A Real Time Node Identity Based Multi Algorithm Framework for Enhancing MANET Performance

Authors

  • S. Gnanavel Associate Professor, Department of Computing Technologies, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur Campus-603203, Chengalpattu, Tamil Nadu, India.
  • S. Muruganandam Assistant Professor, Department of Computer Science and Business Systems, Panimalar Engineering College, Chennai – 600 123, Tamil Nadu, India
  • G. Balamurugan Assistant Professor, Department of Computing Technologies, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur Campus-603203, Chengalpattu, Tamil Nadu, India.
  • N. Duraimurugan Assistant Professor, Department of Computer Science and Engineering, Rajalakshmi Engineering College, Chennai, Tamil Nadu, India

Keywords:

wireless sensor networks, digital motion processor, machine learning, Routing Protocol for Low-Power and lossy Networks

Abstract

In Mobile Ad-hoc Network security in data transmission and efficient power utilizations are two major concerns. Maintaining the reliability during the information transference in routing is another major issue, due to the existence of routing threats in the networks. The stability of the networks is reduced. The reliable and energy efficient route is identified to deliver the information packets from origin to target point. This paper proposes a Real Time Node Identity Based Multi Algorithm Framework that enhances the performance of a network. The energy effective cluster head searching algorithm is used to minimize the power utilization of the networks. The selection of cluster header is based on various trust factors of a node; the node trust is measured by various quality attributes of a node such as mobility of a node, energy consumption of a node, degree of connectivity of a node and reliability value of a node. The measurements of all these attributes are estimated for all nodes in the network. The reliability value of a node is estimated by the cumulative value of all these attributes. The reliability value is used for identifying the suspicious nodes in the network. The proposed method RTNIDBMAF introduces four algorithms, the first algorithm supports to measure the energy efficient clusters header node. This efficient cluster header node will determine the optimum path in the network. Second algorithms are used to perform malicious node detection and removal based on the value of vulnerability index. The reliability in data transmission is improved through malicious node detection and removal methods. Third algorithm is used to perform energy optimized routing based on energy consumption of a node. The fourth algorithm is used to perform secure data transmission in routing by applying public key cryptographic methods. The efficiency of the developed algorithm is measured by the simulation results. The proposed algorithms enhance the Quality of Services in Mobile Ad-hoc networks while comparing with existing methods and the results are displayed in the graph. 

Downloads

Download data is not yet available.

References

Shobitha, G.S., Prabhakar, B. &Ghivela, G.C. Energy aware African buffalo-based optimized dynamic media access control protocol for mobile Adhoc network environment. Int. j. inf. tecnol. (2023). https://doi.org/10.1007/s41870-023-01372-x.

Abdulai, JD., Adu-Manu, K.S., Katsriku, F.A. et al. A modified distance-based energy-aware(mDBEA) routing protocol in wireless sensor networks (WSNs). J Ambient Intell Human Comput 14, 10195–10217 (2023). https://doi.org/10.1007/s12652-021-03683-y.

Mischos, S., Dalagdi, E. & Vrakas, D. Intelligent energy management systems: a review. ArtifIntell Rev 56, 11635–11674 (2023). https://doi.org/10.1007/s10462-023-10441-3.

R. Ramesh and G. Seshikala, "Link Aware Multipath Routing to Defend Against Black Hole Attacks for MANETs," 2023 3rd International Conference on Intelligent Technologies (CONIT), Hubli, India, 2023, pp. 1-6, doi: 10.1109/CONIT59222.2023.10205694.

S. Muruganandam, J. A. Renjit and R. S. Kumar, "A Survey: Comparative study of security methods and trust manage solutions in MANET," 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), Chennai, India, 2019, pp. 125-131, doi: 10.1109/ICONSTEM.2019.8918697.

Singh, C.E., Singh, J.A.P. (2023). An Investigation of Machine Learning-Based IDS for Green Smart Transportation in MANET. In: Agarwal, P., Khanna, K., Elngar, A.A., Obaid, A.J., Polkowski, Z. (eds) Artificial Intelligence for Smart Healthcare. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-23602-0_5.

W. Bouassaba, A. Nabou and M. Ouzzif, "Review on Machine Learning Based Intrusion Detection for MANET Security," 2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM), Rabat, Morocco, 2022, pp. 1-6, doi: 10.1109/WINCOM55661.2022.9966457.

A. Boyaci, H. H. Balik and F. Ata, "Energy-Aware Routing Architecture for Wireless Sensor Networks," 2022 10th International Symposium on Digital Forensics and Security (ISDFS), Istanbul, Turkey, 2022, pp. 1-5, doi: 10.1109/ISDFS55398.2022.9800791.

Yu, Y., Liu, Y., Wong, D., Tang, SK. (2024). Comprehensive Performance Evaluation of Mobile Networks in Macao Based on Field Test Data. In: Yang, XS., Sherratt, R.S., Dey, N., Joshi, A. (eds) Proceedings of Eighth International Congress on Information and Communication Technology. ICICT 2023. Lecture Notes in Networks and Systems, vol 695. Springer, Singapore. https://doi.org/10.1007/978-981-99-3043-2_14

Muruganandam, S., ArokiaRenjit, J. (2022). A Node Quality Based Cluster Header Selection Algorithm for Improving Security in MANET. In: Shetty, N.R., Patnaik, L.M., Nagaraj, H.C., Hamsavath, P.N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Lecture Notes in Electrical Engineering, vol 789. Springer, Singapore. https://doi.org/10.1007/978-981-16-1338-8_11

Muruganandam, S., Renjit, J.A. Real-time reliable clustering and secure transmission scheme for QoS development in MANET. Peer-to- Peer Netw. Appl. 14, 3502–3517 (2021). https://doi.org/10.1007/s12083-021-01175-6.

Saravanan R., Swaminathan A., Balaji S. An intelligent shell game optimization based energy consumption analytics model for smart metering data. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2023, vol. 23, no. 2, pp. 374–381. doi: 10.17586/2226-1494-2023-23-2-374-381

Tatarnikova T.M., Bimbetov F., Gorina E.V. Algorithm for energy-efficient interaction of wireless sensor network nodes. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022, vol. 22, no. 2, pp. 294–301 (in Russian). doi: 10.17586/2226-1494-2022-22-2-294-301

L. Legashev and L. Grishina, "Development of an Intrusion Detection System Prototype in Mobile Ad Hoc Networks Based on Machine Learning Methods," 2022 International Russian Automation Conference (RusAutoCon), Sochi, Russian Federation, 2022, pp. 171-175, doi: 10.1109/RusAutoCon54946.2022.9896238.

D. Anuradha, R. Srinivasan,T. Ch. Anil Kumar,J.FarithaBanu,Aditya Kumar Singh Pundir and D. VijendraBabu"Energy Aware Seagull Optimization-Based Unequal Clustering Technique in WSN Communication,Intelligent Automation & Soft Computing,IASC, 2022, vol.32, no.3,Page No:1326-1341,DOI:10.32604/iasc.2022.021946.

RajarajeswariPerepi, Santhi K, Pratik Chattopadhyay & Anwar Bég O(2022): A deep learning computational approach for the classification of COVID-19 virus,Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, DOI: 10.1080/21681163.2022.2111722

Pandey, P., Singh, R. QoS based modified route discovery in MANET for multimedia applications. Multimed Tools Appl 82, 29671–29688 (2023). https://doi.org/10.1007/s11042-023-14855-7

Meena Pundir,Jasminder Kaur Sandhu,PuneetKumar,PrateekSrivastava,Secure and Energy Efficient Routing in Wireless Sensor Network using Machine Learning,ACM Digital Library,IC3-2022: Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing August 2022 Pages544–549,https://doi.org/10.1145/3549206.3549299

Divyansh Puri and Bharat Bhushan. 2019. Enhancement of security and energy efficiency in WSNs: Machine Learning to the rescue. Proceedings - 2019 International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2019 2019-January:120–125. https://doi.org/10.1109/ICCCIS48478.2019.8974465

Muruganandam, S. ., Srinivasan, N. ., & Sivaprakasam, A. . (2022). An Intelligent Method for Intrusion Detection and Prevention in Mobile AdHoc Networks. International Journal of Intelligent Systems and Applications in Engineering, 10(3), 154–160. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2151

G. Balamurugan and K. Kishore Anthuvan Sahayaraj, "A Blockchain Based Certificate Authentication System," 2023 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 2023, pp. 1-7, doi: 10.1109/ICCCI56745.2023.10128289.

Balamurugan, G., Jayabharathy, J. (2022). A Comparative Analysis of Event Detection and Video Summarization. In: Hu, YC., Tiwari, S., Trivedi, M.C., Mishra, K.K. (eds) Ambient Communications and Computer Systems. Lecture Notes in Networks and Systems, vol 356. Springer, Singapore. https://doi.org/10.1007/978-981-16-7952-0_54

Balamurugan G, Jayabharathy J. An integrated framework for abnormal event detection and video summarization using deep learning. International Journal of Advanced Technology and Engineering Exploration. 2022; 9(95):1494-1507. DOI:10.19101/IJATEE.2021.875854.

G. Balamurugan and J. Jayabharathy, “Abnormal Event Detection using Additive Summarization Model for Intelligent Transportation Systems” International Journal of Advanced Computer Science and Applications(IJACSA),13(5),2022, http://dx.doi.org/10.14569/IJACSA.2022.0130586

G. Balamurugan and V. Premanand, "A novel framework for extraction of landscape areas and automatic building detection in satellite images," 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2017, pp. 1-4, doi: 10.1109/ICACCS.2017.8014575.

Francesco Cauteruccio, Giancarlo Fortino, Antonio Guerrieri, Antonio Liotta, Decebal Constantin Mocanu, Cristian Perra, Giorgio Terracina, and Maria Torres Vega. 2019. Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance. Information Fusion 52: 13–30. https://doi.org/10.1016/J.INFFUS.2018.11.010

MohammadWazid and Ashok Kumar Das. 2016. An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks. Wireless Personal Communications 2016 90:4 90, 4: 1971–2000. https://doi.org/10.1007/S11277-016-3433-3

Shanmugam, S. P. ., Vadivu, M. S. ., Anitha, D., Varun, M., & Saranya, N. N. . (2023). A Internet of Things Improvng Deep Neural Network Based Particle Swarm Optimization Computation Prediction Approach for Healthcare System. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 92–99. https://doi.org/10.17762/ijritcc.v11i4s.6311

Dhabliya, D. (2021). Feature Selection Intrusion Detection System for The Attack Classification with Data Summarization. Machine Learning Applications in Engineering Education and Management, 1(1), 20–25. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/8

Downloads

Published

21.09.2023

How to Cite

Gnanavel, S. ., Muruganandam, S. ., Balamurugan, G. ., & Duraimurugan, N. . (2023). A Real Time Node Identity Based Multi Algorithm Framework for Enhancing MANET Performance. International Journal of Intelligent Systems and Applications in Engineering, 11(4), 546–555. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3588

Issue

Section

Research Article