Multi-Objective Optimization Model for Clustering Based Secure Routing with Congestion Avoidance in Mobile ADHOC Networks

Author(s):  
Srinivasan Murugan ◽  
Jeyakarthic Mohan

Introduction: In Mobile ad-hoc network (MANET), clustering, routing and security are considered as major design issues. Clustering and routing techniques offers distribution of load over many network correlations to attain better utilization of resources, improved throughput, reduces response time, and eliminates workload. Besides, Trust based schemes helps in sending messages in a secured manner as well as prevents the data from attackers by integrating authorized sender and receiver inside the network. Aim: The aim of the paper is to propose a new multi-objective optimization (MOO) technique is presented which intense to allocate the available networking resources properly, balances load in the network, security and effective data transmission. Method: The projected model operates on three major processes: clustering, secured routing and data aggregation based transmission scheme. The MOO model involves fuzzy logic (FL) based clustering process, LionWhale optimization algorithm with congestion avoidance (LW-CA) technique for routing process and integrated XOR and Huffman (IXH) based data transmission process. Therefore, the presented model is collectively called as FCAXH technique which achieves energy efficiency, proper load balancing and security. Results: The simulations are carried out using Network Simulator tool and the results are investigated with and without the presence of attackers. The proposed method attains maximum results interms of throughput, packet delivery ratio (PDR) and energy efficiency. Conclusion: The projected FCAXH model achieves energy efficiency, proper load balancing and security over the compared approaches even under the presence of attackers in the network.

Author(s):  
D. Sivamurugan ◽  
L. Raja

Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure. These networks have some unique features such as dynamic mobility, open nature, lack of infrastructure, limited physical security and they are vulnerable to several security threats. Malicious node can drop all or partial received packets instead of forwarding them to the next hop through the path. In order to find the malicious nodes, an initial transmission is made between the source and destination nodes. Using fuzzy rules, the trust value of each node is computed and it varies from 0 to 1. A common threshold value is set for each node and by using this threshold value, every node in the network can be identified as either a malicious node or a regular node. After identifying the malicious nodes, these nodes are eliminated by muting the power to off state. As the malicious nodes are eliminated between source and destination nodes, source node can select another trusted path to its destination node. For security and authentication of routing information, hybrid cryptography is employed, using advanced encryption standard (AES) and elliptic curve cryptography (ECC) algorithms. AES algorithm is used as symmetric algorithm to encrypt the routing information and ECC algorithm is used as asymmetric algorithm to encrypt the public key. During encryption, the original plain text is converted into cipher text with encrypted public key and similarly during decryption cipher text is converted into original plain text with decrypted private keys. So the proposed method involves both AES and ECC algorithms which provides security mechanism as efficient and sufficient one. The experimental simulations are carried for the proposed model using network simulator 2 (NS-2) for Throughput, Delay, Packet delivery ratio, Packet overhead and Packet drop.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 565
Author(s):  
P. Bakeyalakshmi ◽  
S. K. Mahendran

Nowadays, detection scheme of intrusion is placing a major role for efficient access and analysis in Mobile Ad-hoc network (MANET). In the past, the detection scheme of Intrusion was used to identify the efficiency of the network and in maximum systems it performs with huge rate of false alarm. In this paper, an Effective approach of the Enhanced Replica Detection scheme (ERDS) based on Sequential Probability Ratio Test (SPRT) is proposed to detect the malicious actions and to have a secure path without claim in an efficient manner. Also, provides strategies to avoid attacker and to provide secure communication. In order to have an efficient analysis of intrusion detection the proposed approach is implemented based on the anomaly. To achieve this, the detection scheme is established based on SPRT and demonstrated the performances of detection with less claim. The simulation results of control overhead, packet delivery ratio, efficient detection, energy consumption and average claims are carried out for the analysis of performance to show the improvement than the existing by using the network simulator tool. Also, the performance of the proposed system illustrated the detection of intrusion in the normal and attacker states of the network.


2021 ◽  
Vol 13 (20) ◽  
pp. 11554
Author(s):  
Fahad Haneef ◽  
Giovanni Pernigotto ◽  
Andrea Gasparella ◽  
Jérôme Henri Kämpf

Nearly-zero energy buildings are now a standard for new constructions. However, the real challenge for a decarbonized society relies in the renovation of the existing building stock, selecting energy efficiency measures considering not only the energy performance but also the economic and sustainability ones. Even if the literature is full of examples coupling building energy simulation with multi-objective optimization for the identification of the best measures, the adoption of such approaches is still limited for district and urban scale simulation, often because of lack of complete data inputs and high computational requirements. In this research, a new methodology is proposed, combining the detailed geometric characterization of urban simulation tools with the simplification provided by “building archetype” modeling, in order to ensure the development of robust models for the multi-objective optimization of retrofit interventions at district scale. Using CitySim as an urban scale energy modeling tool, a residential district built in the 1990s in Bolzano, Italy, was studied. Different sets of renovation measures for the building envelope and three objectives —i.e., energy, economic and sustainability performances, were compared. Despite energy savings from 29 to 46%, energy efficiency measures applied just to the building envelope were found insufficient to meet the carbon neutrality goals without interventions to the system, in particular considering mechanical ventilation with heat recovery. Furthermore, public subsidization has been revealed to be necessary, since none of the proposed measures is able to pay back the initial investment for this case study.


Author(s):  
Naseer Ali Husieen ◽  
Suhaidi Hassan ◽  
Osman Ghazali ◽  
Lelyzar Siregar

This paper evaluates the performance of Reliable Multipath Dynamic Source Routing Protocol (RM-DSR) protocol with different network size compared to DSR protocol. RM-DSR developed in the mobile ad-hoc network to recover from the transient failure quickly and divert the data packets into a new route before the link is disconnected. The performance of RM-DSR protocol is tested in the Network Simulator (NS-2.34) under the random way point mobility model with varying number of mobile nodes. The network size parameter is used to investigate the robustness and the efficiency of RM-DSR protocol compared to DSR protocol. The network size affects the time of the route discovery process during the route establishment and the route maintenance process which could influence the overall performance of the routing protocol. The simulation results indicate that RM-DSR outperforms DSR in terms of the packet delivery ratio, routing overhead, end-to-end delay, normalized routing load and packet drop.


Author(s):  
A. Kamenders ◽  
A. Blumberga

Multi-Objective Optimization Approach for Improving Performance of Building Energy efficiency measures are different from energy efficiency and cost effectiveness perspective. For decision maker it is hard to make right decision about different energy efficiency measure combinations in building. It is a complex problem to choose the best energy efficiency measure combination as decision involves many different factors that should be taken in account. Decision on implementation of energy efficiency measure implementation usually depends on investment costs and pay back time. Standards like Latvian Building Code LBN 002-01 can't be used to achieve reasonable expenses in renovation of buildings. Therefore, in order to find the optimal energy-efficiency measures, it is necessary to carry out optimization taking all the variable parameters into account. In the paper target function was presented that gives ability of the multi-objective optimization approach to handle the problem of improving energy efficiency in buildings. Case study is used to demonstrate the feasibility of the approach. 104. series soviet type dwellings was analysed to optimized insulation thickness for external walls. Even if accord with the LBN 002-01 it is enough to use 7 cm thick isolation (λ-0,039 W/(m2K)) layers optimal insulation layer is 12 cm (λ-0,039 W/(m2K)).


Sign in / Sign up

Export Citation Format

Share Document