Abstract

Recently, wired networks have become more popular than wireless ones. Mobile Ad hoc Network, also used in the military (MANET). As the name suggests, military applications are the primary users of military or conventional MANET, which is designed to protect networks from intruders. The MANET is deployed for rescue missions during times of emergency, such as natural catastrophes or law enforcement activities. Each mobile node in a MANET is outfitted with both a Wi-Fi transmitter and receiver. In this paper we present that the Guided Whale Optimization Algorithm for Solving Multiobjective Optimization for wireless security in MANET, Within the MANET, the best secured routing route is chosen with the assistance of a whale optimization algorithm (WOA), which is used within this article. When calculating the appropriateness of a routing route, the WOA algorithm takes into account both the trust factor and the physical separation among the nodes. The suggested routing technique has three steps: detecting the faith and distance-based statistics for each node, identifying a k-disjoint route, and establishing the optimum path based on those metrics. The indicators such as overhead as well as packet delivery rate are used in the examination of the effectiveness of the trust-based GWOA. When compared to other authentication methods, ours is the most efficient in terms of computing complexity.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call