International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol

Author NameAuthor Details

Jayantkumar A Rathod, Manjunath Kotari

Jayantkumar A Rathod[1]

Manjunath Kotari[2]

[1]Department of Computer Science and Engineering, Alva’s Institute of Engineering (Affiliated to Visvesvaraya Technological University, Belagavi), Moodubidire, India.

[2]Department of Computer Science and Engineering, Alva’s Institute of Engineering (Affiliated to Visve, Moodubidire, India.

Abstract

Several practical applications are combined in a new paradigm known as 5G-based mobile ad hoc networks (MANET) with cloud. Numerous existing works perform trust assessment, intrusion detection, and route discovery to improve secure data transmission in MANET. Route maintenance was not carried out in several of the existing works, and the absence of enumerating link status and node reliability during route maintenance results in link failure and increases packet loss. By considering the existing issues, a novel Kangaroo-based intrusion detection system was proposed to eliminate malicious nodes from the network using Bidirectional- Long Short-Term Memory (Bi-LSTM). This increases data transmission security. For graphical user authentication, encryption based on ASCII values of the Reflection tree (E-ART algorithm) is employed. In this paper, a divide well merge algorithm was implemented, which is a better approach for hierarchical clustering. This method consists of two phases: a Division and Merging phase. The effective route identification and route maintenance in MANET are implemented by using an Advanced Ad-hoc On-demand Distance Vector Protocol (Advanced AODV), which discovers the route using the Fire Hawk Optimization Algorithm (FHO) to obtain optimal multipath by contemplating trust, node connectivity, throughput, node degree, bandwidth, energy and distance where this protocol offers loop-free operation and enhance its scalability to numerous numbers of terminals. In this way, route discovery and route maintenance are established to enhance secure data transmission, thereby reducing packet loss. The modified blockchain called TriChain is proposed for enhancing data transmission security. For the Proof of Work based on Reputation (PoWR) consensus algorithm is used to reduce transaction confirmation latency and block creation time thereby increasing security. In this way, route discovery and route maintenance are established to enhance secure data transmission thereby reducing packet loss. The proposed work is evaluated using detection rate, energy consumption, packet delivery rate, throughput, authentication rate and delay.

Index Terms

5G MANET

Kangaroo Intrusion System

Bi-LSTM

Encrypts Based on ASCII Values of Reflection Tree

Advanced AODV

Fire Hawk Optimization Algorithm

Reference

  1. 1.
    Uppalapati S, 2020. Energy-Efficient Heterogeneous Optimization Routing Protocol for Wireless Sensor Network. Instrumentation Mesures Métrologies 19(5). Vol. 19, No. 5, October, 2020, pp. 391-397
  2. 2.
    Lakshmi, G. V., & Vaishnavi, P. (2023). A trusted security approach to detect and isolate routing attacks in mobile ad hoc networks. Journal of Engineering Research. https://doi.org/10.1016/j.jer.2023.100149
  3. 3.
    Allimuthu, U., & Mahalakshmi, K. (2023). Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation. “Mobile Networks and Applications” Volume 28 Issue 1 Feb 2023 pp 128–159 https://doi.org/10.1007/s11036-022-02040-3
  4. 4.
    Srilakshmi U, Veeraiah N, Alotaibi Y, Alghamdi S A, Khalaf O I, & Subbayamma B V, 2021. An improved hybrid secure multipath routing protocol for MANET. EEE Access. https://doi.org/10.1109/ACCESS.2021.3133882.
  5. 5.
    Bharany S, Sharma S, Badotra S, Khalaf O I, Alotaibi Y. Alghamdi S, & Alassery F, Energy-efficient clustering scheme for flying ad-hoc networks using an optimized LEACH protocol. Energies 2021, 14, 6016. https://doi.org/10.3390/en14196016 https://www.mdpi.com/journal/energies
  6. 6.
    Rajkumar B, & Narsimha G, 2016. Secure multipath routing and data transmission in MANET. International Journal of Networking and Virtual Organisations, 16(3), 236-252.
  7. 7.
    Elmahdi E, Yoo S M, & Sharshembiev K, 2020. Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. Journal of Information Security and Applications, 51:102425, DOI:10.1016/j.jisa.2019.102425.
  8. 8.
    Singh P, Khari M & Vimal S, 2021. EESSMT: An energy efficient hybrid scheme for securing mobile ad hoc networks using IoT. Wireless Personal Communications, 1-25. 10.1007/s11277-021-08764
  9. 9.
    Mukhedkar M M & Kolekar U, 2020. E?TDGO: An encrypted trust?based dolphin glowworm optimization for secure routing in mobile ad hoc network. International Journal of Communication Systems, 33(9):e4252, DOI:10.1002/dac.4252.
  10. 10.
    Rajendra Prasad P S, 2020. Efficient performance analysis of energy aware on demand routing protocol in mobile ad-hoc network. WILEY. Engineering Reports 2(3) , DOI:10.1002/eng2.12116
  11. 11.
    Ahmad I , Rahman T, Zeb A , Khan I , Othman M T B & Hamam H , 2022. Cooperative energy-efficient routing protocol for underwater wireless sensor networks. Sensors, 22(18), 6945.
  12. 12.
    Bhardwaj A, & El-Ocla H, 2020. Multipath routing protocol using genetic algorithm in mobile ad hoc networks. IEEE Access, 8, 177534-177548.
  13. 13.
    Gorgich S, & Tabatabaei S, 2021. Proposing an energy-aware routing protocol by using fish swarm optimization algorithm in WSN (wireless sensor networks). Wireless Personal Communications, 119(3), 1935-1955.
  14. 14.
    Rajan D P, Premalatha J, Velliangiri S & Karthikeyan P, 2022. Blockchain enabled joint trust (MF?WWO?WO) algorithm for clustered?based energy efficient routing protocol in wireless sensor network. Transactions on Emerging Telecommunications Technologies, 33(7), e4502.
  15. 15.
    Srilakshmi U, Veeraiah N, Alotaibi Y, Alghamdi S.A, Khalaf O I & Subbayamma B V, 2021. An Improved Hybrid Secure Multipath Routing Protocol for MANET. IEEE Access, PP, 1-1.
  16. 16.
    Prasad R & Shankar S, 2022. Secure Intrusion Detection System Routing Protocol For Mobile Ad-Hoc Network. Global Transitions Proceedings. Volume 3, Issue 2, https://doi.org/10.1016/j.gltp.2021.10.003
  17. 17.
    Hemalatha R, Umamaheswari R & Soundaram J, 2021. Optimal route maintenance based on adaptive equilibrium optimization and GTA based route discovery model in MANET. Peer-to-Peer Netw. Appl., 14, 3416-3430.
  18. 18.
    Veeraiah N & Krishna B T, 2020. An approach for optimal-secure multi-path routing and intrusion detection in MANET. Evolutionary Intelligence, 15, 1313-1327.
  19. 19.
    Chugh N, Tomar G S, Bhadoria R S, & Saxena N, 2021. A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks. Electronics. Electronics 2021, 10(14), 1635; https://doi.org/10.3390/electronics10141635
  20. 20.
    Bondada P, Samanta D, Kaur M. & Lee H, 2022. Data Security-Based Routing in MANETs Using Key Management Mechanism. Applied Sciences. Volume 12 Issue 3 10.3390/app12031041
  21. 21.
    Rani P L, Kavita Verma S, Kaur N, Wo?niak M, Shafi J & Ijaz. M.F, 2021. Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks. Sensors (Basel, Switzerland), Sensors, 2021, ? 1, p. 251 https://doi.org/10.3390/s22010251 .
  22. 22.
    Theerthagiri P, 2021. ReCoMM: Resource-aware cooperation modelling using Markov process for effective routing in mobile ad hoc networks. Sadhana 46(4):209. DOI:10.1007/s12046-021-01743-9
  23. 23.
    Islabudeen M & Devi M K, 2020. A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks. Wireless Personal Communications, 112 (1) 193–224. https://doi.org/10.1007/s11277-019-07022-5
  24. 24.
    Chiejina E, Xiao H., Christianson B, Mylonas A & Chiejina C, 2022. A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks. Sensors (Basel, Switzerland), 22(2), 571, https://doi.org/10.3390/s22020571
  25. 25.
    Lwin M T, Yim J & Ko Y, 2020. Blockchain-Based Lightweight Trust Management in Mobile Ad-Hoc Networks. Sensors (Basel, Switzerland). 20(3), 698; https://doi.org/10.3390/s20030698
  26. 26.
    Farahani G, 2021. Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks. Security and Communication Networks, Volume 2021 https://doi.org/10.1155/2021/8814141
  27. 27.
    Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access, 10. pp. 14260-14269. ISSN 2169-3536.
  28. 28.
    Masood, J. A. I. S., Jeyaselvi, M., Senthamarai, N., Koteswari, S., Sathya, M., & Chakravarthy, N. K. (2023). Privacy preservation in wireless sensor network using energy efficient multipath routing for healthcare data. Measurement: Sensors, 29, 100867.
  29. 29.
    Yin, H., Yang, H., & Shahmoradi, S. (2022). EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks. Telecommunication Systems, 81(1), 1-19.
  30. 30.
    Al-Anzi, F. S. (2022). Design and analysis of intrusion detection systems for wireless mesh networks. Digital Communications and Networks, 8(6), 1068-1076.
  31. 31.
    Allimuthu, U., & Mahalakshmi, K. (2022). Intelligent route discovery towards rushing attacks in ad hoc wireless networks. Journal of Ambient Intelligence and Humanized Computing, 13(2), 921-960.
  32. 32.
    Tyagi, L. K. ., & Kumar, A..(2023). A Hybrid Trust Based WSN protocol to Enhance Network Performance using Fuzzy Enabled Machine Learning Technique. International Journal of Intelligent Systems and Applications in Engineering, 11(9s), 131–144.
  33. 33.
    M. S. Muthukkumar, S. Diwakaran, "Efficient Load Balancing in WSN Using Quasi –oppositional Based Jaya Optimization with Cluster Head Selection", International Journal of Computer Network and Information Security(IJCNIS), Vol.15, No.2, pp.85-96, 2023. DOI:10.5815/ijcnis.2023.02.07.
  34. 34.
    Binuja Philomina Marydasan, Ranjith Nadarajan(2023). An Energy-Conserved Stability and Density-Aware QoS-Enabled Topological Change Adaptable Multipath Routing in MANET. International Journal of Computer Networks and Applications (IJCNA) DOI: 10.22247/ijcna/2023/223692 Volume 10, Issue 6, November – December (2023).
  35. 35.
    Sivanesan N, Rajesh A, K. S. Archana. ANFIS-RSOA Approach for Detecting and Preventing Network Layer Attacks in MANET. International Journal of Computer Networks and Applications (IJCNA) DOI: 10.22247/ijcna/2023/223693 Volume 10, Issue 6, November – December (2023).
  36. 36.
    Ainaz Nobahari,Danial Bakhshayeshi Avval, Abbas Akhbari, and Solmaz Nobahary Investigation of Different Mechanisms to Detect Misbehaving Nodes in Vehicle Ad-Hoc Networks (VANETs). Hindawi Security and Communication Networks Volume 2023, Article ID 4020275, 40 pages https://doi.org/10.1155/2023/4020275.
SCOPUS
SCImago Journal & Country Rank