Open Access Open Access  Restricted Access Subscription or Fee Access

Multipath Clustering Base Routing by Grey Wolves Optimization in Ad Hoc Network

Chandan Kumar, Hardeep Singh Saini

Abstract


Mobile ad hoc network (MANET) is a network that lacks infrastructure. It is composed of a network of wireless mobile nodes (such as a laptop or a smart phone) able to communicate with one another. Nodes can communicate with one another via intermediate nodes, which communicate information by forwarding packets. Nodes use routing protocols like Ad-hoc On-Demand Distance Vector (AODV) and Destination-Sequenced Distance Vector (DSDV) to support this type of communication. In an ad hoc network, AODV routing protocols, and the DSDV are being used to determine a route to the destination. In a network, almost every node works as both a host and a router, selecting the optimal path and passing packets to the correct node. Since nodes can roam freely and join or leave the network at any one-time, ad hoc networks are by nature dynamic. The Grey Wolf Optimization strategy and the Tabu search may be used to optimize the selection of the cluster head. The Grasshopper Optimization technique, on the other hand, can be utilized to optimize the size of the cluster depending on the sink. The quality of the delivery of the packets has an effect on the performance of the quality of service (QoS). In this paper, the quality of the QoS support provided by the recommended solution is assessed using metrics such as latency, packet loss, and throughput. The suggested technique is based on a solution that is referred to as “multipath integrity”, which distributes the network's capacity from higher to lower data resources. As soon as the sensor nodes use the same pathways for routing, the proposed method is based on this solution.


Full Text:

PDF

References


Sandhiya C, Bhuvaneswari E. An overview on wireless sensor networks (WSN) and mobile ADHOC networks (MANET). Int J Eng Sci Invent. 2018; : 10–14.

Nuristani AK, Thakur J. Security issue and comparative analysis of security protocol in wireless sensor network. Int J Computer Sci Eng.2018; 6 (10): 436–444.

Abdel-Fattah F, Farhan KA, Al-Tarawneh FH, Al-Tamimi F, . Security challenges and attacks in dynamic mobile ad hoc networks MANETs. In:2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan. 2019, April 9–11.

Saini HS, Kumar N. D-MSEP: distance incorporated modified stable election protocol in heterogeneous wireless sensor network. In: Proceedings of 2nd International Conference on Communication, Computing and Networking (ICCCN 2018), NITTTR Chandigarh, India, Lecture Notes in Networks and Systems Berlin: Springer; 2018; Vol. 46, pp. 271–281. doi: 10.1007/978-981-13-1217-5_27.

Singh S, Saini HS. Intelligent ad-hoc-on demand multipath distance vector for wormhole attack in clustered WSN. Wireless Pers Commun. 2022; 122: 1305–1327. doi: 10.1007/s11277-021-08950.

Singh S, Saini HS. PCTBC: power control tree based cluster approach for Sybil attack in wireless sensor networks. J Circuits Syst Computers. 2021; 30 (7): 2150129.

Saini HS, Arora D. A split network based routing approach in wireless sensor network to enhance network stability. Int J Sensors Wireless Commun Control. 2019; 9 (4): 480–487. doi: 10.2174/2210327909666190208152955

Pandikumar T, Desalegn A, Shiferaw T. Security solution to gray hole attack in MANET with AODV and DSDV protocol. Int Res J Eng Technol. 2016; 3 (11): 863–871.

Bhate A. A survey on DDOS attack in MANET. Int Res J Eng Technol. 2019; 6 (5): 7371–7374.

Desai AM, Jhaveri RH. Secure routing in mobile ad hoc networks: a predictive approach. Int J Inform Technol. 2019; 11 (2): 345–356.

Majumder S, Bhattacharyya D. Adopting machine learning technique to mitigate various attacks in MANET—a survey report. Int J Sci Res Rev. 2019; 8 (6): 288–295.

Agarwal S, Kaur R, Agarwal T. MANET expansion security challenges attacks and intriguing future trends. Int J Computer Sci Eng. 2018; 6 (5): 906–915.

Liu G, Yan Z, Pedrycz W. Data collection for attack detection and security measurement in mobile ad hoc networks: a survey. J Network Computer Appl. 2018; 105: 105–122.

Chaudhary D, Bhushan K, Gupta BB. Survey on DDoS attacks and defense mechanisms in cloud and fog computing. Int J E-Serv Mobile Appl. 2018; 10 (3): 61–83.

Zardari ZA, He J, Zhu N, Mohammadani KH, Pathan MS, Hussain MI, Memon MQ. A dual attack detection technique to identify black and gray hole attacks using an intrusion detection system and a connected dominating set in MANETs. Future Internet. 2019; 11 (3): 61.

Kundur A, Parhate C, Chopade M, Rayou S, Talware U, Nadaf J. Detection and prevention of gray hole attack by using reputation system in MANET. Int J Innov Res Sci Eng Technol. 2018; 7 (3): 2353–2357.

Singh JP, Goyal D, Shiwani S, Gaur V. Hindrance and riddance of gray hole attack in MANETs multipath approach. 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT). Ghaziabad, India, 2017, February 9–10.

Jeevamaheswari M, Anandha Jothi R, Palanisamy V. AODV routing protocol to defence against packet dropping gray hole attack in MANET. Int J Sci Res Sci Technol. 2018; 4: 1464–1471.


Refbacks

  • There are currently no refbacks.