Open Access

ARTICLE

Swarm Intelligence Based Routing with Black Hole Attack Detection in MANET

S. A. Arunmozhi*, S. Rajeswari, Y. Venkataramani
Department of Electronics and Communication Engineering, Saranathan College of Engineering, Thiruchirappalli, 620012, India
* Corresponding Author: S. A. Arunmozhi. Email:

Computer Systems Science and Engineering 2023, 44(3), 2337-2347. https://doi.org/10.32604/csse.2023.024340

Received 14 October 2021; Accepted 17 January 2022; Issue published 01 August 2022

Abstract

Mobile Ad hoc Network (MANET) possesses unique characteristics which makes it vulnerable to security threats. In MANET, it is highly challenging to protect the nodes from cyberattacks. Power conservation improves both life time of nodes as well as the network. Computational capabilities and memory constraints are critical issues in the implementation of cryptographic techniques. Energy and security are two important factors that need to be considered for improving the performance of MANET. So, the incorporation of an energy efficient secure routing protocol becomes inevitable to ensure appropriate action upon the network. The nodes present in a network are limited due to energy constraints and secure communication protocols. Hence, the current study proposed an energy-efficient defense scheme using swarm intelligence approach. The functioning of the proposed method was validated under NS2 simulation. The experimental results confirmed that the proposed work outperformed existing methods in terms of packet delivery ratio, average end-to-end delay and throughput.

Keywords

Energy; security; swarm intelligence; optimization; routing

Cite This Article

S. A. Arunmozhi, S. Rajeswari and Y. Venkataramani, "Swarm intelligence based routing with black hole attack detection in manet," Computer Systems Science and Engineering, vol. 44, no.3, pp. 2337–2347, 2023.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 307

    View

  • 142

    Download

  • 0

    Like

Share Link

WeChat scan