Cargando…
Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation
In MANET, routing plays a vital role in packet interaction and data transmission. It is always easy to manage the data transmission over the MANET because of uncentralized control on the MANET nodes. Since the efficient route on MANET controls the packets and does not simplify the route between the...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9526216/ http://dx.doi.org/10.1007/s11036-022-02040-3 |
_version_ | 1784800830975639552 |
---|---|
author | Allimuthu, Udayakumar Mahalakshmi, K. |
author_facet | Allimuthu, Udayakumar Mahalakshmi, K. |
author_sort | Allimuthu, Udayakumar |
collection | PubMed |
description | In MANET, routing plays a vital role in packet interaction and data transmission. It is always easy to manage the data transmission over the MANET because of uncentralized control on the MANET nodes. Since the efficient route on MANET controls the packets and does not simplify the route between the source and destination. Hence the maintenance of route interaction becomes a crucial process. Methods: It is critical to enhance the route and decrease the attacker to sustain successful data transfers via the MANET Network. MANET, on the other hand, permits route interaction with security threads. The four processing schema are proposed in this study work to retain the security safeguards against Routing Protocols. The Rushing Attacker has significantly influenced MANET packet-based data transfer, particularly node communication. The Attacker Detection Automation of Bee Colony Optimization (ADABCP) Method is proposed in this article. Results: Existing ESCT, ZRDM-LFPM, and ENM-LAC techniques were compared to the suggested outcome. Consequently, routing and data transfer have enhanced the proposed illustration (SIRT-ADABCP-HRLD). Compared to the recommended approach, the end-to-end latency, communication overhead, packet delivery ratio, network lifetime, and energy usage are all improved. Discussion: The performance evaluation results of SIRT–ADABCP-HRLD with existing methods in terms of low End to End Delay (ms) of 49.8361% compared to existing methods ESCT, ENM-LAC, and ZRDM-LFPM. In terms of low Communication Overhead, an 81.4462% decrease compared to existing methods. However, it improves packet delivery by 56.9775%, more than ESCT, ENM-LAC, and ZRDM-LFPM. The energy consumption decreased by 36.31% less value than the existing process. |
format | Online Article Text |
id | pubmed-9526216 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-95262162022-10-03 Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation Allimuthu, Udayakumar Mahalakshmi, K. Mobile Netw Appl Article In MANET, routing plays a vital role in packet interaction and data transmission. It is always easy to manage the data transmission over the MANET because of uncentralized control on the MANET nodes. Since the efficient route on MANET controls the packets and does not simplify the route between the source and destination. Hence the maintenance of route interaction becomes a crucial process. Methods: It is critical to enhance the route and decrease the attacker to sustain successful data transfers via the MANET Network. MANET, on the other hand, permits route interaction with security threads. The four processing schema are proposed in this study work to retain the security safeguards against Routing Protocols. The Rushing Attacker has significantly influenced MANET packet-based data transfer, particularly node communication. The Attacker Detection Automation of Bee Colony Optimization (ADABCP) Method is proposed in this article. Results: Existing ESCT, ZRDM-LFPM, and ENM-LAC techniques were compared to the suggested outcome. Consequently, routing and data transfer have enhanced the proposed illustration (SIRT-ADABCP-HRLD). Compared to the recommended approach, the end-to-end latency, communication overhead, packet delivery ratio, network lifetime, and energy usage are all improved. Discussion: The performance evaluation results of SIRT–ADABCP-HRLD with existing methods in terms of low End to End Delay (ms) of 49.8361% compared to existing methods ESCT, ENM-LAC, and ZRDM-LFPM. In terms of low Communication Overhead, an 81.4462% decrease compared to existing methods. However, it improves packet delivery by 56.9775%, more than ESCT, ENM-LAC, and ZRDM-LFPM. The energy consumption decreased by 36.31% less value than the existing process. Springer US 2022-10-01 /pmc/articles/PMC9526216/ http://dx.doi.org/10.1007/s11036-022-02040-3 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022, Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Allimuthu, Udayakumar Mahalakshmi, K. Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation |
title | Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation |
title_full | Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation |
title_fullStr | Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation |
title_full_unstemmed | Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation |
title_short | Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation |
title_sort | efficient mobile ad hoc route maintenance against social distances using attacker detection automation |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9526216/ http://dx.doi.org/10.1007/s11036-022-02040-3 |
work_keys_str_mv | AT allimuthuudayakumar efficientmobileadhocroutemaintenanceagainstsocialdistancesusingattackerdetectionautomation AT mahalakshmik efficientmobileadhocroutemaintenanceagainstsocialdistancesusingattackerdetectionautomation |