Abstract

“Mobile Ad Hoc Network (MANET)” is a self-configurable, self-repairing, self-maintaining, highly mobile, decentralized, and independent wireless network, which has the liberty to move from one to another place. Such networks do not have any pre-existing infrastructure. The adoption of a smart environment in MANET requires new protocols to connect the gadgets to the internet. A smart environment with routing protocols should assure the following properties like connectivity among the nodes, “Quality of Service (QoS)”, and fairness, both in access points and ad-hoc networks. Combination with the Internet of Things (IoT) and MANET generates a novel MANET-IoT system, which focuses on reducing the implementing costs of the network and providing better mobility for users. The necessity of these integrated networks is increasing in military operations, rescue operations, personal area networks, emergency rooms, and meeting rooms. Routing in MANETs is a not simple job and has projected a huge range of attention from researchers around the world. Thus, the intention of this task is a development of a security protocol in MANET for the IoT platform. For dealing with encryption and decryption strategies to handle MANET and IoT data, a new approach is suggested through the enhanced chaotic map. Here, three improved algorithms are implemented for proposing the optimized key management scheme under a chaotic map, which is the Modified Updating-based Harris Hawks Optimization Algorithm (MU-HHO), Mean Solution-based Averaging Sailfish Optimizer (MS-ASFO), Adaptive Basic Reproduction Rate-based Coronavirus Herd Immunity Optimizer (ABRR-CHIO). In the convergence evaluation, while taking the length of plain text as 40, ABRR-CHIO shows superior performance over other techniques at the 60th iteration, which is 96%, 95%, 93%, 96%, and 80% superior to HHO, SFO, CHIO, SA-SFO, and CHHSO. Finally, the performance evaluation is performed regarding “statistical analysis, convergence analysis, and communication overhead” to reveal the superiority of the designed model.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.