Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2025 Jul 13;15(1):25335.
doi: 10.1038/s41598-025-99269-1.

Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs

Affiliations

Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs

N Naveen et al. Sci Rep. .

Abstract

Mobile Ad-Hoc Networks (MANETs) are specialized networks that operate in a decentralized manner. As it has no centralized control over communication, the overall network is generally vulnerable to various security threats such as Blackhole, Wormhole, Flooding and Unauthorized access. Although several studies have analysed these issues, ensuring security in MANETs remains a significant challenge. Previous research has achieved security at the cost of significant energy and resource consumption. To resolve this issue, we proposed a novel Secure Bio-Inspired Optimization (Sec-BIO) methodology for routing over MANET. Only when the source node expresses a wish to do so, it builds route. Ad-hoc On-Demand Distance Vector Routing (AODV) is one of the applications that fall under the category of on-demand routing protocols. The proposed methodology is built upon the conventional AODV protocol which uses bio-inspired Elephant Herding Optimization algorithm. Here, Trust Value (TV) which is the important security measure is considered as the fundamental parameter of route selection. In addition, energy efficacy also plays vital role while selecting optimum path. Before that, the nodes which involve in the network are validated with the Digital Signature Algorithm based authentication procedure (DSA-Auth). It assures that no other unauthorized nodes are allowed in the communication. Next, the data is sent over the trusted secure route selected by proposed approach. To ensure high level security, we intend to use Elliptic Curve Cryptography (ECC) which encrypts the data sent over the network. Here, the normal and intrusion packets are classified at receiver end by means of K-means Clustering approach. In general, the proposed Sec-BIO methodology demonstrates superior performance, achieving a Packet Delivery Ratio (PDR) of 90% at 100 nodes, reducing end-to-end delay to 90ms, and lowering energy consumption to 1390 J compared to existing methods.

Keywords: AODV; Herding optimization; MANETs; Secure routing; Trust computation.

PubMed Disclaimer

Conflict of interest statement

Declarations. Competing interests: The authors declare no competing interests. Consent to Publish: All authors gave permission to consent to publish.

Figures

Fig. 1
Fig. 1
Proposed Secure MANET.
Algorithm 1
Algorithm 1
Secure bio-inspired optimization (Sec-BIO)
Fig. 2
Fig. 2
Block diagram of DSA-Auth methodology.
Fig. 3
Fig. 3
Flow of EHO-AODV protocol.
None
Steps involved in ECC based encryption and decryption
Fig. 4
Fig. 4
Packet delivery ratio (PDR) vs. number of nodes.
Fig. 5
Fig. 5
End-to-end delay vs. number of nodes.
Fig. 6
Fig. 6
Throughput comparison vs. number of nodes.
Fig. 7
Fig. 7
Network lifetime vs. number of nodes.
Fig. 8
Fig. 8
Energy consumption vs. number of nodes.
Fig. 9
Fig. 9
Routing overhead vs. number of nodes.
Fig. 10
Fig. 10
Comparative performance of intrusion detection methods.
Fig. 11
Fig. 11
Mean throughput comparison across protocols.
Fig. 12
Fig. 12
Throughput performance across different network sizes.
Fig. 13
Fig. 13
End-to-end delay performance for different network sizes.
Fig. 14
Fig. 14
Energy consumption per node across different network sizes.

References

    1. Lakshmi, G., Vidhya & Vaishnavi, P. An efficient security framework for trusted and secure routing in MANET: A comprehensive solution. Wirel. Pers. Commun.124, 333–348 (2022).
    1. Kumar, M. et al. Enhanced secure routing in MANET using collaborative machine learning approach. In 2022 8th International Conference on Smart Structures and Systems (ICSSS) 1–6 (2022).
    1. Graha, A. & Pushpa Veni, K. An efficient and secure routing in MANET using trust model. Int. J. Eng. Trends Technol. (2022).
    1. John, Y. M. & Ravi, G. Improved QoS-Secure routing in MANET using Real-Time regional ME feature approximation. Comput. Syst. Sci. Eng.46, 3653–3666 (2023).
    1. Soundararajan, S. et al. Region centric GL feature approximation based secure routing for improved QoS in MANET. Intell. Autom. Soft Comput. (2023).

LinkOut - more resources