Cargando…

Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation

In MANET, routing plays a vital role in packet interaction and data transmission. It is always easy to manage the data transmission over the MANET because of uncentralized control on the MANET nodes. Since the efficient route on MANET controls the packets and does not simplify the route between the...

Descripción completa

Detalles Bibliográficos
Autores principales: Allimuthu, Udayakumar, Mahalakshmi, K.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9526216/
http://dx.doi.org/10.1007/s11036-022-02040-3
_version_ 1784800830975639552
author Allimuthu, Udayakumar
Mahalakshmi, K.
author_facet Allimuthu, Udayakumar
Mahalakshmi, K.
author_sort Allimuthu, Udayakumar
collection PubMed
description In MANET, routing plays a vital role in packet interaction and data transmission. It is always easy to manage the data transmission over the MANET because of uncentralized control on the MANET nodes. Since the efficient route on MANET controls the packets and does not simplify the route between the source and destination. Hence the maintenance of route interaction becomes a crucial process. Methods: It is critical to enhance the route and decrease the attacker to sustain successful data transfers via the MANET Network. MANET, on the other hand, permits route interaction with security threads. The four processing schema are proposed in this study work to retain the security safeguards against Routing Protocols. The Rushing Attacker has significantly influenced MANET packet-based data transfer, particularly node communication. The Attacker Detection Automation of Bee Colony Optimization (ADABCP) Method is proposed in this article. Results: Existing ESCT, ZRDM-LFPM, and ENM-LAC techniques were compared to the suggested outcome. Consequently, routing and data transfer have enhanced the proposed illustration (SIRT-ADABCP-HRLD). Compared to the recommended approach, the end-to-end latency, communication overhead, packet delivery ratio, network lifetime, and energy usage are all improved. Discussion: The performance evaluation results of SIRT–ADABCP-HRLD with existing methods in terms of low End to End Delay (ms) of 49.8361% compared to existing methods ESCT, ENM-LAC, and ZRDM-LFPM. In terms of low Communication Overhead, an 81.4462% decrease compared to existing methods. However, it improves packet delivery by 56.9775%, more than ESCT, ENM-LAC, and ZRDM-LFPM. The energy consumption decreased by 36.31% less value than the existing process.
format Online
Article
Text
id pubmed-9526216
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Springer US
record_format MEDLINE/PubMed
spelling pubmed-95262162022-10-03 Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation Allimuthu, Udayakumar Mahalakshmi, K. Mobile Netw Appl Article In MANET, routing plays a vital role in packet interaction and data transmission. It is always easy to manage the data transmission over the MANET because of uncentralized control on the MANET nodes. Since the efficient route on MANET controls the packets and does not simplify the route between the source and destination. Hence the maintenance of route interaction becomes a crucial process. Methods: It is critical to enhance the route and decrease the attacker to sustain successful data transfers via the MANET Network. MANET, on the other hand, permits route interaction with security threads. The four processing schema are proposed in this study work to retain the security safeguards against Routing Protocols. The Rushing Attacker has significantly influenced MANET packet-based data transfer, particularly node communication. The Attacker Detection Automation of Bee Colony Optimization (ADABCP) Method is proposed in this article. Results: Existing ESCT, ZRDM-LFPM, and ENM-LAC techniques were compared to the suggested outcome. Consequently, routing and data transfer have enhanced the proposed illustration (SIRT-ADABCP-HRLD). Compared to the recommended approach, the end-to-end latency, communication overhead, packet delivery ratio, network lifetime, and energy usage are all improved. Discussion: The performance evaluation results of SIRT–ADABCP-HRLD with existing methods in terms of low End to End Delay (ms) of 49.8361% compared to existing methods ESCT, ENM-LAC, and ZRDM-LFPM. In terms of low Communication Overhead, an 81.4462% decrease compared to existing methods. However, it improves packet delivery by 56.9775%, more than ESCT, ENM-LAC, and ZRDM-LFPM. The energy consumption decreased by 36.31% less value than the existing process. Springer US 2022-10-01 /pmc/articles/PMC9526216/ http://dx.doi.org/10.1007/s11036-022-02040-3 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022, Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Allimuthu, Udayakumar
Mahalakshmi, K.
Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation
title Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation
title_full Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation
title_fullStr Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation
title_full_unstemmed Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation
title_short Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation
title_sort efficient mobile ad hoc route maintenance against social distances using attacker detection automation
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9526216/
http://dx.doi.org/10.1007/s11036-022-02040-3
work_keys_str_mv AT allimuthuudayakumar efficientmobileadhocroutemaintenanceagainstsocialdistancesusingattackerdetectionautomation
AT mahalakshmik efficientmobileadhocroutemaintenanceagainstsocialdistancesusingattackerdetectionautomation