Hybrid Secure Routing in Mobile Ad-hoc Networks (MANETSs)
- URL: http://arxiv.org/abs/2602.13204v1
- Date: Fri, 09 Jan 2026 18:04:28 GMT
- Title: Hybrid Secure Routing in Mobile Ad-hoc Networks (MANETSs)
- Authors: Soundes Oumaima Boufaida, Abdemadjid Benmachiche, Majda Maatallah, Chaouki Chemam,
- Abstract summary: We introduce the Hybrid Secure Routing Protocol (HSRP), which enhances the security and robustness of routing operations.<n>HSRP combines the strengths of both proactive and reactive routing strategies, enabling it to adapt dynamically to evolving network conditions.<n>With uses in vital domains including military operations and disaster response, this study provides a scalable and workable approach for safe routing in MANETs.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Because wireless communication is dynamic and has inherent defects, routing algorithms are crucial in the quickly evolving field of mobile ad hoc networks, or MANETs This study looks at the many security problems that MANETs encounter. These problems, which pose major risks to network performance, include flooding, sinkholes, and black hole assaults to address these challenges. We introduce the Hybrid Secure Routing Protocol (HSRP), which enhances the security and robustness of routing operations by fusing trust-based tactics with cryptographic approaches. HSRP combines the strengths of both proactive and reactive routing strategies, enabling it to adapt dynamically to evolving network conditions while protecting against malicious activities. We use extensive simulations with Network Simulator (NS-2) and a thorough review of the literature to assess HSRP's performance under different attack scenarios. The results show that, in comparison to traditional protocols, HSRP increases throughput and decreases latency, hence improving routing efficiency while simultaneously bolstering data transfer security. With uses in vital domains including military operations and disaster response, this study provides a scalable and workable approach for safe routing in MANETs. The findings highlight how crucial it is to include cutting-edge security features in routing protocol design to guarantee the dependability and integrity of MANETs in practical situations.
Related papers
- Blockchain-Enabled Routing for Zero-Trust Low-Altitude Intelligent Networks [77.17664010626726]
We focus on the routing with multiple UAV clusters in low-altitude intelligent networks (LAINs)<n>To minimize the damage caused by potential threats, we present the zero-trust architecture with the software-defined perimeter and blockchain techniques.<n>We show that the proposed framework reduces the average E2E delay by 59% and improves the TSR by 29% on average compared to benchmarks.
arXiv Detail & Related papers (2026-02-27T04:30:35Z) - Reliable and Private Anonymous Routing for Satellite Constellations [1.9499120576896225]
This work proposes an enhanced anonymity architecture, evolving the Loopix mix-network, to provide robust security and reliability in volatile topologies.<n>We introduce three primary contributions: A multi-path transport protocol utilizing $(n, k)$ erasure codes, which is demonstrated to counteract the high link volatility and intermittent connectivity that renders standard mix-networks unreliable.<n>We validate this architecture via high-fidelity, packet-level simulations of a LEO constellation.
arXiv Detail & Related papers (2026-02-12T09:43:55Z) - Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks [58.70163955407538]
Malicious eavesdroppers pose a serious threat to private information via satellite-terrestrial networks (STNs)<n>We propose a cognitive secure communication framework driven by multiple agents that coordinates spectrum scheduling and protection through real-time sensing.<n>We exploit generative adversarial networks to produce adversarial matrices, and employ learning-aided power control to set real and adversarial signal powers for protection layer.
arXiv Detail & Related papers (2026-01-06T10:30:41Z) - Security-Aware Joint Sensing, Communication, and Computing Optimization in Low Altitude Wireless Networks [83.84711311344918]
Integrated sensing, communications, and computing (I SCC) is one of the core parts of Low-Altitude Wireless Networks (LAWNs)<n>This paper studies joint performance optimization of I SCC while considering secrecyness of the communications.<n>We propose a deep Q-network (DQN)-based multi-objective evolutionary algorithm, which adaptively selects evolutionary operators according to the evolving optimization objectives.
arXiv Detail & Related papers (2025-11-03T11:06:41Z) - When UAV Swarm Meets IRS: Collaborative Secure Communications in Low-altitude Wireless Networks [68.45202147860537]
Low-altitude wireless networks (LAWNs) provide enhanced coverage, reliability, and throughput for diverse applications.<n>These networks face significant security vulnerabilities from both known and potential unknown eavesdroppers.<n>We propose a novel secure communication framework for LAWNs where the selected UAVs within a swarm function as a virtual antenna array.
arXiv Detail & Related papers (2025-10-25T02:02:14Z) - How Robust Are Router-LLMs? Analysis of the Fragility of LLM Routing Capabilities [62.474732677086855]
Large language model (LLM) routing has emerged as a crucial strategy for balancing computational costs with performance.<n>We propose the DSC benchmark: Diverse, Simple, and Categorized, an evaluation framework that categorizes router performance across a broad spectrum of query types.
arXiv Detail & Related papers (2025-03-20T19:52:30Z) - Unique ID based Trust Scheme for Improved IoV Wireless Sensor Network Security Against Power Controlled Sybil Attacks [1.906179410714637]
Wireless sensor networks (WSNs) are widely used in vehicular networks to support Vehicle-to-Everything (V2X) communications.<n>WSNs face security challenges due to their distributed nature and resource limited modules.<n>This paper proposes a unique identification based trust path routing scheme (UITrust) to avoid Sybil attacks.
arXiv Detail & Related papers (2024-10-05T07:20:55Z) - Security Implications and Mitigation Strategies in MPLS Networks [0.0]
Multiprotocol Switching (MPLS) is a technology that directs data from one network node to another based on short path labels rather than long network addresses.
This paper explores the security implications associated with networks, including risks such as label spoofing, traffic interception, and denial of service attacks.
arXiv Detail & Related papers (2024-09-04T09:21:47Z) - Secure Link State Routing for Mobile Ad Hoc Networks [2.965855310793378]
The proposed here Secure Link State Routing Protocol (SLSP) provides secure proactive topology discovery.
SLSP can be employed as a stand-alone protocol, or fit naturally into a hybrid routing framework.
arXiv Detail & Related papers (2024-03-28T22:10:40Z) - Secure Routing for Mobile Ad hoc Networks [2.965855310793378]
We present a route discovery protocol that mitigates the effects of malicious behavior in MANET networks.
Our protocol guarantees that fabricated, compromised, or replayed route replies would either be rejected or never reach back the querying node.
The scheme is robust in the presence of a number of non-colluding nodes.
arXiv Detail & Related papers (2024-03-01T09:50:00Z) - Offline Contextual Bandits for Wireless Network Optimization [107.24086150482843]
In this paper, we investigate how to learn policies that can automatically adjust the configuration parameters of every cell in the network in response to the changes in the user demand.
Our solution combines existent methods for offline learning and adapts them in a principled way to overcome crucial challenges arising in this context.
arXiv Detail & Related papers (2021-11-11T11:31:20Z) - Phase Configuration Learning in Wireless Networks with Multiple
Reconfigurable Intelligent Surfaces [50.622375361505824]
Reconfigurable Intelligent Surfaces (RISs) are highly scalable technology capable of offering dynamic control of electro-magnetic wave propagation.
One of the major challenges with RIS-empowered wireless communications is the low-overhead dynamic configuration of multiple RISs.
We devise low-complexity supervised learning approaches for the RISs' phase configurations.
arXiv Detail & Related papers (2020-10-09T05:35:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.