Techniques and Applications of Optimal Cluster Head Selection With Trusted Multipath Routing and MANET Intrusion Detection

Techniques and Applications of Optimal Cluster Head Selection With Trusted Multipath Routing and MANET Intrusion Detection

Venkatasubramanian Srinivasan, P. L. Rajarajeswari, T. Sathis Kumar
DOI: 10.4018/978-1-6684-6060-3.ch013
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A MANET (mobile ad hoc network) is a self-constituted wireless setup that operates independently of existing infrastructure and centralized control. In various daily uses, such as automotive, military, and other field networks, it is possible to find MANET on wireless systems. In contrast with MANET, a fixed or cable data and computer connectivity system are required for many networks. The WiFi, satellite networking, and smartphone network include fixed infrastructure technology. Moreover, MANET is a dynamic energy and security vulnerable system. The fundamental problem of energy efficiency optimization has been addressed effectively by Routing Protocols (R.P.) among the most extant techniques. This work, therefore, offers an efficient multi-track routing in a MANET-based optimization procedure. The intrusion detection and optimal cluster head (C.H.) selection approach, namely firefly algorithm (FFA) based fuzzy clustering and Random Forest (R.F.), is used to address the energy and security crises in the MANET effectively. The multipath routing is then carried out using secure nodes based on the R.P., Bird swarm with Mayfly algorithm (BS-MFA). The best routes are chosen founded on fitness features such as trust, energy connectivity, and throughput. The approaches are compared using existing techniques and various performance metrics such as energy consumption, Delay, and detection rate.
Chapter Preview
Top

Introduction

A MANET is a network of mobile nodes that do not have centralized administration. MANET topology can be dynamic. Furthermore, each mobile node has partial resources such as a battery, computing power, and RAM (Huiyao. A et al., 2004; Goyal, P et al., 2014). Mobile nodes in MANETs interact with one another n a multi-hop way.

This indicates that a mobile node routes a packet to a target via intermediary nodes. As a result, each node's availability is equally essential. Otherwise, the network's complete performance may suffer. An efficient R.P. is required for MANET to fulfill these unique features and design restrictions (Hinds. A et al., 2013). Designing an effective R.P. for MANETs is a complex challenge that has been the subject of ongoing study. There are many proposed R.P., which could be split into two categories: proactive and reactive. Mobile Nodes often update their router databases with proactive routing techniques such as destination sequence distance vectors (DSDV) (Uddin, M et al., 2012). A proactive routing system creates a high number of control mails in the network as a result of frequent information exchanges. As a result, proactive R.P. is not deemed appropriate for MANET (Venkatesan T.P. et al., 2014).

Reactive R.P. methods such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR) have been suggested for MANET to address the constraints of proactive R.P. (Karthikeyan B et al., 2014). A route is identified in a reactive routing system only when needed. The reactive routing protocol is made up of two major tools: (a) route discovery and (b) route keep. The route discovery method is used by a source node to find a path to an endpoint. A source node detects any topological change in the network using the route preservation method (Patel, D.N et al., 2014). The route discovery method employs a global search technique in which a source node employs a flooding mechanism to identify all possible pathways to a destination. Once all routes have been found, a source node selects the shortest way.

When the shortest route method is employed, nodes situated towards the core of a network transport more traffic than nodes placed around the network's periphery. When numerous connections are put up in a network, the wireless links at the network's core carry more traffic and might therefore get overloaded (Cheng. H, Yang.S, and Wang.X., 2012). This sort of congestion can have an impact on network performance in terms of latency and throughput. The shortest path may be broken in mobility circumstances owing to node movement. Furthermore, communication through a wireless medium is inherently unstable and prone to connection failures. Researchers have proposed multipath routing to address the constraints of shortest-path routing methods (Robinson, Y. & Rajaram.M.. 2015). However, achieving both energy economy and network security at the same time is a difficult task because maximum security techniques in the collected works are demanding (Sarkar S, Datta R, 2013). It is critical to meet MANET security demands since these networks are required to handle a large number of sensitive communications in applications linked to surveillance and warfare operations. Such sensitive transactions occur between appreciation units and the communiqué range's border (Yavuz, A.A., 2010; Marina MK, Das SR,2001). As a result, safe and energy-efficient multipath protocols are required. As a result, the R.P. should be designed to resist widely used attacks such as network data interception, hijacking, and jamming (Sarkar et al., 2015; Anderegg et al., 2003).

Complete Chapter List

Search this Book:
Reset