Mobile ad hoc networks (MANETs) are independent networks, where mobile nodes communicate with other nodes through wireless links by multihop transmission. Security is still an issue to be fixed in MANETs. Hence, a routing protocol named encrypted trust-based dolphin glowworm optimization (DGO) (E-TDGO) is designed using Advanced Encryption and trust-based optimization model for secure routing in MANET. The proposed E-TDGO protocol includes three phases, namely, k-path discovery, optimal path selection, and communication. At first, k paths are discovered based on the distance and the trust level of the nodes. From the k paths discovered, the optimal path is selected using a novel algorithm, DGO, which is developed by combining glowworm swarm optimization (GSO) algorithm and dolphin echolocation algorithm (DEA). Once the optimal path is selected, communication begins in the network such that E-TDGO protocol ensures security. The routing messages are encrypted using AES-128 with shared code and key to offer security. The experimental results show that the proposed E-TDGO could attain throughput of 0.11, delay of 0.01 second, packet drop of 0.44, and detection rate of 0.99, at the maximum number of rounds considered in the network of 75 nodes with attack consideration.
K E Y W O R D SAES-128, mobility, optimization algorithm, route discovery, routing, security, trust
| INTRODUCTIONPresently, ad hoc networks, being a popular and widely used network, are employed in various kinds of applications. These are the wireless networks that are self-organized having no centralized or fixed infrastructures. Ad hoc networks are composed of nodes, which can be both clients and routers. 1 Wireless ad hoc networks (WANETs) 2,3 are selfconfiguring and decentralized wireless network. One of the major features of ad hoc network is that it is independent of any preexisting infrastructure like routers in a wired network and every node in the network involves in routing. 4 The network functionality can be divided into three planes, namely, data plane, control plane, and management plane. The data plane handles the data packets, whereas the control plane implements the routing algorithms. Meanwhile, the network is configured and monitored by the management plane. In the data plane, ad hoc networks undergo several attacks due to certain characteristics, such as openness and dynamic topology. There are two types of attacks, such as (a) attacks interrupting normal delivery of packets in the data plane and (b) attacks diverting the network elements from using exact protocol and management policies in the control and the management planes. The attacks in the data plane are more complicated to detect and avoid, as they do not violate the protocol rules. 1 The two important aspects of these networks are routing and information broadcasting.Mobile ad hoc network (MANET) is an application of WANET, where the objective is to establish an efficient route between a pair of nodes such that the messages are delivered in a proper time interval. If rout...