as residual energy.

, compares the projected and existing works’ energy efficiency. Energy utilization often increases when there are more attackers on the network. The energy supplies of the nodes are being attacked. The nodes will ultimately stop functioning after a given amount of time when their energy is completely used up. To prevent this, the entire network has to be protected against attacks.

Figure 6. Comparison on residual energy.

Figure 6. Comparison on residual energy.

Figure 7. Comparison on security level.

Figure 7. Comparison on security level.

Analysis on security level

The degree to which packets in a network have been modified is indicative of its susceptibility to attack. The simple fact that numerous information packages are changed suggests that there are multiple offenders on the network at once.

The research indicates that the work suggested has a degree of safety of 99%, which is far higher than the ones that that are already in use, as figure 3.7 illustrates. The recommended work’s security is increased by the following features: (i) a network’s multi-attribute cryptography provides excellent safety and effectively uses identification to prevent unwanted nodes from joining. Consequently, there are no unsafe or unapproved nodes in the network. (ii) To ensure that there are no dangerous untrustworthy nodes, the multifaceted trust value is taken into account when choosing the best course. Encrypted secures data by preventing rogue nodes from listening in on it or altering it.

Analysis on Throughput

Throughput measures how much information can be transmitted from one location to another during a certain period of time through a network. Bits, rather than megabits per second or gigabits per second, are often used to quantify network performance (bps).

displays a contrast between the projected and actual outputs of the works. Throughput, influenced by channel security and data transmission methods, exhibits a twofold improvement over existing works, reaching up to 8 Mbps. This success is attributable to the recommended works strong managing networks using routing methods and safety plan. The approach not only outperforms in data transmission but also significantly minimizes data loss. Further dissecting throughput with respect to nodes () and attackers (), the figures indicate a progressive decline in throughput as the number of attacker’s increases, aligning with expectations due to increased attacks on data transfers. Despite this, the suggested approach consistently outshines current works, maintaining optimal throughput even under challenging scenarios.

Figure 8. Comparison on throughput.

Figure 8. Comparison on throughput.

Analysis on Packet Delivery Ratio (PDR)

The percentage of sent communications that actually arrive at the address they were intended is known as the packet arrival ratio, or PDR.

As illustrates, the PDR produced by the planned work is very nearly 99%, which is much greater than the PDR produced by the ongoing programs. In case 1, the PDR increases steadily as the node count increases. The probability that the best path will be chosen rises with the amount of nodes. Consequently, the data is transmitted efficiently and consistently. Conversely, the PDR decreases as the number of assailants rises. This is due to increased attack activity that is modifying route data and leading to packet loss. Nonetheless, the suggested Block-Sec approach yields superior PDR in both cases. This study demonstrates that, in spite of the recommended security precautions, cluster-based routing leads to optimum routing.

Figure 9. Comparison on PDR.

Figure 9. Comparison on PDR.

Analysis on Routing Overhead

Routing overhead is caused by the extra management packets required to transmit information packets effectively. It is the ratio of the overall quantity of traffic control messages sent from all of the nodes to the amount of data packets received at the destination node.

depicts the association between the frequency of network nodes and the number of attackers and the route overhead of both current and suggested solutions. It has been demonstrated that in a distributed system with a unique identifier and 50 competitors, the recommended technique results in less than 0.5 of a networking overhead. Retransmissions that route demand generation become necessary when the number of attackers on the E-MANET increases, adding to the complexity. Conversely, the suggested approach preserves the best broadcast path based on a multi-modal route, which reduces the amount of repeat transmissions, or routing overhead.

Figure 10. Comparison on routing overhead.

Figure 10. Comparison on routing overhead.

Discussion

The experimental results provide valuable insights into the proposed strategy’s performance. With a meticulous focus on objectivity and conciseness, we aim to enhance the discussion of these outcomes. The innovation lies in a hybrid cluster-based routing algorithm, leveraging Convolutional Neural Networks (CNN) for optimal path determination and Emperor Penguin Optimization (EPO) for efficient clustering. It’s crucial to emphasize the unique amalgamation of CNN and EPO, enabling superior throughput, security, and energy efficiency. The strategic route selection mechanism, maximizing network energy efficiency up to 95%, stands out against traditional AODV and trust-based routing approaches, which fall short below 80%. Further detailing the algorithm’s intricacies and highlighting the distinct roles of CNN and EPO in cluster formation and route optimization incorporated for a more comprehensive understanding. Furthermore, it is critical to analyze the impact of IoT principles on our suggested system. Our approach demonstrates substantial improvements in wireless network performance by incorporating IoT principles such as data-driven decision-making and adaptive networking. IoT-enabled devices add to the network’s dynamic character by providing real-time data collecting and analysis for better routing decisions and resource allocation. Our simulation includes IoT-related characteristics such as data volume, data rate, and device mobility to realistically reflect real-world IoT installations. This assures that our findings apply to IoT-enabled wireless networks, where scalability, dependability, and energy efficiency are critical. In conclusion, our proposed system offers a big step forward in wireless network optimization, utilizing novel methodologies and IoT principles to improve performance, dependability, and security. By solving fundamental MANET difficulties and embracing IoT concepts, our method paves the path for more efficient and resilient wireless networks in IoT settings.

Conclusion & Future Work

This study proposes a method for a hybrid safe cluster-based routing protocol, delivering high bandwidth, security, clusters, and picking cluster heads, in order to make it possible to gradually increase the network’s life duration. In this analysis, the results are contrasted with the conventional routing protocol. At the beginning, convolutional neural networks are introduced for the purpose of optimal route routing, while EPO is introduced for the purpose of clustering. Our method of prediction utilizes a trust evaluation algorithm at each node, which is then normalized as a fuzzy number between zero and one. This allows us to determine the direct trust rating. In addition to this, the trust value is determined by the performance of each node. The experimental results are evaluated based on a number of parameters, achieving a 99% security level, 8 Mbps throughput, and 99% Packet Delivery Ratio, the impact of IoT is evident in extended network lifetime and enhanced energy efficiency (up to 95%). The research indicates that the proposed routing algorithm has the potential to provide sensors in wireless networks a greater service quality, a longer network lifetime, more energy-efficient routing, as well as more secure routing than the protocols that are now in use. Future study aims to use blockchain for enhanced security in MANET-based IoT, taking advantage of its decentralized nature. Furthermore, unique optimization strategies for IoT-enabled MANETs will improve network performance. These efforts aim to improve wireless network optimization and security while addressing unique problems and promoting scalability.

Ethics Approval and Consent to Participate

No participation of humans takes place in this implementation process.

Human and Animal Rights

No violation of Human and Animal Rights is involved.

Authorship Contributions

All authors are contributed equally to this work.

Acknowledgements

There is no acknowledgement involved in this work.

Data availability statement

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

The author(s) reported there is no funding associated with the work featured in this article.

References

  • Abdulhae, O. T., J. S. Mandeep, and M. Islam. 2022. Cluster-based routing protocols for flying ad hoc networks (FANETs). IEEE Access 10:32981–26. doi:10.1109/ACCESS.2022.3161446.
  • Arulselvan, G., and A. Rajaram. 2023. Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs. Journal of Intelligent & Fuzzy Systems 45 (4):1–16. doi:10.3233/JIFS-231905. (Preprint)
  • BrijilalRuban, C., and B. Paramasivan. 2021. Energy efficient enhanced OLSR routing protocol using particle swarm optimization with certificate revocation scheme for VANET. Wireless Personal Communications 121 (4):2589–608. doi:10.1007/s11277-021-08838-w.
  • Deepa, C., and B. Latha. 2019. HHSRP: A cluster based hybrid hierarchical secure routing protocol for wireless sensor networks. Cluster Computing 22 (S5):10449–1046. doi:10.1007/s10586-017-1065-3.
  • Devi, V. S., and N. P. Hegde. 2018. Multipath security aware routing protocol for manet based on trust enhanced cluster mechanism for lossless multimedia data transfer. Wireless Personal Communications 100 (3):923–40. doi:10.1007/s11277-018-5358-5.
  • El-Semary, A. M., and H. Diab. 2019. BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map. Institute of Electrical and Electronics Engineers Access 7:95197–211. doi:10.1109/ACCESS.2019.2928804.
  • Ilakkiya, N., and A. Rajaram. 2023. Blockchain-assisted secure routing protocol for cluster-based mobile-ad hoc networks. International Journal of Computers Communications & Control 18 (2). doi:10.15837/ijccc.2023.2.5144.
  • Ilakkiya, N., and A. Rajaram. 2024. Blockchain-enabled lightweight intrusion detection system for secure MANETs. Journal of Electrical Engineering & Technology 1–15. doi:10.1007/s42835-023-01749-9.
  • Jabbar, W. A., W. K. Saad, and M. Ismail. 2018. MEQSA-OLSRv2: A multicriteria-based hybrid multipath protocol for energy-efficient and QoS-aware data routing in MANET-WSN convergence scenarios of IoT. IEEE Access 6:76546–72. doi:10.1109/ACCESS.2018.2882853.
  • Janani, V. S., and M. S. Manikandan. 2020. Hexagonal clustered trust based distributed group key agreement scheme in mobile ad hoc networks. Wireless Personal Communications 114 (4):1–20. doi:10.1007/s11277-020-07512-x.
  • Jubair, M. A., S. A. Mostafa, D. A. Zebari, H. M. Hariz, N. F. Abdulsattar, M. H. Hassan, A. H. Abbas, F. H. Abbas, A. Alasiry, and M. T. H. Alouane. 2022. A QoS aware cluster head selection and hybrid cryptography routing protocol for enhancing efficiency and security of VANETs. IEEE Access 10:124792–804. doi:10.1109/ACCESS.2022.3224466.
  • Kaliyamurthi, B., and A. R. Palanisamy. 2021. Opportunistic routing protocol based EPO–BES in MANET for optimal path selection. Wireless Personal Communications 123 (1):473–94. doi:10.1007/s11277-021-09140-5.
  • Karthick, K., and R. Asokan. 2021. Mobility aware quality enhanced cluster based routing protocol for mobile ad-hoc networks using hybrid optimization algorithm. Wireless Personal Communications 119 (4):3063–87. doi:10.1007/s11277-021-08387-2.
  • Krishnakumar, V., and R. Asokan. 2022. An energy efficient and QoS routing protocol for MANET realised over multi‐objective red deer algorithm (RD‐MOCER) in support of emergency disaster management. International Journal of Communication Systems 36 (1). doi:10.1002/dac.5349.
  • MVSS, N., and A. R. Babu. 2020. An efficient mobility aware stable and secure clustering protocol for mobile ADHOC networks. Peer-To-Peer Networking and Applications 13 (4):1185–92. doi:10.1007/s12083-019-00868-3.
  • Naeem, A., M. Rizwan, S. Alsubai, A. Almadhor, M. Akhtaruzzaman, S. Islam, and H. Rahman. 2023. Enhanced clustering based routing protocol in vehicular ad‐hoc networks. IET Electrical Systems in Transportation 13 (1):e12069. doi:10.1049/els2.12069.
  • Raj, J. S. 2020. A novel hybrid secure routing for flying ad-hoc networks. Journal of Trends in Computer Science and Smart Technology (TCSST) 2 (3):155–64. doi:10.36548/jtcsst.2020.3.005.
  • Rathish, C. R., K. Karpagavadivu, P. Sindhuja, and A. Kousalya. 2021. A hybrid efficient distributed clustering algorithm based intrusion detection system to enhance security in MANET. Information Technology and Control 50 (1):45–54. doi:10.5755/j01.itc.50.1.25002.
  • Reka, R., A. Manikandan, C. Venkataramanan, and R. Madanachitran. 2023. An energy efficient clustering with enhanced chicken swarm optimization algorithm with adaptive position routing protocol in mobile adhoc network. Telecommunication Systems 84 (2):183–202. doi:10.1007/s11235-023-01041-1.
  • Selvakumar, M., and B. Sudhakar. 2022. Energy efficient clustering with secure routing protocol using hybrid evolutionary algorithms for mobile adhoc networks. Wireless Personal Communications 127 (3):1879–97. doi:10.1007/s11277-021-08728-1.
  • Thamizhmaran, K., and A. Charles. 2023. Secured hybrid shortest path based algorithms for mobile ad hoc networks. International Journal of Communications 8.
  • Veeraiah, N., O. Ibrahim Khalaf, C. Rajendra Prasad, Y. Alotaibi, A. Alsufyani, S. A. Alghamdi, and N. Alsufyani. 2021. Trust aware secure energy efficient hybrid protocol for MANET. IEEE Access 9:120996–1005. doi:10.1109/ACCESS.2021.3108807.
  • Wheeb, A. H. 2022. Flying ad hoc networks (FANET): Performance evaluation of topology based routing protocols. International Journal of Interactive Mobile Technologies 16 (4):137–49. doi:10.3991/ijim.v16i04.28235.
  • Wheeb, A. H., and M. T. Naser. 2021. Simulation based comparison of routing protocols in wireless multihop adhoc networks. International Journal of Electrical and Computer Engineering (IJECE) 11 (4):3186. doi:10.11591/ijece.v11i4.pp3186-3192.
  • Wheeb, A. H., R. Nordin, A. A. Samah, and D. Kanellopoulos. 2023. Performance evaluation of standard and modified OLSR protocols for uncoordinated UAV ad-hoc networks in search and rescue environments. Electronics 12 (6):1334. doi:10.3390/electronics12061334.
  • Xu, H., H. Si, H. Zhang, L. Zhang, Y. Leng, J. Wang, and D. Li. 2020. Trust-based probabilistic broadcast scheme for mobile ad hoc networks. Institute of Electrical and Electronics Engineers Access 8:21380–92. doi:10.1109/ACCESS.2020.2969447.
  • Zhang, Q. 2023. Secure preschool education using machine learning and metaverse technologies. Applied Artificial Intelligence 37 (1):2222496. doi:10.1080/08839514.2023.2222496.
  • Zhou, Y., H. Tan, and K. C. A. A. Iroshan. 2023. A secure authentication and key agreement scheme with dynamic management for vehicular networks. Connection Science 35 (1):2176825. doi:10.1080/09540091.2023.2176825.