ETPA: Energy, Throughput, Privacy Aware Multipath Routing with Intrusion Avoidance for Reliable MANET System

International Journal of Electrical and Electronics Engineering
© 2025 by SSRG - IJEEE Journal
Volume 12 Issue 7
Year of Publication : 2025
Authors : Nirmala Bai K.S, M.V. Subramanyam
pdf
How to Cite?

Nirmala Bai K.S, M.V. Subramanyam, "ETPA: Energy, Throughput, Privacy Aware Multipath Routing with Intrusion Avoidance for Reliable MANET System," SSRG International Journal of Electrical and Electronics Engineering, vol. 12,  no. 7, pp. 18-33, 2025. Crossref, https://doi.org/10.14445/23488379/IJEEE-V12I7P103

Abstract:

One of the power consumption issues in MANET networks is a major continuous problem, and it is of great importance to develop an energy-efficient routing architecture to prolong the operation of the network. Therefore, it is also claimed that the more mobility of the nodes in MANETs results in more network traffic and delays. Reducing such delays is still a major focus of study using optimization techniques. This work proposes the energy-aware multipath routing model applied to the clustering system using a Genetic Algorithm-Based Lion Optimization (GALO) AOMDV model. To prevent intrusions through clustering, Adaptive Ensemble Tree Learning (AETL), clubbed with the best machine learning technique, Hybrid Dual Optimization of Machine Learning Model (HDOMLM), is chosen by this study to choose cluster heads. The GALO algorithm aims to enhance network lifespan and generic Quality of Service (QoS) by lowering link failures using appropriate data transmission path identification. It would leverage the proposed GALO model for the networks to find shorter networks and thus improve the packet delivery ratio, throughput, packet loss, Delay, and energy depletion. Running the simulations, with our proposed ETPA system, we were able to attain 71% more energy from previous routing algorithm-based implementations and an increase of 50.12% on network lifetime.

Keywords:

CH nodes, Clustering, Intrusion avoidance, MANET, Multi-path routing, Network lifetime, Shortest path selection.

References:

[1] R. Shanmugavalli et al., “Energy Aware Routing Mechanism Using AODV Protocol For Low Energy Consumption in WSN,” 2023 IEEE 5th International Conference on Cybernetics, Cognition and Machine Learning Applications, Hamburg, Germany, pp. 242-247, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] R.O. Raji, and A.M. Oyelakin, “Approaches for Solving Routing and Security Issues in Mobile Ad-Hoc Networks (Manets): A Review,” Journal of Information Technology and Computing, vol. 4, no. 2, pp. 20-30, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Nitesh Ghodichor et al., “Secure Routing Protocol to Mitigate Attacks by Using Blockchain Technology in MANET,” International Journal of Computer Networks & Communications, vol. 15, no. 2, pp. 127-146, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Suraj Patel, “Performance Analysis of Routing Protocols in Mobile Ad-hoc Networks (MANETs) Using NS2: A Comparative Study of AODV, DSR, and DSDV,” International Journal of Scientific Research in Engineering and Management, vol. 8, no. 9, pp. 1-7, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Tao Hai et al., “Enhanced Security Using Multiple Paths Routine Scheme in Cloud-MANETs,” Journal of Cloud Computing, vol. 12, pp. 1-23, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Y.M. Mahaboob John, and G. Ravi, “Cooperative Self-Scheduling Secure Routing Protocol for Efficient Communication in MANET,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 11, no. 4S, pp. 232-241, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Lavanya Nagichetty Lakshminarayana, Shashi Rekha Gangadharaiah, and Madhushree, “Trust Based Multi Objective-Pelican Optimization Algorithm for Mobile Ad Hoc Networks,” International Journal of Intelligent Engineering & Systems, vol. 16, no. 6, pp. 590-599, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] KDV Prasad et al., “A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 11, no. 4S, pp. 325-335, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Uma Maheswari Arumugam, and Suganthi Perumal, “Trust Based Secure and Reliable Routing Protocol of Military Communication on MANETs,” Journal of Machine and Computing, vol. 3, no. 1, pp. 47-57, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Ali Alzahrani, and Nigel Thomas, “Analysing the Performance of a Trust-Based AODV in the Presence of a Flooding Attack,” Applied Sciences, vol. 14, no. 7, pp. 1-16, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Vasantha Kumara Mahadevachar, and Naveen Thimmahanumaiah Hosur, “Metaheuristic Based Energy Efficient Routing Protocol in MANET Using Battle Royale Optimization,” International Journal of Intelligent Engineering & Systems, vol. 16, no. 4, pp. 1-11, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Satyanand Singh, Joanna Rosak-Szyrocka, and Balí zs Lukí cs, “Design and Analysis of a Bandwidth Aware Adaptive Multipath N-Channel Routing Protocol for 5G Internet of Things (IoT),” Emerging Science Journal, vol. 8, no. 1, pp. 251-269, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Manikandan Rajagopal et al., “Minimizing Energy Depletion Using Extended Lifespan: QoS Satisfied Multiple Learned Rate (ELQSSM-ML) for Increased Lifespan of Mobile Adhoc Networks (MANET),” Information, vol. 14, no. 4, pp. 1-14, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Priyanka Kaushik, “Congestion Articulation Control Using Machine Learning Technique,” Amity Journal of Professional Practices, vol. 3, no. 1, pp. 1-7, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Qahtan M. Yas, and Abdulbasi Alazzawi, “Integrating Intelligent Systems in MANET-IoT Environment Based on Subjective Context,” Iraqi Journal for Computer Science and Mathematics, vol. 5, no. 2, pp. 26-35, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Raneen I. Al-Essa, and Ghaida A. Al-Suhail, “AFB-GPSR: Adaptive Beaconing Strategy Based on Fuzzy Logic Scheme for Geographical Routing in a Mobile Ad Hoc Network (MANET),” Computation, vol. 11, no. 9, pp. 1-27, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] H.K. Sampada, and K.R. Shobha, “Co-Ordinated Blackhole and Grayhole Attack Detection Using Smart & Secure Ad Hoc On Demand Distance Vector Routing Protocol in MANETs,” International Journal of Computer Networks and Applications, vol. 11, no. 1, pp. 13-28, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Nikitina Vlada et al., “Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 14, no. 3, pp. 77-88, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Anita R. Patil, and Gautam M. Borkar, “Node Authentication and Encrypted Data Transmission in Mobile Ad Hoc Network Using the Swarm Intelligence-Based Secure Ad-Hoc on-Demand Distance Vector Algorithm,” IET Wireless Sensor Systems, vol. 13, no. 6, pp. 201-215, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Jayantkumar A. Rathod, and Manjunath Kotari, “TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol,” International Journal of Computer Networks and Applications, vol. 11, no. 1, pp. 61-81, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Veeramani Ramasamy, Madhan Mohan Ramalingam, and Mahesh Chitraivel, “Energy Efficient Secured-Quality of Service Routing Protocol for Mobile Ad Hoc Network Using Multi-Objective Optimization,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 31, no. 3, pp. 1486-1495, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Khaled Ahmed Abood Omer, “Impact of Jellyfish Attack on Routing Protocols in TCP-Based MANETs,” University of Aden Journal of Natural and Applied Sciences, vol. 27, no. 1, pp. 139-150, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Versha Matre, and Pradnya A. Vikhar, “Trust-Based Routing Selection Policy on Mobile Ad-Hoc Network Using Aodv Routing Protocol,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 11, no. 9, pp. 4575-4580, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] G.R. Rama Devi, M. Swamy Das, and M.V. Ramana Murthy, “Secure Cross-Layer Routing Protocol with Authentication Key Management Scheme for Manets,” Measurement: Sensors, vol. 29, pp. 1-9, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] V. Anjana Devi et al., “An Energy Efficient Routing Establishment (EERE) Mechanism for MANET-IoT Security,” Franklin Open, vol. 8, pp. 1-10, 2024
[CrossRef] [Google Scholar] [Publisher Link]
[26] S. Agnes Shifani et al., “MANET: A Secured and Logical Routing Protocol Development over Mobile AdHoc Networks for Intelligent Data Communication,” 2024 5th International Conference on Electronics and Sustainable Communication Systems, Coimbatore, India, pp. 741-748, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Mohamad T. Sultan, Hesham El Sayed, and Manzoor Ahmed Khan, “An Intrusion Detection Mechanism for Manets Based on Deep Learning Artificial Neural Networks (Anns),” International Journal of Computer Networks & Communications, vol. 15, no. 1, pp. 1-15, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[28] S. Mohan, and P. Vimala, “Enhancing Congestion Control and QoS Scheduling Using Novel Rate Aware-Neuro-Fuzzy Algorithm in MANET,” Wseas Transactions on Communications, vol. 22, pp. 58-74, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Shridhar Sanshi, N. Karthik, and Ramesh Vatambeti, “IoT Energy Efficiency Routing Protocol Using FHO-Based Clustering and Improved CSO Model-Based Routing in MANET,” International Journal of Communication Systems, vol. 37, no. 9, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Vinoth Kumar Krishnamoorthy et al., “Energy Saving Optimization Technique-Based Routing Protocol in Mobile Ad-Hoc Network with IoT Environment,” Energies, vol. 16, no. 3, pp. 1-16, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[31] R. Praba et al., “Enhanced Hybrid Routing Protocol for Energy-Efficient Multipath Routing in Manets,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 10, no. 3, pp. 619-623, 2024.
[CrossRef] [Publisher Link]
[32] Yi Jiang, Hui Sun, and Muyan Yang, “AODV-EOCW: An Energy-Optimized Combined Weighting AODV Protocol for Mobile Ad Hoc Networks,” Sensors, vol. 23, no. 15, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Tribhuvan Singh et al., “Data Clustering Using Moth-Flame Optimization Algorithm,” Sensors, vol. 21, no. 12, pp. 1-19.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Mohamed Elhoseny, and K. Shankar, “Reliable Data Transmission Model for Mobile Ad Hoc Network Using Signcryption Technique,” IEEE Transactions on Reliability, vol. 69, no. 3, pp. 1077-1086, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Uppalapati Srilakshmi et al., “An Improved Hybrid Secure Multipath Routing Protocol for MANET,” IEEE Access, vol. 9, pp. 163043-163053, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Neenavath Veeraiah et al., “Trust Aware Secure Energy Efficient Hybrid Protocol for MANET,” IEEE Access, vol. 9, pp. 120996-121005, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[37] L. Ellen Funderburg, and Im-Yeong Lee, “A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs,” Sensors, vol. 21, no. 4, pp. 1-17, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[38] K. Vinoth Kumar et al., “SDARP: Security Based Data Aware Routing Protocol for Ad Hoc Sensor Networks,” International Journal of Intelligent Networks, vol. 1, pp. 36-42, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Thippaluru Umamaheswari, and Y. Murali Mohan Babu, “ViT-MAENB7: An Innovative Breast Cancer Diagnosis Model from 3D Mammograms Using Advanced Segmentation and Classification Process,” Computer Methods and Programs in Biomedicine, vol. 257, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Jinghui Zhong et al., “A Hyper-Heuristic Framework for Lifetime Maximization in Wireless Sensor Networks with a Mobile Sink,” IEEE/CAA Journal of Automatica Sinica, vol. 7, no. 1, pp. 223-236, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[41] D.V. Sai Kishore et al., “Fuzzy C-Means Based Medical Image Retrieval for Identifying Most Clinically Relevant Images,” Multimedia Tools and Applications, vol. 83, pp. 55283-55303, 2024.
[CrossRef] [Google Scholar] [Publisher Link]