Applied Mathematics & Information Sciences

Author Country (or Countries)



In MANET resources are trivial with a controlled environment with extreme mobility and do not have any centralized directorial control. Self-motivated topological variations occur because of the excellent mobility of the nodes for creating experiments in routing and constructing protected message passing. Here, the impact of WormHole (WH) Attack analyzed is by the Ad hoc On- Demand Distance Vector Routing Protocol (AO-DDRP) in the existence of WAs. Cluster formation is the mechanism for grouping wireless nodes in the form of clusters under CH for easy management of the network. The Hash Function (HF) proposed when there is a tie between nodes based on calculated weight for the selection of CH enhances the existing algorithms and minimizes the chance of any weak node to become CH. It prevents malicious behavior and the uniform utilization of network resources. The self-explanatory intercommunication grounded among the agents, and Sophisticated Diffusion Search (SDS) is a multi-agent collective exploration and optimization procedure consisting of a robust mathematical structure to define the behavior of the algorithm with its advantages, such as resource distribution, meeting the universal best, strength and minimal meeting benchmarks as well as exact time involvedness. The limits, such as throughput, end-to-end delay and the sum of stored responses, were recycled to estimate the recital. Results proved that the throughput and the number of stored responses improved; reaching to 50% in the incidence of malicious nodes and the end-to-end delay was arbitrarily enhanced

Digital Object Identifier (DOI)