Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimisation algorithm in MANETs

A mobile ad-hoc network (MANET) consists of set of mobile nodes and communication devices to interact without any support of the infrastructure. Unlike wired networks, the challenges faced in MANETs possessed such as security design, network infrastructure, stringent energy resources and network security issues. The need for these security issues is much focused in overcoming the challenges in MANET. The proposed work focuses on the secure communication using a novel approach addressed on radio station problem for route optimisation, which is deployed by grey wolf optimisation algorithm and supportively task based admittance control model is proposed to monitor the network flow and to identify the malicious nodes. It is also called as role-based control model. The communication is performed based on the cluster of vast sizes these trusted in node(s) will probably be conveying together, at the same time non-entry correspondence of the non-authorised node(s) to keep on maintaining a stable, anchored and reliable gathering of mobile nodes. Simulation is performed using network simulator where the network parameters such as throughput, packet delivery ratio and delay and packet loss are analysed to identify the malicious nodes.

[1]  Yueh-Min Huang,et al.  Constructing secure group communication over wireless ad hoc networks based on a virtual subnet model , 2007, IEEE Wireless Communications.

[2]  H. Vincent Poor,et al.  Secrecy Throughput of MANETs Under Passive and Active Attacks , 2011, IEEE Transactions on Information Theory.

[3]  Gene Tsudik,et al.  ALARM: Anonymous Location-Aided Routing in Suspicious MANETs , 2011, 2007 IEEE International Conference on Network Protocols.

[4]  Hassan Khotanlou,et al.  Fuzzy evolutionary cellular learning automata model for text summarization , 2016, Swarm Evol. Comput..

[5]  Ming Yu,et al.  AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments , 2014, IEEE Transactions on Vehicular Technology.

[6]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[7]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[8]  Theodore S. Rappaport,et al.  Short-Range Wireless Communications for Next-Generation Networks: UWB, 60 GHz Millimeter-Wave WPAN, And ZigBee , 2007, IEEE Wireless Communications.

[9]  Jeong Hyun Yi,et al.  Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs , 2009, IEEE Transactions on Parallel and Distributed Systems.

[10]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[11]  Mohammad S. Obaidat,et al.  Node Stability-Based Location Updating in Mobile Ad-Hoc Networks , 2008, IEEE Systems Journal.

[12]  T. R. Reshmi,et al.  Light weight cryptographic address generation (LW-CGA) using system state entropy gathering for IPv6 based MANETs , 2017, China Communications.

[13]  J. M. Gnanasekar,et al.  Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks , 2017, Wirel. Pers. Commun..

[14]  Rui Zhang,et al.  Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks , 2015, IEEE Transactions on Wireless Communications.

[15]  Ben-Jye Chang,et al.  Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.

[16]  Panagiotis Papadimitratos,et al.  Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.