Abstract

Wireless networks with a large number of peer nodes are known as mobile ad hoc networks (MANETs). In MANETs, the mobility of nodes causes a number of challenges, including path preservation, battery life, safety, dependability, and unexpected connection characteristics. As a result, the network’s quality of service (QoS) would be compromised (QoS). For the discovery and maintenance of pathways in MANETs, the routing protocol is critical. By implementing the multicast routing protocol, the MANET network’s reliability may be improved significantly. Evaluation of multicast routing for quality of service (QoS) is the primary goal of this study. In multicasting, data packets from one node are transmitted to a set of receiver nodes at a time, simultaneously. Multicasting reduces transmission costs. Cluster head selection is one of the challenges in MANET. This proposed research paper optimal route selection (ORS) provides the cluster head selection and alternate cluster head selection for avoiding the failure of the cluster head, generation of the optimal path between the cluster head and member node based on reliability pair factor and node’s energy, and establishment of the path based on maximum energy and number of hops between the nodes (minimum number of hops). In comparison to existing methods, ORS is more effective in the energy-efficient path between base station and cluster head, and member node is provided by an ORS route. Results show that the proposed ORSMAN has higher throughput, minimum latency, minimum jitter, and maximum packet delivery ratio, when compared to the existing methodologies.

1. Introduction

MANETs, or mobile ad hoc networks, are used by a diverse variety of computer devices, including laptops, smart phones, and other computing solutions. Mobile devices’ network connections take the form of node connections and are mostly a term that is being utilized in the present circumstances. Additionally, the defined range of communication, even in regular conversation, has a significant impact. Mobile communication has become a necessary component. A network partition as a component of the network topology was categorized in MANET [1]. For MANETs, energy-efficient multicast is one of the most important criteria in determining the system’s success. In this process, it was anticipated that the restricted battery capacity of mobile nodes would lead to increased power consumption, which in turn might have a substantial influence on the nodes’ ability to transmit data, potentially creating new problems.

For MANET nodes, access and usage are limited, and security and privacy concerns arise because of the wireless communication channel. Interoperability and data exchange are made possible by the open nature of wireless mediums. There is security issues associated with open-access media since an attacker may break through the nodes’ communication [2]. Intruders or adversaries may get access to a network’s communications by exploiting network dynamics, node mobility, and the absence of centralized administrative assistance. A malicious user or node that interrupts itself into the network’s transmission is able to gather data about the other nodes. A further battering is then launched to limit resources, route failure, and packet loss, as well as the spoofing of others [3]. This kind of attack is determined by the nature and aim of the intrusion into the network by the adversary. As a consequence, network performance degrades, resources are wasted, and the privacy of users is jeopardized. This is why a MANET’s cooperative routing and attack mitigation technologies are built [4]. Numerous research has already been done on the routing protocol for MANETs to find solutions for nodes that are conscious of their energy usage [5].In order to identify decentralized recognition in a quick reaction time by utilizing the distinctive highlights of power flow in the independence of diverse groups, graph-theory-based network partitioning algorithms have been provided thus far [6]. In one such application, sensors installed in the pipeline network are used to solve a data-driven detection issue caused by device failure or a network disruption, which impedes pipeline status monitoring in its turn. This problem may be resolved to prevent the leakage of data [7].

To advance packages from one node to another, the MANET hub serves as both host and switch [8, 9]. Applications where there is no precedent, such as military [10], disaster relief [11], and mining activities [12], benefit from this. Zaghal et al. have proposed a novel strategy for enhancing QoS in MANET multipath routing systems [13]. The principle of this strategy is to increase load balancing and hence reduce congestion on overcrowded lines. As a result, the most critical applications get top priority when packets are routed over the network. Then, the link failures and packet losses may be reduced by a more efficient management of continual connections and delinking. According to [1416], the quality of service (QoS) in an AODV routing protocol variation has been proposed. Using the Moving Picture Experts Group (MPEG)-4 compressions, the proposed method may improve routing performance and data transmission throughput in a variety of network settings. To assess the AOMDV, variables such as data packet size and time duration are taken into account. Using sensors installed in pipeline networks, a data-driven detection issue occurs when a device fails or the network is disrupted, which prevents the deployment of pipeline monitoring. It is possible to avoid data leaking by solving this problem [17].

The following is the structure of the paper: The Literature Review in Section 2 focuses on multicast routing and sensor node clustering. The proposed scheme of reliability pair factor based on multiple models and the cluster head selection method based on energy, hop counting, and reliability pair factor, as well as the optimal path selection based on hop counting, are explained in Section 3. The conclusion is established in Section 6.

Li et al. [18] proposed the DAPV approach for identifying abnormalities in MANETs and enhancing their routing efficiency. Direct and indirect route adversaries may be detected by DAPV, which is valid. A Merkle-based hash tree is used to identify and authenticate neighbors in DAPV’s peer logs. Using this approach, it is possible to identify more targets with less effort and at a lower cost. Cai et al. [19] present evolutionary self-cooperative trust (ESCT) to reduce MANET routing distraction. The human intervention process is replicated, and the confidence of the route nodes is evaluated at multiple stages in this safe routing approach. The scheme’s most dependable feature is its ability to withstand known assaults. Each stage of assault detection has its own unique decision-making process. In terms of energy consumption, latency, and packet delivery ratio, this strategy produces a reliable network output.

A behavior-based analysis technique was presented by Zhang et al. [20] as a defense against various types of attacks. Based on the nodes’ activities and reactions to their neighbors, various attacks are detected. This response confirms that the nodes are capable of processing and forwarding data packets effectively. With the use of layer 4 transport protocols and typical ad hoc routing, the authors confirmed the algorithm’s consistency in terms of latency and packet delivery ratio. Wang et al. [21] provide a trust-based multiobjective optimization (MOO) for enhancing MANET service outcomes. Multidimensional trust is aided by this optimization when network resources and communication are allocated and communicated. To put it another way, this trust optimization strategy reduces the cost of service and increases the quality of service between service providers and nodes. Vaseer et al. [22] used energy, communication, and recommendation-based trust assessment in the MANET scenario to enhance its flexibility and dispersed nature. Distance, packet transmission rate, dependability, and familiarity of the nodes are used to assess the trust model’s adaptive quality. One-to-one validation reduces the effect of attackers by using the trust concept. As a result, the node’s trustworthiness may be verified for subsequent transmissions using mean trust alone. To improve the detection rate, we need to figure out how trustworthy each node is.

In order to avoid black hole attacks in MANET, Keerthika and Malarvizhi [23] created a trust-based artificial bee colony 2-opt method with a weighted trust component. Finding the most direct route to a given location is done by using the artificial bee colony method, while the fitness function evaluation in the 2-opt algorithm determines how trustworthy the nodes are. Two algorithms are combined to create a trust model that decreases the distance to the sink and delays while delivering more reliable packets. This method was established by Mechtri et al. [24] as a measure of how well an attack may be evaded. Adversaries in the routing route are notified to source nodes so that they may make better routing decisions. This reduces the number of false alarms in the network, regardless of the number of attacks on the MANET. Improved packet delivery and reduced latency may be achieved with this strategy by limiting the false detection rate.

Demidov et al. [25] examined the difficulty in identification and mitigation of cyber security risks in ad hoc wireless networks. A neural network has been used to analyze the issues in ad hoc networks more accurately. In order to improve the security of ad hoc networks, this neural network training makes use of probability maximization and recurrent graph analysis models. The particle swarm optimization (PSO) and adaptive neuro fuzzy inference system (ANFIS) were proposed by Moudni et al. [26] to identify and mitigate black hole hazards in MANET routing. Packet forwarding percentage and destination concentric sequence number are used to create fuzzy rules for a network. PSO is used to identify conditional routes that meet the requirements of the fulfilled criteria.

The combined strategy eliminates false alarms by removing nodes that break the rules from the transmission process. Vigenesh and Santhosh [27] develop an efficient stream region sink position analysis (ESRSPA) to improve the detection of attacks in the MANET routing process. The existence of an attack is discovered in the stream area analysis by obtaining the position of the sink and other authorized nodes. The transmission route is dictated by the sink’s location. An attacker is a node that is unable to meet the weight limits in a stream. The routes that include such nodes are rejected. Reliable network speed and packet delivery are the hallmarks of this approach’s low overhead. In order to make MANETs more resistant to attacks, Zhang et al. [28] proposed a reputation management system. Adapting reputable neighbors for route finding and communication improves network performance. Transmission pathways are chosen based on the sum of the reputations of the nodes in the network. In order to enhance detection, the reputation of the nodes is evaluated based on subjective and recommendation-based trust.

This study [29] proposes trust-based authentication for dynamically secured routing. This network-wide trust-based routing system uses a threshold value to identify the nodes. The trust node is the probability that a single node will provide anonymous routing in a hostile environment. The performance of nodes in the data, reputation, and commendation are all tied to the node. An adversarial environment’s trust nodes respond by minimizing the data packet transmission latency. Secure data is transmitted between the source and the destination via trust-based protocols. This protocol improves MANET performance in both RREQ and RREP scenarios, with the following goals: a public factor cannot access a specific node in a group; hence, private keys are used. Secure networks can withstand an attack and destroy the attack’s source if they can detect and eliminate it. The trusted process decreases the time it takes from start to finish. In order to encourage packet forwarding, each node keeps a trust counter. Lower trust values indicate a hostile intermediary node, while higher trust values indicate the opposite. Throughput may be enhanced greatly, while the average end-to-end time is decreased by raising the trust value of the authorized node in this technique.

Using route selection and an Ad Hoc On-Demand Distance Vector protocol, this study [30] improves MANET QoS. A pheromone value of the route is the greatest approach to communicate information. Congestion, number of nodes, and energy left over from previous nodes are all factor towards pheromone value. The route with the greatest pheromone value is used to transmit data. The ANT/AODV protocol’s technique improves packet delivery ratio, throughput, and end-to-end delay. Traditional routing and clever machine learning paradigms are inherited by Sankaran et al. in the classification of nodes based on their communication patterns. It is possible to build reliable and secure pathways to a destination by thoroughly studying the behavior of the nodes at various communication hop levels [31]. In order to help the optimization process, intelligent computing and decision-making algorithms use present and previous behavior of nodes to identify the adversary. To ensure reliable communication in MANET, certain decision-making systems combine sensing properties and location, which need the use of external networks like the cloud [32]. Yushuai et al. [33] investigated one of these multibodies, as well as the optimum energy consideration or production of all participants in the single bodies, as well as the optimal distribution of energy at the lines that were connected between any two energy entities.

The purpose of this research [34] is to show that trust and the Lion Optimization Algorithm (LOA) may be used to achieve energy-efficient MANET routing. Bioinspired LOA is used to choose the most effective data transmission route. The three processes are route establishment, trust metrics calculations, and optimum route selection. It is possible to discover various pathways between the source and the destination using the AODV protocol. In this research, the trust value was calculated based on energy, packet delivery rate, and queue time [35]. The work’s efficiency is gauged by a variety of metrics, including packet delivery ratio, energy consumption, average latency, and network lifespan. Node fitness is used to determine the best paths in this investigation. Node reliability and efficiency improved, while energy consumption decreased as a consequence. Table 1 shows the comparison for various methodologies and limitations of the existing methods.

3. Proposed Methodology

3.1. Cluster Head Selection Algorithm (CHSA)

In this algorithm, the cluster head is produced in this approach by calculating the reliability pair factor and the node’s maximal energy. When a node has the maximum energy, it is designated as the cluster head, with the following level of nodes designated as the alternate cluster head. In two circumstances, the alternate cluster heads are employed. When the energy of the cluster head is low, the alternate cluster head becomes the cluster head automatically. To handle cluster head failures, a second alternate cluster head is used.

(1)Compute the CH among the nodes based on the , , and between the base station and selected high energy node CH (, )(2)Broadcast the request message (REQ) to all other nodes. When the nodes are in the same path which accepts the REQ message and it replied to the cluster head(3)Calculate , where is the distance between node and node at time stamp(4)And cluster head finds the substitute cluster head (SCH) based on the calculation of CH>SCH>MN(5)Cluster head updates the cluster table in the base station(6)When the cluster head become arid, then the substitution cluster head maintains the cluster members energy, distance, and reliability pair factor(7)Find the optimal path based on maximum available energy of the node and minimum hop count between base station to cluster head and cluster head to member nodes
3.2. Optimal Path Selection Algorithm

Optimal path selection algorithm is used to find the path between sources and destination. This algorithm, suggests the methodology based on maximum energy of the node and minimum hops between the nodes.

(1)The source node initiates the creation of a route request packet RREQ(2)RREQ contains the following information: the RREQ ID, the destination address, the source address, the destination sequence number, the source sequence number, the NmaxE, and the hop count(3)NmaxE is updated by a node receiving the packet only if its energy level is greater than the current NmaxE; otherwise, NmaxE stays constant(4)Continue checking until RREQ reaches its target(5)The most energy efficient route is chosen from the numerous RREQ collected from several routes(6)If (NmaxE=high &&hopcount=low), choose the communication route(7)A route response RREP is created and returned(8)Data is sent through the newly specified route

It is not necessary to determine the path using a distinct algorithm if the above algorithms are used. We may be able to locate multiple paths with the same high energy using this algorithm. If there are any crashes in the path, the alternate way must be chosen. As a result, computing time can be reduced. Figure 1 depicts an example of determining the shortest path with the highest energy node, and Figure 2 shows the flow chart of optimal path selection algorithm (OPSA).

4. Experimental Setup

OPNET is the latest network simulator from Riverbed Technology, and it has the most up to date network simulation support available today. OPNET’s graphical interface and scripting capabilities enable it to construct any legacy network architecture or protocol. It offers the ability to acquire real-world network environments by specifying latitude and longitude information. The usual network node types, protocols, and network communication techniques can all be defined and overridden with OPNET as shown in Figure 3. OPNET has the ability to process C++ code to create network strategies, which is a unique feature. A customized user interface (UI) is built in Visual Studio to communicate with the network simulator and get analytical parameters from it. The user interface was shown in Figure 4.

Existing and proposed methods are tested in OPNET by varying the numbers of nodes. Table 2 provides the simulation setup information.

5. Results and Analysis

Currently used methods OPSTSA, EAAORS, EMS, and OEERS, as well as the suggested method ORSMAN, have been tested and compared in this section. Throughput, latency, jitter, end-to-end delay, average energy, and packet delivery ratio are all measured and studied in the network.

5.1. Throughput

The amount of data successfully transported from one location to another in a certain period of time is referred to as throughput. Bits per second are used to measure throughput. The highest possible throughput indicates the highest possible network quality. The measured throughput numbers are in Table 3, and the comparison graph is in Figure 5.

5.2. Latency

Latency measures the time it takes for some data to get to its destination across the network. Latency is a measure of delay. It is measured in milliseconds (ms). The lower value of latency will be achieved by higher quality networks. Table 4 and Figure 6 shows the latency in terms of milliseconds.

5.3. Jitter

Jitter is intermittent delays during data transfer. Due to the network congestion, improper queuing or delays between packet transfers are the causes of jitter. Minimum number of jitter will produce maximum quality of network performance. Table 5 and Figure 7 show the jitter in terms of milliseconds.

5.4. End-to-End Delay

The entire amount of all communication delays, such as jitter, IP delay, and system delay, is called end-to-end delay. It specifies the overall time taken for a packet to travel from its origin to its destination. End-to-end delay is important since it affects network quality. Table 6 shows end-to-end delays for existing and suggested approaches, whereas Figure 8 shows a comparison graph.

5.5. Average Energy

One of the features of network performance is its energy usage. It is challenging to keep the node’s energy up throughout the transmission. When compared to existing approaches, the proposed ORS MAN method produced the best results in terms of energy consumption. Table 7 provides average energy measurements for proposed and existing methodologies, while Figure 9 displays a comparison graph for the same.

5.6. Packet Delivery Ratio

It is the ratio between the number of transmitted packets by the source and number of received packets by the destination, and it is measured by %. The PDR values obtained from the simulations are tabulated as in Table 8, and comparison graph of the PDR is given in Figure 10.

6. Conclusion

The proposed ORS method implements an alternate path algorithm to reduce computational costs. When compared to existing approaches, ORS provides superior results. ORS provides the most energy-efficient route from the base station to the cluster head and from the cluster head to the member node. Results show that the proposed ORSMAN has higher throughput at 400 nodes by 29.2 Kbps, by 18.13 Kbps, by 5.13 Kbps, and by 20.2 Kbps for OPSTSA, EAAORS, EMS and OEERS, respectively. The proposed ORSMAN has minimum latency at 1000 nodes by 43 ms, 43 ms, 8 ms, and 34 ms when compared to OPSTSA, EAAORS, EMS, and OEERS, respectively. Also the proposed ORSMAN achieved minimum jitter at 1000 nodes by 17 ms, 17 ms, 3 ms, and 13 ms when compared to OPSTSA, EAAORS, EMS, and OEERS, respectively. Maximum packet delivery ratio is achieved at 100 nodes by 20.57%, 17%, 1.85%, and 21.71% when compared to OPSTSA, EAAORS, EMS, and OEERS, respectively. As a future project, this protocol may be tested in a variety of network topologies and settings. We may also evaluate the performance of different cluster-based protocols by taking into account the mobility, traffic, and transmission range of the nodes.

Data Availability

The data are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work is funded by the Centre for System Design, Chennai Institute of Technology, Chennai, vide funding number CIT/CSD/2022/006.