“Mobile Ad Hoc Network (MANET)” is a self-configurable, self-repairing, self-maintaining, highly mobile, decentralized, and independent wireless network, which has the liberty to move from one to another place. Such networks do not have any pre-existing infrastructure. The adoption of a smart environment in MANET requires new protocols to connect the gadgets to the internet. A smart environment with routing protocols should assure the following properties like connectivity among the nodes, “Quality of Service (QoS)”, and fairness, both in access points and ad-hoc networks. Combination with the Internet of Things (IoT) and MANET generates a novel MANET-IoT system, which focuses on reducing the implementing costs of the network and providing better mobility for users. The necessity of these integrated networks is increasing in military operations, rescue operations, personal area networks, emergency rooms, and meeting rooms. Routing in MANETs is a not simple job and has projected a huge range of attention from researchers around the world. Thus, the intention of this task is a development of a security protocol in MANET for the IoT platform. For dealing with encryption and decryption strategies to handle MANET and IoT data, a new approach is suggested through the enhanced chaotic map. Here, three improved algorithms are implemented for proposing the optimized key management scheme under a chaotic map, which is the Modified Updating-based Harris Hawks Optimization Algorithm (MU-HHO), Mean Solution-based Averaging Sailfish Optimizer (MS-ASFO), Adaptive Basic Reproduction Rate-based Coronavirus Herd Immunity Optimizer (ABRR-CHIO). In the convergence evaluation, while taking the length of plain text as 40, ABRR-CHIO shows superior performance over other techniques at the 60th iteration, which is 96%, 95%, 93%, 96%, and 80% superior to HHO, SFO, CHIO, SA-SFO, and CHHSO. Finally, the performance evaluation is performed regarding “statistical analysis, convergence analysis, and communication overhead” to reveal the superiority of the designed model.
Read full abstract