Published Online:August 2025
Product Name:The IUP Journal of Telecommunications
Product Type:Article
Product Code:IJCT010825
DOI:10.71329/IUPJTC/2025.17.3.7-19
Author Name:P Mathiazhagan and J M Dhayashankar
Availability:YES
Subject/Domain:Engineering
Download Format:PDF
Pages:7-19
Mobile Ad-hoc Networks (MANETs) are self-organizing networks that allow devices to communicate with each other without needing a fixed infrastructure. However, the open nature of their communication and constantly changing network structure make them vulnerable to numerous security threats. In particular, user-defined attacks are the most prevalent and severe, significantly compromising network performance and disrupting routing protocols. To overcome this issue, the paper presents a comprehensive evaluation and analysis of Reliable Routing Path Selection with Improved Authenticated Routing for Ad-hoc Networks (RRPS-IARAN) algorithm, designed to provide reliable and secure communication in MANETs. The proposed RRPS-IARAN method ensures secure communication between nodes through authenticated routing path selection, preventing packet loss and detecting or preventing attacks. The algorithm’s performance is evaluated based on packet transmission strength and authentication formation. The proposed system consists of a dynamic topology, routing discovery process, and alternative path selection, ensuring reliability and security in MANETs.
Mobile Ad-hoc Networks (MANETs) are a kind of infrastructure-less network that enables mobile devices to correspond with each other wirelessly, without relying on a centralized infrastructure or fixed topology. Characterized by flat network architecture, MANETs use a shared medium to facilitate communication between nodes. Each node in a MANET is autonomous, functioning as both a router and an end-host, and is responsible for routing packets to other nodes in the network. MANET’s dynamic topology enables seamless connectivity amidst high mobility, facilitating free movement and rapid reconnection between nodes, making them ideal for applications like military communications, emergency response, and wireless sensor networks (Khan et al., 2017; Krishna et al., 2020; Rajkumar & Narsimha, 2016).