Energy-Optimized Expanding Ring Search Algorithm for Secure Routing Against Blackhole Attack in MANETs

2017 ◽  
Vol 14 (3) ◽  
pp. 1294-1297 ◽  
Author(s):  
S. Amutha ◽  
Kannan Balasubramanian
2018 ◽  
Vol 8 (2) ◽  
pp. 67-79 ◽  
Author(s):  
Ch.Ram Mohan ◽  
A. Venugopal Reddy

One of the infrastructureless networks built by various independent mobile nodes is mobile ad hoc network (MANET), which is an emerging technology, requiring a secure routing protocol for data transmission. Accordingly, literature presents various secure routing protocols for MANETs by utilizing trust and data encryption. In this article, a whale optimization algorithm (WOA) is utilized for selecting the optimal secured routing path in the MANET. The WOA algorithm utilizes the trust factor and the distance between the nodes for computing the fitness for the routing path. Overall, the steps involved in the proposed routing algorithm are as follows: i) Measuring the trust and the distance-based metrics for every node; ii) Discovering k-disjoint path; and iii) Determining the optimal path based on the trust and the distance-based metrics. The performance of the trust-based WOA (T-Whale) is analyzed using the metrics, energy, throughput, and packet delivery rate. From the simulation results, it is evident that the T-Whale algorithm has the improved energy, throughput, and PDR values of 27.4520, 0.4, and 0.4, at the simulation time of 10 sec over the conventional trust random search algorithm when the node is under attack.


2020 ◽  
Vol 39 (6) ◽  
pp. 8125-8137
Author(s):  
Jackson J Christy ◽  
D Rekha ◽  
V Vijayakumar ◽  
Glaucio H.S. Carvalho

Vehicular Adhoc Networks (VANET) are thought-about as a mainstay in Intelligent Transportation System (ITS). For an efficient vehicular Adhoc network, broadcasting i.e. sharing a safety related message across all vehicles and infrastructure throughout the network is pivotal. Hence an efficient TDMA based MAC protocol for VANETs would serve the purpose of broadcast scheduling. At the same time, high mobility, influential traffic density, and an altering network topology makes it strenuous to form an efficient broadcast schedule. In this paper an evolutionary approach has been chosen to solve the broadcast scheduling problem in VANETs. The paper focusses on identifying an optimal solution with minimal TDMA frames and increased transmissions. These two parameters are the converging factor for the evolutionary algorithms employed. The proposed approach uses an Adaptive Discrete Firefly Algorithm (ADFA) for solving the Broadcast Scheduling Problem (BSP). The results are compared with traditional evolutionary approaches such as Genetic Algorithm and Cuckoo search algorithm. A mathematical analysis to find the probability of achieving a time slot is done using Markov Chain analysis.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


2019 ◽  
Vol 2 (3) ◽  
pp. 508-517
Author(s):  
FerdaNur Arıcı ◽  
Ersin Kaya

Optimization is a process to search the most suitable solution for a problem within an acceptable time interval. The algorithms that solve the optimization problems are called as optimization algorithms. In the literature, there are many optimization algorithms with different characteristics. The optimization algorithms can exhibit different behaviors depending on the size, characteristics and complexity of the optimization problem. In this study, six well-known population based optimization algorithms (artificial algae algorithm - AAA, artificial bee colony algorithm - ABC, differential evolution algorithm - DE, genetic algorithm - GA, gravitational search algorithm - GSA and particle swarm optimization - PSO) were used. These six algorithms were performed on the CEC’17 test functions. According to the experimental results, the algorithms were compared and performances of the algorithms were evaluated.


Sign in / Sign up

Export Citation Format

Share Document