Skip to main content

Advertisement

Log in

A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Decentralized mobile ad hoc networks (MANET) is a self-organizing and adaptive method comprised of multiple mobile nodes. Due to the dynamic and flexible nature of network topology, wireless communication links face major issues based on trust and security. The researchers came to know that MANET suffers greatly from the quality of service (QoS). So, MANET recommends the employment of an intrusion detection system to identify intrusions, namely attacks, message eavesdropping, and untrustworthy routing. Intrusion detection is considered a significant task to enhance network security from unauthorized access. The main issue in MANET is the limited battery source of sensor nodes which causes communication blockage after a certain transmission range. Therefore, to offer continuous data transmission without any intrusion, in this article, we introduced a secure high-yielding carry-out approach “modified k-means Philippine eagle (MKMPE) approach.” Initially, for the determination of the ideal cluster head (CH) from the cluster group, the modified k-means algorithm (MKM) employs for communicating information to the destination node without any packet loss. The CH is selected according to the values of credits namely indirect, recent trust, and direct trust. Then, with the support of Philippine eagle (PE) optimization, the energy-efficient and secure paths are discovered to transfer the information with minimum delay. To examine the potential ability of the proposed MKMPE approach, various state-of-the-art methods are compared with the suggested method in terms of evaluation metrics, namely energy consumption, network lifetime, end-to-end delay, latency, packet delivery ratio, throughput, and detection rate. This proposed MKMPE approach achieved a maximum detection rate of about 78%, a throughput rate of 0.86 bps, and minimum latency of 0.09 s concerning a maximum time interval of 45 ms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig.3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

References

  1. Prasad R (2021) Enhanced energy efficient secure routing protocol for mobile ad-hoc network. Global Trans Proc 3:412–423

    Article  Google Scholar 

  2. Srilakshmi R and Muthukuru J (2021) Intrusion detection in mobile ad-hoc network using hybrid reactive search and bat algorithm. Int J Intell Unmanned Syst

  3. Alameri IA, Komarkova J (2022) Performance and statistical analysis of ant colony route in mobile ad-hoc networks. Int J Electr Comput Eng (2088-8708) 12(3):2818–2828

    Google Scholar 

  4. Srilakshmi U, Veeraiah N, Alotaibi Y, Alghamdi SA, Khalaf OI, Subbayamma BV (2021) an improved hybrid secure multipath routing protocol for MANET. IEEE Access 9:163043–163053

    Article  Google Scholar 

  5. Saini TK, Sharma SC (2019) Prominent unicast routing protocols for mobile ad hoc networks: criterion, classification, and key attributes. Ad Hoc Netw 89:58–77

    Article  Google Scholar 

  6. Prasad M, Tripathi S, Dahal K (2022) An enhanced detection system against routing attacks in mobile ad-hoc network. Wireless Netw 28(4):1411–1428

    Article  Google Scholar 

  7. Farahani G (2021) Black hole attack detection using K-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks. Secur Commun Netw 2021:8814141

    Article  Google Scholar 

  8. Reddy B, Dhananjaya B (2022) The AODV routing protocol with built-in security to counter blackhole attack in MANET. Mater Today Proc 50:1152–1158

    Article  Google Scholar 

  9. Karthick K, Asokan R (2021) Mobility aware quality enhanced cluster based routing protocol for mobile ad-hoc networks using hybrid optimization algorithm. Wirel Pers Commun 119(4):3063–3087

    Article  Google Scholar 

  10. Srilakshmi U, Alghamdi SA, Vuyyuru VA, Veeraiah N, Alotaibi Y (2022) A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access 10:14260–14269

    Article  Google Scholar 

  11. Sathyaraj P, Rukmani Devi D (2021) Designing the routing protocol with secured IoT devices and QoS over Manet using trust-based performance evaluation method. J Ambient Intell Hum Comput 12(7):6987–6995

    Article  Google Scholar 

  12. Rajeswari AR, Kulothungan K, Ganapathy S, Kannan A (2019) A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer Peer Netw Appl 12(5):1076–1096

    Article  Google Scholar 

  13. Rajendran N, Jawahar PK, Priyadarshini R (2019) Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. Comput Commun 148:129–135

    Article  Google Scholar 

  14. Mahaboob John YM, Ravi G (2021) Real time regional mobility energy feature approximation-based secure routing for improved quality of service in MANET. Int J Commun Syst 35:e4713

    Google Scholar 

  15. Bhardwaj A, El-Ocla H (2020) Multipath routing protocol using genetic algorithm in mobile ad hoc networks. IEEE Access 8:177534–177548

    Article  Google Scholar 

  16. Garg MK, Singh N, Verma P (2018) A fuzzy rule-based approach for design and analysis of a trust-based secure routing protocol for MANETs. Procedia Comput Sci 132:653–658

    Article  Google Scholar 

  17. Srinadh NR, Satyanarayana B (2019) The power-aware secure routing protocol in MANET is based on a reputation model and optimization. Int J Appl Eng Res 14(11):2704–2716

    Google Scholar 

  18. Shahdad SY, Khan M, Sultana H, Hussain MA and Bilfaqih SM (2019) Routing protocols for constraint devices internet of things network. In: 2019 International Conference on Communication and Signal Processing (ICCSP) 0114–0117. IEEE

  19. Ting L, Khan M, Sharma A, Ansari MD (2022) A secure framework for IoT-based smart climate agriculture system: toward blockchain and edge computing. J Intell Syst 31(1):221–236

    Google Scholar 

  20. Quy VK, Ban NT, Han ND (2019) A high-performance routing protocol for multimedia applications in MANETs. J Commun 14(4):267–274

    Article  Google Scholar 

  21. Quy VK, Hung LN, Han ND (2019) CEPRM: a cloud-assisted energy-saving and performance-improving routing mechanism for MANETs. J Commun 14(12):1211–1217

    Article  Google Scholar 

  22. Nguyen VH, Nam V, Linh D and Quy V (2021) An improved agent-based AODV routing protocol for MANET. EAI Endorsed Trans Ind Netw Intell Syst 8(27)

  23. Devika B, Sudha PN (2020) Power optimization in MANET using topology management. Eng Sci Technol Int J 23(3):565–575

    Google Scholar 

  24. Liu H, Chu Y, Zhang Y, Hou W, Li Y, Yao Y, Cai Y (2021) Strategy of multi-beam spot allocation for GEO data relay satellite based on modified k-means algorithm. Mathematics 9(15):1718

    Article  Google Scholar 

  25. Enriquez EAT, Mendoza RG, Velasco ACT (2022) Philippine eagle optimization algorithm. IEEE Access 10:29089–29120

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

SR, SK, and ASSV agreed on the content of the study. SR, SK, and ASSV collected all the data for analysis. SR, SK, and ASSV agreed on the methodology. SR, SK, and ASSV completed the analysis based on agreed steps. Results and conclusions are discussed and written together. All authors read and approved the final manuscript.

Corresponding author

Correspondence to R. Saravanan.

Ethics declarations

Competing interests

The authors declare no competing interests.

Conflict of interest

The authors declare that they have no conflict of interest.

Ehical approval

This article does not contain any studies with human or animal subjects performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saravanan, R., Suresh, K. & Arumugam, S.S. A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET. J Supercomput 79, 10481–10504 (2023). https://doi.org/10.1007/s11227-023-05053-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05053-1

Keywords

Navigation