1 Introduction

In an infrastructure-less network with an incredible number of mobile nodes, the migratory route is valid in terms of data transference, data security, and time delay. Finally, the research perspectives are made and provided to the user for communication between a mobile node with no trouble. In the current tendency, the infrastructure-less network mainly works on the Transfer rate, security, and time. These domains have their operational style that must apply the infrastructure-less network, and the process will suspend (Delay) for the entire data transmission [6, 14]. To systematically select the efficient infrastructure-less network, it must have to do with attacker detection, route finding, time confine, node ranking criteria, interaction history, dead node reduction, and alive node boost-up. These processes meet an efficient transmission on the infrastructure-less network. "Attacker detection automation" is used to locate the appropriate attackers in terms of initial matching with the other nodes, which is used to the automatic reduction of the attacker which is accommodating to determine the attacker less 'infrastructure-less network' ultimately with the help of "Swift Implicit Response Round Trip Time" mechanism [19]. Data delivery time interval for mobility node is possibly increased by using Hybrid Random Late Detection (HRLD). This HRLD scheme ensures secure route-finding and data transmission by using "Use Best Approximation," which is helpful in routing problem observation. The route-finding approach retrieves the confidential route between the mobile nodes. This confidential route helps find an optimal solution for dead node reduction by using interaction history in a well-organized manner. The dead node reduction is worked depending on the time interval assignment. i.e., The time interval has been assigned to each node for a reply to the sender node; this happened on mobile node critical assignment. Within this time interval transmitted node is directing the reply messages to the transmit node for proving node confirmation. From this, we reduce the End-to-end Delay for one-way communication. Finally, node ranking is taken from the "Past Interaction History" for every transmission. It is used to rank the nodes to select an excellent short time process. The Attacker Detection Automation of Bees Colony Optimization (ADABCP) is run paralleled to update the dead node and active links [2, 3]. These apprisings are applied to past interaction history.

The cyclic processes of node ranking express the continuous monitoring system of an 'infrastructure-less network,' which produces an enhanced alternative for existing strategies. In conclusion, our proposed research makes the attacker less efficient route interaction between the node by using route finding, time confine, node ranking criteria, interaction history, and dead node reduction. In our result part, the proposed techniques are compared with the existing methods like Evolutionary Self-Cooperative Trust (ESCT) scheme, Zone-based Route Discovery Mechanism—a Link Failure Prediction Mechanism (ZRDM-LFPM), and Evolving Network Model based on Local-Area Choice (ENM-LAC) approaches [5]. The proposed SIRT-ADABCP-HRLD process provides efficient transmission in terms of end-to-end Delay, communication overhead, packet delivery ratio, network lifetime, and energy consumption [4, 8, 37]. Research aspects are implemented with the help of Network simulator 2.

In recent days much research has failed to notice this type of problem. However, this is extremely important to reduce because this has been useful in supporting emerging applications. This suggested research is classified based on the position finding [2] concerning the time and location. To increase the performance degradation of humans against the social distancing constrain, the automatically-reacting alarm hints at the short high tone produced as a signal sound of a forgotten formal accusation of social distancing. This accusation is come into being the embedding sensors-based social distancing model. This SDA scheme helps find simultaneous optimization in a secure, intelligent way. The real-time way of processes is imitated and located concerning features of relying upon observation [10, 12].

In addition to this, maintaining the social distancing between mobile living or extinct members is essential in distance utilization networks. The system servers will watch social distancing. The suggested system preserves the social distancing constrain over the mobile ad hoc networks. If the user cannot act according to social distancing deny, commands, or alerts, that type of user is considered immoral behavior human. They are regarded as the attacker. To remove the attacker (misbehavior extinct member) from the grocery shopping mall, by using manual removing [15, 22]

This article discussed the effects of individual social distance maintaining perception by examining how minimal social distance affects unknown persons. The two experimental conditions are explored to maintain the customers [6]. First, maintain distance from the people in the shopping mall. Second, suppose it does not keep space against the people in the shopping mall. In that case, the management instructs them to make the distances against the people [11, 14].

To investigate and address the research issues based on the routing strategies the routing nodes make. The objective of the research article is to propose route discovery in MANET platforms over a stipulated time interval. The route interaction is analyzed in dynamic aspects to find an efficient route for data communication. The research methodology has the following process to satisfy the various research questions.

  • To enrich the performance of data communication using Swift Implicit Response Round Trip Time (SIRT) mechanism, to make the effective packet transmission without losing the control and data packets

  • To suggest a route verification process suitable for security scrutinization that enables the optimal route to concentrate on the scrutinized route with reduced path count using Route Finding Manipulation (RFM)

  • To make a heterogeneous and attacker-free route for data communication. The Attacker Detection Automation of the Bees Colony Optimization (ADA-BCO) method improves the routing process.

  • To develop a high-performance SIRT-ADABCO-RLD (Attacker Detection Automation of the Bees Colony Optimization-Swift Implicit Response Round Trip Time- Random Late Detection) architecture, which uses efficient route interaction to reduce the attackers.

  • To analyze the performance of the existing system with the proposed method with respect to throughput, packet delivery ratio, end-to-end Delay, communication overhead, network lifetime, and energy consumption

  • To analyze the public spot's impact on "social distance" by sensor-based social distancing plan of action.

The rest of the paper is organized as follows: an earlier introduction to eh research article is discussed in Sect. 1. The literature review is discussed in the related review section. The proposed routing protocols communication for rushing attacker detection are discussed in Sect. 3. finally, Sect. 4 discusses various result-oriented parameters like an end to end delay, communication overhead, packet delivery ratio (PDR), network lifetime, and energy consumption. Finally, this concludes in the conclusion section with related reference articles.

2 Related Review

MANET has provisions for efficient route interaction and data transfer. It is a collection of interactions between mobile nodes. Route interaction and data transmission via the MANET network are increasingly vulnerable to attackers. As a result, the effectiveness of route interactions is critical. The main focus of this research is on route interaction and data movement throughout the network to defend against rushing assaults. MANET (rushing assaults) is safeguarding data in a MANET network using a hybrid random late detection algorithm and a quick implicit response. Attacker Detection Automation, Hybrid Random Late Detection, Use Best Approximation, and Past Interaction History is the different node interaction types. All of these strategies are required for the nodes to interact effectively. This study offers a comprehensive overview of the state of route interaction on MANETs for efficient routing, particularly against Rushing Attacks, Time Delay, Attacker Detection, Route Finding, Time Confine, Node Ranking Criteria, and Interaction History. It analyses the most recent routing-based approaches that make route interaction on MANET as simple as possible. The following survey accompanies the core commitments of this study.

Compelling route integration scenarios still face challenges after existing research inquiry into the exhibited contribution schemes. These studies usually lack efficient route interaction models, which do not ensure data delivery, security, or time delay. Furthermore, [38, 40] in terms of node ranking criteria, interaction history, dead node reduction, and alive node boost-up for agreeable designs in efficient route interaction, it may create dangerous circumstances. All of the above needs are introduced in our suggested system, resulting in efficient route interaction of mobile nodes under multifunctional settings. The recommended component of the research helpful plans that have been demonstrated in previous domains may have possible issues.

Cai et al. [12], Kacem et al. [45], and Zhang et al. [81] [9, 31, 56] discussed the Mobile node transmission and high dead node issues. Even though MANET means to measure such problems, the proposed system can expose the problem and establish regularity and routing. Hurley et al. (2017), Li Zhinan et al. [51], and Bai et al. [8] are [5, 23, 43, 79] discussed the security. Trust Issues and their proposed frameworks require additional disclosure in regularity-based routing security and further work on the MANET. These different contribution actions promote them regularly based on routing safety. Bozorgi et al. [11], Chen et al. [13], Chintalapalli et al. (2018), and [8, 10, 12, 37] discussed the Transferring Time Issues. The Systems with numerous mobile nodes passing data between nearby route nodes require a more efficient route. It is found by the proposed interaction history, which adds multi-routing history to the framework. Liu et al. [53] suggested [44] Source routing in MANET network topology and discussed the mobile Nodes Discover Issue. Their Proposed frameworks commonly expect source hubs to disclosure trust in mind the end goal to determine the best node to coordinate and accomplish an ideal routing. This may be the extreme idea for solving the mobile node discovery issue in MANET; in any case, it likewise can be the toughest one within sight of inactive mobile node issues. Li Zhinan et al. [51], Taha et al. [68], and Zhang et al. [82] node multitasking issue [23, 41]. Mobile nodes can have a specific IP address as well as routing information. In this manner, data transformation goals must expect the need to adjust and standardize node correspondence to accomplish an ideal data transfer. Liu et al. [53] and Khudayer et al. [47] discussed [8, 10, 12] the node failure. their perspective views adaptation to internal failure separation of the mobile node, cause the lifetime, which correspondence to node failure. With set request/response periods, the preserved interaction history inside node interaction must create a warning to prevent future contact with the inactive failed node. It is then necessary to identify the node, retrieve the previous transaction, and retransmit it to the destination mobile nodes from the beginning nodes. This study thoroughly examines the most up-to-date research on mobile nodes' most effective route interaction in MANETs. A comprehensive survey of route interaction and extensive data processing was also carried out—however, an assessment of all of the noteworthy route interaction models available in MANET. Even though the same process is displayed, it is in different domains such as WSN, Communication, etc. It focuses on the many challenges that arise throughout the efficient route interaction.

3 Routing Protocols Communication for Rushing Attacker Detection

The routing protocols communication for rushing attacker detection is explained in Figs. 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, and to 18. It demonstrates the viewed process of the rushing attack establishment communication channel. In this circumstance, MN1 –sender, MN17 –receiver, t – the distance between MN1 and MN17. (MN8) and (MN9) is the rushing attack route and the actual route of the routing protocols Communication, index sender to receiver [4, 7, 11]. It is referred to as the MN1 –sender, index MN8 to the receiver MN8, R1 is the general rushing route, R1MN1 → MN2 → MN5 → MN10 → MN9 is the total amount of nodes directivity between MN1–sender, MN17 –receiver, without (R1, MN1) and (R1, MN17) is 5. It is referred to as the MN1 –sender, index to the receiver MN9, R2 is the general rushing route, R2MN1 → MN4 → MN9, and R3 is the available rushing route, R3MN1 → MN4 → MN8 is the total amount of nodes directivity between MN1 –sender, MN17 –receiver, without (R2, MN1) is three and (R3, MN17) is 3. The distance from MN1 –sender, MN17 –receiver to the center of the area routing protocols Communication, concerning the distance from the attackers to the sender and receiver (MN8) and (MN9) [2, 14, 56, 77].

Fig. 1
figure 1

Route estimation for R1 ↔ R2 by the Relative Coordination Systems using PSO. R1 ↔ R2, R1(config)#ip exit route-number R1 ↔ R2 deny rt 1:7:10 (R3), R1(config)#router hrld-sirt (R1, R2), R1(config-router)#neighbor < ip_addr of R2 > new rt R2 ↔ R5, out

Fig. 2
figure 2

Interconnected system clarifies by giving an example of the first successive route after successive request/route reply. The dotted block highlighted nodes describe the following route scenario on the proposed routing protocol

Fig. 3
figure 3

Route estimation for R2 ↔ R5 by the Relative Coordination Systems using PSO. R2 ↔ R5, R2(config)#ip extroute-number R2 ↔ R5 deny rt 1:7:12 (R4), R2(config)#router hrld-sirt (R1,R2,R5), R2(config-router)#neighbor < ip_addr of R5 > new rt R5 ↔ R10, Out

Fig. 4
figure 4

The dotted block highlighted nodes describe the successive route scenario on the proposed routing protocol. Interconnected systems clarify by giving an example of the following consecutive route

Fig. 5
figure 5

Route estimation for R5 ↔ R10 by the Relative Coordination Systems using PSO. R5 ↔ R10, R5(config)#ip extroute-number R5 ↔ R10 deny rt 1:7:18 (R9), R5(config)#router hrld-sirt (R1,R2,R5,R10), R5(config-router)#neighbor < ip_addr of R10 > new rt R1 ↔ R4, Out

Fig. 6
figure 6

The dotted block highlighted nodes describe the successive route scenario on the proposed routing protocol. Interconnected systems clarify by giving an example of the third consecutive route

Fig. 7
figure 7

Route estimation for R1 ↔ R4 by the Relative Coordination Systems using PSO. R1 ↔ R4, R1(config)#ip exit route-number R1 ↔ R4 deny rt 1:7:17 (R8), R1(config)#router hrld-sirt (R1, R4), R1(config-router)#neighbor < ip_addr of R4 > new rt R4 ↔ R9, Out

Fig. 8
figure 8

The dotted block highlighted nodes describe the alternative route scenario on the proposed routing protocol. Interconnected systems clarify by giving an example of the first alternate route

Fig. 9
figure 9

Route estimation for R4 ↔ R9 by the Relative Coordination Systems using PSO. R4 ↔ R9, R4(config)#ip extroute-number R4 ↔ R9 deny rt 1:7:17 (R8), R4(config)#router hrld-sirt (R1,R4,R9), R4(config-router)#neighbor < ip_addr of R9 > new rt R10 ↔ R11, Out

Fig. 10
figure 10

The dotted blue highlighted nodes describe the alternative route scenario on the proposed routing protocol. Interconnected systems clarify by giving an example of the first alternate route

Fig. 11
figure 11

Route estimation for R10 ↔ R11 by the Relative Coordination Systems using PSO. R10 ↔ R11, R10(config)#ip extroute-number R10 ↔ R11 deny rt 1:7:18 (R9), R10(config)#router hrld-sirt (R1,R2,R5,R10,R11), R10(config-router)#neighbor < ip_addr of R11 > new rt R7 ↔ R12, Out

Fig. 12
figure 12

The dotted block highlighted nodes describe the successive route scenario on the proposed routing protocol. Interconnected systems clarify by giving an example of the fourth consecutive route

Fig. 13
figure 13

Route estimation for R9 ↔ R12 by the Relative Coordination Systems using PSO. R9 ↔ R12, R9(config)#ip extroute-number R9 ↔ R12 deny rt 1:7:17 (R8), R9(config)#router hrld-sirt (R1,R4,R9,R7,R12), R9(config-router)#neighbor < ip_addr of R12 > new rt R11 ↔ R16, Out

Fig. 14
figure 14

Interconnected system clarifies by giving an example of the third alternate route. The dotted block highlighted nodes describe the alternative route scenario on the proposed routing protocol

Fig. 15
figure 15

Route estimation for R11 ↔ R16 by the Relative Coordination Systems using PSO. R11 ↔ R16, R11(config)#ip extroute-number R11 ↔ R16 deny rt 1:7:87 (R12), R11(config)#router hrld-sirt (R1,R2,R5,R10,R11,R16), R11(config-router)#neighbor < ip_addr of R16 > new rt R12 ↔ R16, out

Fig. 16
figure 16

Interconnected system clarifies by giving an example of the fifth successive route. The dotted block highlighted nodes describe the following route scenario on the proposed routing protocol

Fig. 17
figure 17

Route estimation for R12 ↔ R16 by the Relative Coordination Systems using PSO. R12 ↔ R16, R12(config)#ip extroute-number R12 ↔ R16 deny rt 1:7:17 (R8), R12(config)#router hrld-sirt (R1,R4,R9,R7,R12,R16), R12(config-router)#neighbor < ip_addr of R16 > new rt R16 ↔ R17, out

Figures 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, and 20, determined for Routing Protocols Communication for Rushing Attack concerning the routing communication with route projection for instance of "Attacker detection automation," Modified AODV and Hybrid Random Late Detection (HRLD), "Swift Implicit Response Round Trip Time" mechanism, "Use Best Approximation" and "Past Interaction History" [77, 80, 83].

Fig. 18
figure 18

Interconnected system clarifies by giving an example of the fourth alternate route. The dotted block highlighted nodes describe the alternative route scenario on the proposed routing protocol

Fig. 19
figure 19

Route estimation for R16 ↔ R17 by the Relative Coordination Systems using PSO. R16 ↔ R17, R16(config)#ip extroute-number R16 ↔ R17 deny rt 1:7:18 (R9), R16(config)#router hrld-sirt (R1,R2,R5,R10,R11,R16,R17), R16(config-router)#neighbor < ip_addr of R17 > new rt dest, Out

Fig. 20
figure 20

Interconnected system clarifies by giving an example of the final route. The dotted block highlighted nodes describe the successive route scenario on the proposed routing protocol

The nodes considerations on a proposed network model that set the network model following the nodes counts and packet distribution on each node [7]; meanwhile, the average rate () at which packets are arriving to be serviced based on the Packet Distribution Range parameters of the transmitter and receiver arrays are standard time interval of every package is arriving at the destination that is fixed based on the request/response round trip time/delay.

In the proposed mechanism, the request/response round trip time/delay is the time demanded for a packet to travel from an origin to a finishing terminus. This might be calculated by combining the packet's time to travel from the finishing terminus to a source (i.e., acknowledgment). This is also called the propagation times between the two alive nodes. The Node propagation times on the MANET packet transmission are calculated based on the following Eq. 1

$$Nodes \ Propagation \ Time=\sum\nolimits_{t=\mathrm{MN}1(\mathrm{sender}) }^{\mathrm{MN}17(\mathrm{receiver})}{\left[\frac{1}{({\mathcal{M}}_{t}-\mathcal{L})}\right]}_{forward}+{\left[\frac{1}{({\mathcal{M}}_{t}-\mathcal{L})}\right]}_{Reverse}$$
(1)

From the above Node propagation time calculation, \({\mathcal{M}}_{t}\) Is the number of data requests (packets) per second transmitted concerning each node's distance (t) on the MANET boundary. Perhaps the forwards are described based on the MN1 –sender, MN17 –receiver forward transmission. Any legitimate packet transmission between nodes (preferably by our concern on the forward route R1 \(\equiv\) MN1 → MN2 → MN5 → MN10 → MN9, R2 \(\equiv\) MN1 → MN4 → MN9, and R3 \(\equiv\) MN1 → MN4 → MN8) is considered as the bold's transmission. meanwhile, the reverse might be the acknowledgment of individual communication. (preferably by our concern on the reverse route R1 \(\equiv\) MN9 → MN10 → MN5 → MN2 → MN1, R2 \(\equiv\) MN9 → MN4 → MN1, and R3 \(\equiv\) MN8 → MN4 → MN1). This average rate at which packets are sent and arriving is calculated. From this consideration, the Node Detection Model and its parameters were generalized, and tunneling will allow simulating the process of node propagation with different time duration of attacker nodes under other route conditions. However, the actual route function determines the probability of previously sending and receiving history direction. The Proposed Routing Protocol is the weighted sum of the node resending and receiving functions works based on the Routing Protocol and their steps [23, 40, 50].

3.1 Proposed Attacker Detection Automation of Bees Colony Optimization (ADABCP)

In this section, the proposed Attacker Detection Automation of Bees Colony Optimization (ADABCP) uses a routing framework based on Bees Colony Optimisation that offers improved network traffic routing in the MANET scenario to improve the energy efficiency in terms of three factors [17, 19] such as routing operation, detection automation application, control parameters.

This Attacker detection automation of Bees Colony Optimization (ADABCP) deals with the Mobile ad hoc-network attacker finding technique, where mobile nodes are randomly distributed in a large field of the environment [25, 78].

The Attacker detection automation mainly applies to the MANET environment. These environments permit the nodes to communicate with each node in the MANET environment and gather information about the nodes, which is most helpful for sharing safely. This information is sent to the Base station to control the node's activities. There are three processes used in an Attacker detection automation. The report includes sending data, receiving date, time, and communication validation.

Algorithm 1
figure a

Algorithm for working principles of nodes activities as per the speed analysis

When the node is moving, the nearby nodes and all other nodes are enabled, which gathers a surrounding of a node, and simply shows how the node ascertains its range.

The source node is capable of gathering the data of the surrounding nodes. The source node identifies the route traffic, traffic signals, and objects on the route. The nearby subsequent nodes measure the distance between the source and destination on the route. The source node will not work perfectly every time. So, this research can use the efficient location sensor to detect the object and the distance and time taken for the nodes to reach the destination. This research can identify blind-spot monitoring and node parking aids for short-range radio waves. For long-range radio waves, this research can identify an object and control the assistance.

If the node speed is greater than the speed limit, then the proposed routing system gives an alert message to the source, and then the source node reduces the node speed. Similarly, if the node speed is lesser than the actual packet speed limit, the system maintains the node speed. Observing the surroundings and data capturing process continuously happens. If the data is the same as an obstacle, the system identifies the obstacle and brakes. The system will turn according to the given direction if the input data nodes are nearby. If the right-side node direction is given as input, the system turns to the right-side node direction. If the left-side node direction is given as input, the system turns to the left-side node direction. Otherwise, the system maintains the straight route.

Nodes Activities as Per the Speed Analysis method employed in MANET to accomplish appropriate refinement on the routing issues. In comparison to the "intrusion detection automaton," "Hybrid Random Early Detection," and "node ranking technique," the suggested ADABCP approach has finalized the secure and optimum MANET routing pathways. The number of given live movable nodes-based agile methods, namely "Use Best Approximation" and the "Swift Implicit Response Round Trip Time" mechanism, were recommended in a routing operation. This Use Best Approximation estimates the most optimal route in the most efficient way possible. Swift Implicit Response Round Trip Time can also help global optimization management [52]. The combination of Use Best Approximation" and "Swift Implicit Response Round Trip Time" mechanism produces the Modified AODV and Hybrid Random Late Detection (HRLD) for route finding, time confine against the attacks like (rushing attacks, Sybil attacks). Our research took the rushing attacks because it allows for a denial-of-service, especially since this attack makes duplicate copy process of original mechanism and spread attacks activities to the nearby nodes route by accessing route and gain access to original sending data from source to destination [26].

The three criteria are considered in the Attacker Detection Automation of Bee Colony Optimization (ADABCP) approach. First, in MANET [73], a Routing Operation to Perform a Node Movement Within the Boundary. As a result, in the transmission environment, head nodes are picked. This is also known as node initialization. The second is a program that automates the identification of attackers to optimize the path. The Node-id determination is established whenever the head nodes of the specified transmission environment form a time limit, i.e., each node has generated individual packet transmission around the neighboring nodes. The increment values from the beginning node to the end node of a transmission environment were used to assign this Node-id determination. The nodes begin the packet transaction around the neighboring nodes based on this assessment. Suppose the node is sharing information based on inter-connectivity. In that case, the routing path is developed using communicating nodes to integrate all nodes' coordinate systems. All nodes are randomly positioned in a large transmission environment field in this period, and RREQ/RREP messages are disseminated. Each node will determine its node grade, ID, and nearby node distances in these conditions. The transmission environment initiator node is the source node with the lowest ID between nearby nodes, and the timer begins [17, 61].

Finally, control parameters are successfully used to detect automation to increase energy efficiency on the transmission environment's head node [13, 26, 33]. Suppose it gets a cluster head declaration from other nodes before the timer expires. In that case, the node will end the timer and become a member of the transmission environment. Head-node declaration messages are flooded to hops in the head-node transmission environment. This packet of RREQ/RREP messages broadcasting was discovered in two situations. First, any member of MANET is a node from the transmission MANET environment head nodes. Second, every node between the head node of the class and the MANET surrounds becomes a candidate for a new head node. A declaration message with a high time to live value is sent to some border nodes in a temporary transmission environment from the head of a nearby transmission environment. With one or more numbers, these nodes are referred to as attacker nodes. The rushing attacker node is what it's called. [3, 66, 69].

These nodes are used later in the system integration coordination procedure in the transmission environment. The transmission environment head node chooses one of these potential nodes at random. It then sends information about the targeted attacker node to the head node for the nearby transmission environment. For information from a Node-id with increment packet transaction, values examine the sender node's route and the route of the surrounding node with their environment [75].

The Attacker detection automation of the Bees Colony Optimization (ADABCP) technique provides a single relative coordinate system by merging comparative coordination systems across nodes. As a result of this consideration, each node has two neighboring nodes that overlap with each of its MANET surrounds. The relative coordinate systems of two subsequent mobile nodes are integrated into two overlapping nodes due to this process. Each head node will complete the routing using distance information based on the "Received Signal Strength Indicator" and the IDs of nearby nodes. Members of its overlapping node will back each head node. Each node belongs to at least two routes and receives relative addresses from all head nodes. This permits the aggregate node to have a close address for each of the surrounding nodes it belongs to, and it's utilized to integrate neighboring coordinate systems [28, 78].

Attacker detection automation of Bees Colony Optimization (ADABCP) was developed to overcome route optimization concerns on the MANET against rushing assaults. Route Organization and Route Reorganization are two steps of the ADABCP [22, 83]. A significant data stream is evaluated while defining Route Organization, which gets values for numerous mobile node attributes. This research uses Route Organization and Route Reorganization to optimize the Route State issue based on this consideration.

Where there are N f total characteristics on forwarding transmission between nodes, there will be 2 N f types of subsets accessible on forwarding transmission between nodes, each with a different length and parameters [29]. Each subset of parameters may be seen as a place in this space. The best position is the lowest length subset with the most negligible difference in correlation between the original set and sub-set parameters. In this scenario, a swarm of bees is introduced, which flies to the ideal location. They want to fly and change their position over time, connect, and search for the best and most optimal place globally, i.e., "Location Route Organization Node." Convergence in the process is achieved iteratively [17, 48].

In this scenario, a swarm of bees is introduced, which flies to the ideal location. They want to fly and check their position over time, interact with one another, and search for the best and most optimal place globally, i.e., "Location Route Reorganization Node." The best position is the comparative length subset with the most negligible difference in correlation between the original set and sub-set parameters. The following algorithm can be used to achieve this optimum routing.

Algorithm 2
figure b

Algorithm for Attacker detection automation of Bees Colony Optimization (ADABCP)

Algorithm 3
figure c

Algorithm for attacker detection automation of Bees Colony Optimization (ADABCP)

Algorithm 4
figure d

Algorithm for proposed routing protocol:(Rushing Attack)

Algorithm 5
figure e

Algorithm for route reorganization

Algorithm 6
figure f

Algorithm for route reorganization

For discovering the Rushing Attack, the following five algorithms offer a Route Organization, and Route Reorganization based Routing Protocol [16, 18, 31, 48]. Following the detection of a Rushing Attack on a MANET path, the path selection might be completed using the Swift Implicit Response Round Trip Time mechanism-based secure path selection [35]. This approach generates an effective communication path after avoiding rushing attacks. This technique determines if the communication node is active or not. The nodes create rushing assaults if they are dormant. Thus attackers appear in the routing path [80, 83].

3.2 Swift Implicit Response Round Trip Time (SIRT) Mechanism

The Route Organization and Route Reorganization-based Routing Protocol are unsatisfactory packet broadcasting among the nodes in the transmitting environment [32, 37]. Because the attacker node abruptly changed its mode of operation by lowering the packet delivery ratio. Our proposed research aims to discover and eliminate the impacted communication channel from the Swift Implicit Response Round Trip Time (SIRT) mechanism, which would fix this transformation. By employing the SIRT mechanism technique, nodes allow a secure node with a better transmission rate to operate.

3.2.1 SIRT Mechanism

This will be expressed in the MANET network by employing stable path construction and continuous routing. The attacker-free path with the uncommon nodes delivery time is identified by the Swift Implicit Response Round Trip Time (SIRT) Mechanism-based secure path Selection technique. Every node in the routing path has its node data stream status monitored using the Attacker detection automation of Bees Colony Optimization (ADABCP) algorithm [33, 78]. This aids in increasing the SIRT Mechanism's packet delivery ratio. To reduce the misbehavior of attacker node transmission, every node must lower the abnormal route detection with the node's usual behavior—this aids in updating the insecure route between communication nodes via the routing path.

The mobile nodes in a MANET do not update their position as frequently in this situation. If the procedure requires establishing a secure connection node, the route's path flow has been adjusted energetically to prevent harm to nodes (attackers) in the particular course. The relay node, responsible for the attacker's destruction, logically restores the route. Using the "Use Best Approximation" method, this rushed attacker kills the process that affords closer to the target node in the routing path. The MANET provides the Static route with continuous routing by Use Best Approximation [36].

3.2.2 Use Best Approximation

When the sender refuses to transmit the route, the recipient node repeatedly receives packets from the sender. The proposed Static route with continuous routing was used to avoid that communication. These ongoing routing packet delivery communications aim to convey many control packets to their destination. The traffic density rose due to the large packets on the static path. The minimal packet delay for data transmission was allowed to avoid traffic occurrence on the network [15]. This minimal packet delay transmission prevents undesirable extra data packet broadcasting in the MANET system. This procedure aids in the reduction of data corruption and wormhole attackers while also increasing packet delay.

This study uses Hybrid Random Late Detection (HRLD) to limit the efficacy of rushing attacks and lengthen the data delivery time interval to facilitate data transmission against the rushing flagging procedure [10]. These HRLD models were created to provide secure data transfer [41, 42, 48 Against the rushed flagging protocol, this approach assures data delivery over a secure channel.].

3.3 Hybrid Random Late Detection (HRLD)

This HRLD method uses "Use Best Approximation" to enable safe data transfer, which aids with problem observation routing. This suggested method ensures effective transmission across a network with no infrastructure. Furthermore, the Attacker Detection Automation is utilized to find the right attackers. The suggested Swift Implicit Response eliminates MANET routing congestion communication. The first matching with other nodes is used to automatically reduce an attacker using the "Swift Implicit Response Round Trip Time" method.

By employing interaction history in a well-organized manner, the limited route may be used to discover an effective solution for dead node reduction and active links node boost-up [3, 37, 40]. The time interval assignment determines how the dead node reduction and active links node boost-up are handled. By employing a critical assignment, each node will allocate time for replying to the sender node. The transmitted node will send reply messages to the transmitting node within the set time interval to prove node confirmation. For one-way communication, this confirmation helps to decrease the end-to-end latency. Routing efficiency is maintained via route interaction to reduce performance deterioration. This routing strategy aids in the secure and intelligent discovery of the best routing. Finally, each transmission's node rating is derived from the previous contact history. In addition, the Attacker detection automation is executed concurrently for updating the Dead node and active connections [38]. These changes are made to the history of previous interactions. The cyclic processes of node ranking represent the continuous monitoring system of an "infrastructure-less network," resulting in an enhanced alternative to current tactics. The standard routing path on Mobile Ad Hoc Networks is not a proven path for the entire period of data transmission in this continual circular operation [15, 39].

3.3.1 Mechanism Against the Late Detection

The routing protocol of mobile nodes mentions late detection algorithmically. In most critical situations, mobile nodes share important messages over the network via end-to-end communication via a data-transfer application [42, 55, 76]. This study conducted a survey based on the benefits of two-way communication, such as node-to-node and node-to-controller communication. These two types of communications each have issues in enabling reliable and secure data flow between nodes or between nodes and controllers.

3.3.2 Hybrid Random Late Detection (HRLD) Routing Protocol

This study uses the following two assumptions to design the Hybrid Random Late Detection (HRLD) routing protocol. On the MANET, the HRLD routing protocol is primarily intended for path optimization [49, 78].

Increase the packet delivery ratio of each node and reduce packet delay on specified routes from the Past Interaction History (PIH) to construct node transmission range patterns [58, 65]. The same technique was used for a different group to improve the routing protocol for each subsequent zone [61]. These approaches also aid in determining the network's transmission acceleration, regardless of whether the node is transmitting data or not. The transmission speed is calculated using the node transmission accelerate Table 1 below. The target node path will be placed in the node transmission accelerate table using the proactive protocol after establishing a node route without any intrusion.

Table 1 Node transmission accelerate

The suggested data transmission acceleration techniques have also been tested against the routing protocol [67, 76]. The nth destination address for MANET completion was discovered using this protocol. The input Ratio Range for Bandwidth Modulation was guaranteed based on the MANET Environment scenario.

  1. i.

    Route finding and time confine

    This route finding and time confinement took the communication between the sender and receiver to find the exact route between the source and destination by the get_route(). The two aspects were considered for forming Sender-receiver path manipulation [77]. Firstly, the mobile node was checked based on the node lifetime and energy. These mobile node platforms continuously correspond to the route based on the switch inputs over the broadcasting of the packet signal to the nearby nodes.

  2. ii.

    Sender-receiver address status

This Sender-receiver destination addresses status was taking the communication over the Ratio Range and Data Rate of SDN for finding the exact route between the sender and receiver by the Include find (). The next possible nearby node is summarized concerning the throughput of each ratio range and the data rate of each transaction. The two conditions were considered for forming the destination of particular data transmission.

3.3.3 Route Finding Manipulation (RFM)

Is routing or data communication assisting to improve MANET communication' with the environment in demand, or are MANET making the route determination into offering "RFM?". this research committed this demand with the "Hybrid Random Late Detection (HRLD)".

The Route Finding Manipulation (RFM) is elementary support for the sender and receiver and the middle node to data communication [78]. Route Finding Manipulation supports precisely the best route from the sender to the receiver. It considers the significance of the contribution to data communication. The Route Finding Manipulation is formed below.

Algorithm 7
figure g

Algorithm for Hybrid Random Late Detection (HRLD) routing

The Sender-Receiver Destination Addresses MANET Routing Protocols for Path Nodes were explored in this method. A MANET's mobile nodes do not regularly update their position [2, 77, 79]. If the process requires establishing a secure connection node, the route's path flow has been adjusted energetically to avoid damaging nodes (rushing attackers) along the identical route. The relay node, responsible for the attacker's destruction, logically restores the route. This rushed attack destroy procedure gets you closer to the routing path's target node. When the sender refuses to transmit the route packets, the receiver node receives them again from the sender. The suggested Hybrid Random Late Detection (HRLD) routing Algorithm was used to avoid that communication. The goal of these continuous routing packet delivery communications is to convey many control packets to their destination. The rush traffic rose due to the large packets on the static path. Data transmission was restricted to a minimal packet delay to reduce network congestion. This minimal packet delay transmission prevents undesirable extra data packet broadcasting in the MANET system. This method aids in the reduction of data corruption and rushing attacks while also increasing packet delay [20, 56, 66].

The proposed approach is utilized to find the attacker's precise maximum and quantity of damage routes. All nodes in the MANET network identify as the intermediary node with the lowest TTL value in between this damage route. This intermediate node indicates the malicious attackers' nodes within the node frequency coverage area. Details about malicious attackers' nodes are broadcast across the network, even to destination nodes. This article presented the Static route with continuous routing to avoid these dangerous actions.

Moreover, compare each node's features in the network to assess anomalous behavior; a high score indicates hateful conduct, whereas a low score indicates an efficient node. Each destination node's connection setup data are stored in the destination node. The ability to identify hostile nodes from routing nodes in the network environment is aided by network information that includes details for each link's current quality level [17]. Some nodes are removed from routing paths in this era based on packet transmission speed and routing speed-accuracy rate. The quality of service paths helps for any failure node. The destination node contains all details to start a pattern recognized to the link with low packet latency without malicious nodes. The quality service paths help for any failure node. The destination node contains all details to start a pattern recognized to the link with low packet latency without malicious nodes.

The destination node arranges this information through the routing path intermediate nodes by exchanging dual procedure packets with the remaining nodes. It is the promise that the facts of the network state are contained each to restore prior routes and start initially by exclusive of the rushing attacker nodes, for more likelihood and minimum traffic. Malicious nodes can facilitate data limitation to a more stable routing path than the remaining pathways, which reduces packet transmission traffic and improves network longevity [37, 54].

3.4 Performance Analysis Discussed from Social Distancing Alarm (SDA)

Social distancing is the foundation of COVID-19 prevention. Social Distancing Alarm (SDA) has been introduced to counter the social distancing during the pandemic to prevent the invasion of health issues. Social distancing has focused on diminishing vulnerability to public health and sustenance of one meter (three feet) distance as the primary natural object corresponding to people [7276]. The careless imperfect social space is one where there is a chance of exposure or contact, as can be caused in the public place [2746, 6275]. WHO standards policies, including lockdown and unlocking, have been carried out across India to alleviate the social distancing process. Central and state governments, health departments, and every citizen have access to quickly adapt to these pandemic measures, often in absence of experience and direction [48].

This research has given the procedural aspect and integrated technologies names as social distancing alarm with sensors accomplishing COVID-19 prevention to maintain this issue. This social distancing alarm helps focus on the mobile devices/ intelligent personal assistant devices that have been contemplated with the intervention communication, monitoring, remote location, screening, and user outreach. In this social distancing alarm, the automatically-reacting notice can also be being incorporated into mobile devices/intelligent personal assistant devices, such as by making distance alarms and routing customers to conquer place or next gateway for shopping based on availability [7180].

3.4.1 Automatically-Reacting Alarm

An automatically-reacting alarm is a non-wearable remote sensor device that can help make the distance in a particular moving object, especially in human behavior monitoring such as distance, vital signs, etc. Automatically reacting sensors track movement activity, temperature, breathing, and coughing symptoms. The automatically-reacting alarm resolves the addressed potential issues quickly like customer engagement, device costs, ethical monitoring, risk monitoring, and staffing demands [70]. Automatically reacting sensors also are used to route supervising and keep social distance [6469]. This process is also called the Digital Contact Tracing (DCT). The DCT can help to make the social distancing between customers amongst COVID-19 patients and healthy customers by distinguishing whether people have been social/physical distancing by measuring spaces among two or more mobile devices/intelligent personal assistant devices. Nevertheless, the digital contact tracing examines results is helps to remotely monitor customers and keep them shopping more without any fear and suspicion. Even though, this research has worked and formed the applied tools above to help remotely monitor customer and their use in an effective manner [74].

Trends in the carrying out of automatically-reacting alarm process. On the place of SDA1, initial node ranking will be made; At the same instant, on the position of SDA2 monitoring user location with a device; SDA3 normal response to implicit response; SDA4 maintaining distance with the social distance navigator; SDA5 reroute next path row; SDA6 regular route; SDA7 getting authorized investigator; SDA8 avoidance of crews; aero mark indicates the path between each row (Fig. 21).

Fig. 21
figure 21

Prudent infrastructure with the help of Simultaneous Optimization (SO) and Imprecise Ramification (IR)

An automatically-reacting alarm has the following properties to make the social distancing of individual customers across the shopping center. The following terms are applicable to create the perfect social distancing [3055, 60].

  1. i.

    Ability Outstripping Indicator (AOI)

This Ability Outstripping Indicator (AOI) establishes how persons that make the distance with the neighbor have the hierarchy of distance tree and route among the crews of a shopping center or any public place. The higher ability outstripping indicator indicates a substantial walking order in the distance tree and route (Young and Schneider 2020).

  1. ii.

    Doubt Preventing Indicator (DPI)

Doubt Preventing Indicator (DPI) represents that persons are unpleasant or unknown. Therefore, this preventing indicator can effectively conquer persons with a minimum distance that a group favors representation in an interpretations manner [39, 71].

  1. iii.

    Individual Versus Grouping (VGI)

This Individual Versus Grouping (VGI) strengthen and support individual or behaviors.

An individual's entry is chosen to initiate customer identification details with personal details. When some time allocations (TA = 30 min) are formed, a contact partner also checks with neighbor probability distance (one meter (three feet)) with the following networks that result from maximizing distance-reduction strategies [32, 72].

If either single customer is not maintaining the distance from others and the other is also not warned by an alarm. Since, among all individuals in the simulation, those who are not keeping the space for more than 30 s to the nearby person are in the waring stage for more than 30 s [83]. Hence the alarm gets continuous warning exposed with minimal probability distance. Therefore, Individuals who were warned were alarmed by the least possible space. On the foundation of the automatically-reacting alarm, the minimum length is ordinarily set to determine position limits or a fixed distance (one meter (three feet)) of crowding behavior in the assortment of directions (DV) [5970]. These algorithmic steps are repeated until all susceptible might change the position described in Fig. 22.

Fig. 22
figure 22

The simulation model flowchart consists of an iterative process of the proposed work

The simulation model discussed the customer experience crowd viewing behaviors in an assortment of directions is not sufficient to make the fixed distance (one meter (three feet)); hence, it is crucial to look into the actions and activities that customers experience crowd viewing behaviors on in identifies and a different location [79]. Prompted by these two existences, ad-hoc network-based sensors on social distancing towards the public environment are formulated in this research phenomenon, which inhibited both social distancing and Social Distancing Alarm (SDA). We attempt to study the relationship between sensors-based social distancing and manual social distancing without staff management. By comparing the social distancing follower's ratio, we can obtain that both sensors-based and manual social distancing had equal influence [32, 72].

However, on a day-to-day basis, the social distancing follower's ratio was increased based on the sensors-based social distancing model. These experiments are given by objects moving through the shopping mall of customers and an informal photograph of the sensors-based social distancing process [56, 73, 74]. Furthermore, the consequences of sensors based social distancing for different customers are examined scientifically, which are primarily manifested by the maximum distance reduction that is shown in Fig. 23

Fig. 23
figure 23

Symbolic form of field (block dotted) customer with sensors

Figures 23, 24, and 25 represents the behavior with the Embedding sensors-based social distancing model is works based on birds clustering in 3D space. The form of each customer is set as one meter (three feet) circular region, but the neighbor and some other obstructions will block part of the specific environment.

Fig. 24
figure 24

Representative diagram of "social distancing" behavior

Fig. 25
figure 25

Representative diagram of "social distancing"

3.4.2 Imprecise Ramification (IR)

  1. i.

    Temporary sudden disposal of the misbehaved customer

The temporary sudden disposal of the misbehaved customer is based on the behavioral activities of the customers. The following procedural aspects are used to yield the misbehaved customer separation [61, 79, 83]

  1. ii.

    Initial distance maintenance of customers

An initial distance can follow while entering in into the shopping mall. In this research aspect, the most extensive principles of the social distancing notification distribution measurements were used. In distinction from others, that social distancing consists of the least possible one-meter (three feet) ranges in diameters from one another [57].

  1. iii.

    Nearby Obstruction Conditions

Nearby obstruction comes, once the customer crosses the involving spatial location, it has been recorded as the disobeys activities on the environment [59].

3.4.3 Sensors Based Social Distancing Model

Sensors-based social distancing model is shown to reproduce customer (i) behavior against the movement of neighbor in the nearby obstruction conditions. Different from the initial distance maintenance(DV) in a normal temporary sudden disposal of the misbehaved customer(j) that knows the position of the exit and the desired directions point (fi) is described in the following Fig. 26 [69]. Customer will change their position after seeing the boundary to avoid touching the neighbor [15, 2463].

3.4.4 Factors on Embedding Sensors Based Social Distancing Model

In this place, concisely discuss the factors that affect the sensors-based social distancing position.

Figure 26 represents the behavior with the Embedding sensors-based social distancing model based on birds clustering in 3D space. From the position of each node is called a source (i) which is represented in the 3D X–Y-Z coordinates area as a point. The node relative coordination systems concept is used to find an objective neighbor (k). Each node experiences the best value (pbest) and its current position. Each nearby neighbor (j) and its nodes know the global best value (gbest). The function of each actual source node is modified using velocity (dv), and the speed of each neighbor node (δ(i,j)) is calculated by Eq. 2 and Eq. 3

$${\displaystyle \begin{array}{l}\begin{array}{l}{\left({d}_v\right)}_{{\left[\delta \left(i,j\right)\ \left( act\_ src\_ node\right)\right]}_i^{k+1}}\\ {}=\left[{Dist}_{act\_ src\_ node}\right]\left[\delta \left(i,j\right){\left( act ual\ source\right)}_i^k\right]\\ {}+\left[{Dist\ factor}_{act\_ src\_ node}\right]\left[{random\ number}_{act\_ src\_ node}\right]\end{array}\\ {}\times \left({pbest}_{act\_ src\_ node}-{\left[ current\ position\right]}_{act\_ src\_ node}^k\right)\\ {}+\left[{random\ number}_{act\_ src\_ node}\right]\times \left( gbest-{\left[ current\ position\right]}_{act\_ src\_ node}^k\right)\end{array}}$$
(2)
$$\begin{array}{l}\begin{array}{l}{\left(d_v\right)}_{\left[\delta\left(i,j\right)\;\left(neihg\_node\right)\right]_i^{k+1}}\left[\underset.v\left(neihg\_node\right)\right]_i^{k+1}\\=\left[{Dist}_{neihg\_node}\right]\left[\delta\left(i,j\right)\left(neighbour\;node\right)_i^k\right]\\+\left[{Dist\;factor}_{neihg\_node}\right]\left[{Random\;Number}_{neihg\_node}\right]\end{array}\\\times\left({pbest}_{neihg\_node}-\left[successive\;position\right]_{neihg\_node}^k\right)\\+\left[{random\;number}_{neihg\_node}\right]\times\left(gbest-\left[successive\;position\right]_{neihg\_node}^k\right)\end{array}$$
(3)

where \({\left[\updelta (\mathrm{i},\mathrm{j}) (\mathrm{act}\_\mathrm{src}\_\mathrm{node})\right]}_{\mathrm{i}}^{\mathrm{k}+1}\) is the actual source node velocity i at iteration k, simultaneously \({\left[\updelta (\mathrm{i},\mathrm{j}) (\mathrm{neihg}\_\mathrm{node})\right]}_{\mathrm{i}}^{\mathrm{k}+1}\) is the neighbor node velocity i at iteration k, \({\mathrm{Dist}}_{\mathrm{act}\_\mathrm{src}\_\mathrm{node}}\) and \({\mathrm{Distance}\_\mathrm{factor}}_{\mathrm{neihg}\_\mathrm{node}}\) are distance concerning the random numbers between 0 and 1,\({\left[\mathrm{current position}\right]}_{\mathrm{act}\_\mathrm{src}\_\mathrm{node}}^{\mathrm{k}}\) is the current position of actual source node i at iteration k, \({\mathrm{pbest}}_{\mathrm{act}\_\mathrm{src}\_\mathrm{node}}\) and \({\mathrm{pbest}}_{\mathrm{neihg}\_\mathrm{node}}\) is the pbest of an actual source node and neighbor node I and gbest is the best value so far in the group among the pbest of all source nodes and neighbor nodes. The distance function is calculated as following Eq. 4 and Eq. 5,

$${\mathrm{D}}_{\mathrm{cn}}=\mathrm{Tot}\_\mathrm{nod}\_\mathrm{cnt}-\frac{{\mathrm{nod cnt}}_{\mathrm{ini}}-{\mathrm{nde cnt}}_{\mathrm{final }}}{{\mathrm{Rute cnt }}_{\mathrm{itern}}}*{\mathrm{curr}}_{\mathrm{itern}}$$
(4)
$${\mathrm{D}}_{\mathrm{nn}}=\mathrm{Tot}\_\mathrm{nod}\_\mathrm{cnt}-\frac{{\mathrm{nod cnt}}_{\mathrm{nn}}-{\mathrm{nde cnt}}_{\mathrm{nn }}}{{\mathrm{Rute cnt }}_{\mathrm{itern}}}*{\mathrm{succ}}_{\mathrm{itern}}$$
(5)

where, \({\mathrm{D}}_{\mathrm{nn}}\) is the \({\mathrm{Dist}}_{\mathrm{neihg}\_\mathrm{node}}\) and Tot_nod_cnt is the \(\mathrm{Total node coun}\) t, the \({\mathrm{nod cnt}}_{\mathrm{ini}}-{\mathrm{nde cnt}}_{\mathrm{final}}\) is the initial and final node count. \({\mathrm{Rute cnt }}_{\mathrm{itern}}\) is the maximum iteration number and \({\mathrm{curr}}_{\mathrm{itern}}\) is the current iteration number and \({\mathrm{succ}}_{\mathrm{itern}}\) is the next iteration number. Most researchers select a single test pad position of a prominent that contains the independent users. That single test pad position provides a single nearby neighbor identification only. Hence it could not accomplish regular maintenance of social distance at all times [49, 50, 80]. A prominent customer's single test pad position: More than one test pad position nodes are close by, as shown in Fig. 26.

Fig. 26
figure 26

Global Embedding sensors based social distancing model

The number of sensor nodes(i,j,k),Typically, enhancing the number of position (i',j',k'), (I",j",k"), (I'”,j’”,k’”) will amend the performance notice the nearby neighbour. An extreme point is explained in Eq. 6

$${\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}={\updelta }_{(\mathrm{i},\mathrm{j})}+{\updelta }_{(\mathrm{i},\mathrm{k})}\text{>>}{\updelta }_{(\mathrm{j},\mathrm{k})}$$
(6)

The above constitutive leads to maximum distance from neighbor. Simultaneously, in the other cases (Eqs. 7, 8 and 9),

$${{\updelta }^{\prime}}_{\left(\mathrm{i}\prime,\mathrm{j}\prime,\mathrm{k}\prime\right)}={{\updelta }^{\prime}}_{(\mathrm{i}\prime,\mathrm{j}\prime)}+{{\updelta }^{\prime}}_{(\mathrm{i}\prime,\mathrm{k}\prime)}\text{>>}{{\updelta }^{\prime}}_{(\mathrm{j}\prime,\mathrm{k}\prime)}$$
(7)
$${{\updelta }^{\prime\prime}}_{({\mathrm{i}}^{\prime\prime},{\mathrm{j}}^{\prime\prime},{\mathrm{k}}^{\prime\prime})}={{\updelta }^{\prime\prime}}_{({\mathrm{i}}^{\prime\prime},{\mathrm{j}}^{\prime\prime})}+{{\updelta }^{\prime\prime}}_{({\mathrm{i}}^{\prime\prime},{\mathrm{k}}^{\prime\prime})}\text{>>}{{\updelta }^{\prime\prime}}_{({\mathrm{j}}^{\prime\prime},{\mathrm{k}}^{\prime\prime})}$$
(8)
$${{\updelta }^{\prime\prime\prime}}_{({\mathrm{i}}^{\prime\prime\prime},{\mathrm{j}}^{\prime\prime\prime},{\mathrm{k}}^{\prime\prime\prime})}={{\updelta }^{\prime\prime\prime}}_{({\mathrm{i}}^{\prime\prime\prime},{\mathrm{j}}^{\prime\prime\prime})}+{{\updelta }^{\prime\prime\prime}}_{({\mathrm{i}}^{\prime\prime\prime},{\mathrm{k}}^{\prime\prime\prime})}\text{>>}{{\updelta }^{\prime\prime\prime}}_{({\mathrm{j}}^{\prime\prime\prime},{\mathrm{k}}^{\prime\prime\prime})}$$
(9)

This constitutive represents computing's most inadequate neighbor. This process is shown in the following algorithm [34].

Algorithm 8
figure h

Algorithm for Sensors distance schema validation procedure

From Eq. 1 to 4, novel work called embedding sensors based social distancing model, for figuring the most inadequate distance with a neighbor on any position [34]. In this research, a node pair δ(i,j) and position i,j,k are used to discover a nearby node closer to the source node. The proposed universal position in a global embedding sensors-based social distancing model finds the approximate shortest distance between source and destination. It is computed as the sum of their lengths to all participating customer positions. Consequently, sensors-based social distancing measures have focused more on the following criteria. To measure the social distance the sound signal has traveled, we use the formula:

These measures are technically described as the following criteria.

Measure 1: Cautionary advice in a direction opposite to going out by a neighborhood, which is the most straightforward measure, simply announced on a specific community not systematically obey the rules. Quick sudden disposal of the misbehaved customer is described as the following criteria (Eq. 10).

$${\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left\{{\mathrm{T}}^{({\updelta }_{(\mathrm{i})})}>\mathrm{t}\right\}=\frac{6}{{\uppi }^{2}}\left(\sum\nolimits_{\mathrm{i},\mathrm{j},\mathrm{k}=0}^{\infty }\frac{{\left(-1\right)}^{(\mathrm{i},\mathrm{j},\mathrm{k})}}{2(\mathrm{i},\mathrm{j},\mathrm{k})+1}\mathrm{exp}\left\{-\frac{{\left(2(\mathrm{i},\mathrm{j},\mathrm{k})+1\right)}^{2}{\uppi }^{2}\mathrm{t}}{{6\mathrm{L}}^{2}}\right\}\right)$$
(10)

Equation 5 describes the probability that the data arrives in the region' i' before time t. the initial distance maintenance of customers before time t is calculated by the following criteria (Eq. 11)

$${\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left\{\mathrm{T}>\mathrm{t}\right\}=\frac{{6}^{\mathrm{C}}}{{\uppi }^{2\mathrm{C}}}{\left(\sum\nolimits_{\mathrm{i},\mathrm{j},\mathrm{k}=0}^{\infty }\frac{{\left(-1\right)}^{\mathrm{i},\mathrm{j},\mathrm{k}}}{2(\mathrm{i},\mathrm{j},\mathrm{k})+1}\mathrm{exp}\left\{-\frac{{\left(2(\mathrm{i},\mathrm{j},\mathrm{k})+1\right)}^{2}{\uppi }^{2}\mathrm{t}}{{8\mathrm{L}}^{2}}\right\}\right)}^{2\mathrm{C}}$$
(11)

Equation 6 describes the probability of maximum distance between the object concerning the T time and position c [15].

Measure 2: Cautionary advice in a direction opposite to going out of a whole shopping complex.

Temporary sudden disposal of the misbehaved customer is identified by the following condition (Eq. 12)

$$\displaystyle\lim_{{\mathrm{ML}\to \infty }}\frac{1}{{\mathrm{ML}}^{2}}\mathrm{log }\;{\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left\{{{\mathrm{T}}_{\mathrm{ML}}}^{({\updelta }_{(\mathrm{i})})}\le \mathrm{T}\right\}=-\frac{1}{2\mathrm{T}}$$
(12)

The distance between the origin and the neighbor region approaches infinity. This condition returns the minimal length of the source and the neighbor region (Olivera, Chuquichambi, and Ingram, 2020). For this consideration, the initial distance maintenance of each customer might be (Eq. 13)

$$\displaystyle\lim_{{\mathrm{ML}\to \infty }}\frac{1}{{\mathrm{ML}}^{2}}\mathrm{log }\;{\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left\{{\mathrm{T}}_{\mathrm{ML}}\le \mathrm{T}\right\}=\frac{1}{2\mathrm{T}}$$
(13)

Here the Minimum Distance (ML) between origin and the destination region comes near to specified minimum distance of nearly one meter (three feet) [48, 77].

Measure 3: distance measures by self. This measure prevents people from highly affected regions such from shopping. This nearby obstruction is calculated based on Eq. 14

$$\displaystyle\lim_{{}_{\mathrm{ML}\rightarrow\infty}}\frac1{\mathrm{LN}^2}\log\;\;\delta_{(\mathrm i,\mathrm j,\mathrm k)}\left\{{\mathrm T}_{\mathrm{ML}}^{(\delta_{(\mathrm i)})}<\mathrm T\right\}={-\left(\frac1{2\mathrm T}\right)}^\frac{\mathrm D}{\mathrm{ML}}$$
(14)

Here the Neutral distance (LN) between origin and the destination region comes near to a specified Maximum length (D), nearly more than one meter (three feet).

This nearby obstruction with maximum distance is calculated based on Eq. 15

$$\displaystyle\lim_{{}_{\mathrm{ML}\rightarrow\infty}}\frac1{\mathrm{LN}^2}\log\;\delta_{(\mathrm i,\mathrm j,\mathrm k)}\left\{{\mathrm T}_{\mathrm{ML}}^{(\delta{{}_{(\mathrm i)}}_{\mathrm D})}<\mathrm T\right\}=\left(\frac1{2\mathrm T}\right)^\frac{\mathrm D}{\mathrm{ML}}$$
(15)

From the above notation, the social distancing alarm form of the following derivation (Eq. 16).

$${\mathrm{let},\mathrm{ SDA}}_{(\mathrm{t})}^{{{\updelta }_{(\mathrm{i})}}_{\mathrm{D}}}:\mathrm{t}\ge 0\; \forall\; {{\updelta }_{\left(\mathrm{i}\right)}}_{\mathrm{D}},\mathrm{ i}=\mathrm{1,2},3,\dots \mathrm{D}$$
(16)

There are the following determines available in the social distancing alarm (Eq. 17)

$${\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left({\mathrm{T}}_{\mathrm{ML}}>\mathrm{T}\right)=\left\{\begin{array}{c}{\mathrm{ SDA}}_{(\mathrm{t})}^{{{\updelta }_{(\mathrm{i})}}_{0}}\; if \;t\le 0\\ {\mathrm{ SDA}}_{(\mathrm{t})}^{{{\updelta }_{(\mathrm{i})}}_{\mathbf{D}}}\; if \;t>0\end{array}\right.$$
(17)

Initialization:\(\mathrm{t}\le 0\)

The following conditions are available in the maximum social distancing in the initial stage (Eq. 18).

$${\mathrm{SDA}}_{\left(\mathrm{t}\right)}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=0}}\mathrm{ when\; t}=0$$
(18)

In this stage (Eq. 19), the proposed system produces the two possible distances, such as

$$\left\{{\mathrm{SDA}}_{(\mathrm{i},\mathrm{t})}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=0}}\mathrm{ \ and \ }{\mathrm{B}} \ _{(\mathrm{j},\mathrm{t})}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=0}}\right\}$$
(19)

From (from Eq. 20 to Eq. 30) Starting condition:\(\mathrm{t}>0\)

Here t = 0, 1, 2, 3,…,30

$$\begin{array}{c}{\mathrm{T}}_{\mathrm{ML}}=\left(\mathrm{t}>0 : {\mathrm{SDA}}_{\left(\mathrm{i},\mathrm{t}\right)}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=0}}\ge \mathrm{LN \ or } \ {\mathrm{SDA}}_{\left(\mathrm{j},\mathrm{t}\right)}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=\infty }}\ge \mathrm{LN}\right.)\dots \dots \dots \dots \dots . {\mathrm{SDA}}_{\left(\mathrm{i},\mathrm{t}\right)}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=0}}>\mathrm{LN \ or } \ {\mathrm {SDA}}_{\left(\mathrm{j},\mathrm{t}\right)}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=\infty }}>\mathrm{LN})\\ \underset{\mathrm{LN},\mathrm{ML}\to (0,\infty )}{\mathrm{lim}}\left(\frac{1}{{\left(\mathrm{LN}\right)}^{2}}\right)\mathrm{log}\;{\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left\{{\mathrm{T}}_{\mathrm{ML}}^{({\updelta }_{(\mathrm{i})})}<{\mathrm{T}}_{\mathrm{ML}}^{({\updelta }_{(\mathrm{i})})}\right\}={-\left(\frac{1}{2\mathrm{T}}\right)}^{\frac{\mathrm{D}}{\mathrm{ML}}}\\ \mathrm{if\; t}>0 :\left\{{\mathrm{SDA}}_{\left(\mathrm{i},\mathrm{t}\right)}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=0}}\ge \mathrm{LN }\right\}\mathrm{ or }\left\{{\mathrm{SDA}}_{\left(\mathrm{j},\mathrm{t}\right)}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=0}}\ge \mathrm{LN }\right\}\end{array}$$
(20)

Because

$$\left\{\mathrm{SDA}_{(\mathrm i,\mathrm t)}^{{\delta_{\left(\mathrm i\right)}}_{\mathbf D=0}}\;\mathrm{and}\;\mathrm B_{(\mathrm j,\mathrm t)}^{{\delta_{\left(\mathrm i\right)}}_{\mathbf D=0}}\right\}\;\forall\;{\delta_{\left(\mathrm i\right)}}_{\mathbf D}=1\;\mathrm f\mathrm o\mathrm r\;\mathrm m\mathrm i\mathrm n\mathrm i\mathrm m\mathrm u\mathrm m\;\mathrm d\mathrm i\mathrm s\mathrm t\mathrm a\mathrm n\mathrm c\mathrm e\;\mathrm a\mathrm n\mathrm d\;{\delta_{\left(\mathrm i\right)}}_{\mathbf D}>1\rightarrow\infty\;\mathrm f\mathrm o\mathrm r\;\mathrm m\mathrm a\mathrm x\mathrm i\mathrm m\mathrm u\mathrm m\;\mathrm d\mathrm i\mathrm s\mathrm t\mathrm a\mathrm n\mathrm c\mathrm e$$
(21)
$$\begin{array}{c}{\mathrm{T}}_{\mathrm{ML}}^{({\updelta }_{\left(\mathrm{i}\right)})}=\mathrm{min}\left\{{\mathrm{T}}_{\mathrm{ML}}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=0}}, {\mathrm{T}}_{\mathrm{ML}}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=1}}, {\mathrm{T}}_{\mathrm{ML}}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=2}},\dots , {\mathrm{T}}_{\mathrm{ML}}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}=\infty }}\right\}\mathrm{ for \ minimum \ distance}\\ {\mathrm{T}}_{\mathrm{ML}}^{({{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}})}={\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left(\mathrm{max}\left\{{\mathrm{T}}_{\mathrm{ML}}^{{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}}_{0\;{ \mathrm{to}\; \infty }}}\right\}\right)\end{array}$$
(22)
$${\mathrm{T}}_{\mathrm{ML}}^{({{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}})}={\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left(\mathrm{max}\left\{{\mathrm{T}}_{\mathrm{ML}}^{{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}}_{0}},{\mathrm{T}}_{\mathrm{ML}}^{{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}}_{1}},{\mathrm{T}}_{\mathrm{ML}}^{{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}}_{2}},\dots , {\mathrm{T}}_{\mathrm{ML}}^{{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}}_{\mathbf{\infty }}}<\mathrm{T}\right\}\right)$$
(23)
$${\mathrm{T}}_{\mathrm{ML}}^{({{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}})}=1-\left[{\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left(\mathrm{max}\left\{{\mathrm{T}}_{\mathrm{ML}}^{{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}}_{0}},{\mathrm{T}}_{\mathrm{ML}}^{{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}}_{1}},{\mathrm{T}}_{\mathrm{ML}}^{{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}}_{2}},\dots , {\mathrm{T}}_{\mathrm{ML}}^{{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}}_{\mathbf{\infty }}}>\mathrm{T}\right\}\right)\right]$$
(24)
$$\mathrm T_{\mathrm{ML}}^{({\delta_{\left(\mathrm i\right)}}_{\mathbf D})}=1-\left[\left[\delta_{(\mathrm i,\mathrm j,\mathrm k)}\left(\max\left\{\mathrm T_{\mathrm{ML}}^{{{\delta_{\left(\mathrm i\right)}}_{\mathbf D}}_0}>\mathrm T\right\}\right)\right],\left[\delta_{(\mathrm i,\mathrm j,\mathrm k)}\left(\max\left\{\mathrm T_{\mathrm{ML}}^{{{\delta_{\left(\mathrm i\right)}}_{\mathbf D}}_1}>\mathrm T\right\}\right)\right],\left[\delta_{(\mathrm i,\mathrm j,\mathrm k)}\left(\max\left\{\mathrm T_{\mathrm{ML}}^{{{\delta_{\left(\mathrm i\right)}}_{\mathbf D}}_2}>\mathrm T\right\}\right)\right],\dots\left[\delta_{(\mathrm i,\mathrm j,\mathrm k)}\left(\max\left\{\mathrm T_{\mathrm{ML}}^{{{\delta_{\left(\mathrm i\right)}}_{\mathbf D}}_\infty}>\mathrm T\right\}\right)\right]\right]$$
(25)
$$1-\left[{\updelta }_{\left(\mathrm{i},\mathrm{j},\mathrm{k}\right)}{\left(\mathrm{max}\left\{{\mathrm{T}}_{\mathrm{ML}}^{{{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}}\right\}\right)}^{\frac{\mathrm{D}}{\mathrm{ML}}}\right]=-{\left(\frac{1}{2\mathrm{T}}\right)}^{\frac{\mathrm{D}}{\mathrm{ML}}}$$
(26)
$$\displaystyle\lim_{{\mathrm{LN},\mathrm{ML}\to (0,\infty )}}\left(\frac{1}{{\left(\mathrm{LN}\right)}^{2}}\right)\mathrm{log}\;{\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left\{{\mathrm{T}}_{\mathrm{ML}}^{({{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}})}<\mathrm{T}\right\}$$
(27)
$$\underset{\mathrm{LN},\mathrm{ML}\to \left(0,\infty \right)}{\mathrm{lim}}\left(\frac{1}{{\left(\mathrm{LN}\right)}^{2}}\right)\mathrm{log}\;{\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left\{{\mathrm{T}}_{\mathrm{ML}}^{\left({{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}\right)}<\mathrm{T}\right\}=\underset{\mathrm{LN},\mathrm{ML}\to \left(0,\infty \right)}{\mathrm{lim}}\left(\frac{1}{{\left(\mathrm{LN}\right)}^{2}}\right)\mathrm{log}\;{\updelta }_{(\mathrm{i},\mathrm{j},\mathrm{k})}\left(\frac{\mathrm{D}}{\mathrm{ML}}\right)\left\{{\mathrm{T}}_{\mathrm{ML}}^{\left({{\updelta }_{\left(\mathrm{i}\right)}}_{\mathbf{D}}\right)}<\mathrm{T}\right\}$$
(28)
$$=\displaystyle\lim_{\mathrm{LN},\mathrm{ML}\rightarrow\left(0,\infty\right)}{\left(\frac1{\left(\mathrm{LN}\right)^2}\right)\log\;\delta_{(\mathrm i,\mathrm j,\mathrm k)}\left\{\mathrm T_{\mathrm{ML}}^{\left({\delta_{\left(\mathrm i\right)}}_{\mathbf D}\right)}<\mathrm T\right\}}^\frac{\mathrm D}{\mathrm{ML}}$$
(29)
$$={\left(\frac{1}{2\mathrm{T}}\right)}^{\frac{\mathrm{D}}{\mathrm{ML}}}$$
(30)

Granting the above equation, the precise maximum distance between the origin and destination region becomes the maximum distance such as sensor nodes usable amongst two different locations [1]. if the distance of the ML is maximum sufficiency, we have

$$\left(\frac1{2\mathrm T}\right)^\frac{\mathrm D}{\mathrm{ML}}\forall\;\delta_{(\mathrm i,\mathrm j,\mathrm k)}\;\left\{{\mathrm T}_{\mathrm{ML}}\leq\mathrm T\right\}\cong\mathrm e-\left(\frac{\mathrm{ML}^2}{2\mathrm T}\right)^\frac{\mathrm D}{\mathrm{ML}}$$
(31)

The above distance formation demonstrates the limiting behavior of social distancing in the maximum distance that is to say D/ML. Here ML is taken as the maximum distance in the region even the same as in minimum distance calculation. This observation indicates that the extremely maximum distance origin improves the social distance (Eq. 31).

4 Result Discussion

In computer simulation to examine the about to be mentioned below specified execution factor that defines a system and determines its performance are using X graph in ns2.34 [83].

4.1 End to End Delay

Figure 27 demonstrates end to the end delay is calculated by the quantity of time taken for packet transmission from sender to receiver, all node connectivity stored by past integration history. In the Proposed "Optimal Aggregation of Attacker detection automation of Bees Colony Optimization" method [2] packet latency is cut down compared to the existing method ESCT—Cai et al. [12], ENM-LAC—Liu et al. [53] and ZRDM-LFPM—Khudayer et al. [47].

Fig. 27
figure 27

Graph for end to end delay

$$\mathrm{End \ to \ End \ Delay}=\mathrm{End \ Time}-\mathrm{Start \ Time}*100$$
(32)

From Eq. 32, a mechanism is to consider mobility variation/ skew indicating the lower mobility over the network with the higher nodes, which examines against the accuracy, quality, and node lifetime. This graph Contributes to reducing the End to End Delay by presenting the Swift Implicit Response Round Trip Time (SIRT) framework. This was improving the efficiency of assigning sources in the routing process. Here we have used 100 samplings to discover the number of packets to be delivered. Also, this research implemented Hybrid Random Late Detection (HRLD) approach in a MANET environment and evaluated it by some well-known attackers [75].

Figure 27 demonstrates the simulation result of End to End Delay (ms)Inference for Existing ESCT—Cai et al. [12], ENM-LAC—Liu et al. [53], and ZRDM-LFPM—Khudayer et al. [47] system with Proposed SIRT –ADABCP- HRLD System. The Proposed SIRT –ADABCP- HRLD system shows the End to End Delay (ms) of the Existing system has obtained high compared to the proposed system, due to attacker free contributions. The simulation result of End to End Delay (ms) for the proposed SIRT –ADABCP- HRLD System and existing schemes like ESCT—Cai et al. [12], ENM-LAC—Liu et al. [53], and ZRDM-LFPM—Khudayer et al. [47]. It shows the End to End Delay (ms) of proposed SIRT –ADABCP- HRLDhas obtained less high position End to End Delay (ms) compared to others, due to high attacker less result. The performance evaluation results of SIRT –ADABCP- HRLDwith existing methods in terms of low End to End Delay (ms) of 49.8361% compared to existing methods.

4.2 Communication Overhead

Figure 28 establishes communicating overhead is minimized in which source forward packet to an intermediate node, proposed SIRT–ADABCP-HRLD System provides secure and attacker free route path. In the proposed method communication overhead is minimized compared to Existing ESCT, ENM-LAC, and ZRDM-LFPM Methods

Fig. 28
figure 28

Graph for communication overhead

$$Communication\;overhead\;\left(Number\;of\;Packet\;Losses/Received\right)\ast100$$
(33)

From Eq. 33, the Swift Implicit Response Round Trip Time is to consider Pause Time indicating the higher pass time over the network with the exact route on the MANET environment, which examines against the overhead and node lifetime. The above graph is used to reduce the Communication Overhead by presenting the Swift Implicit Response Round Trip Time (SIRT) framework. This was improving the efficiency of assigning sources in the routing process. Here we have used 100 samplings to discover the number of packets to be delivered. Also, this research implemented Hybrid Random Late Detection (HRLD) approach in the MANET environment and evaluated it by some well-known attackers. To establishes the result of Communication Overhead Inference for Existing ESCT, ENM-LAC, and ZRDM-LFPM system with Proposed SIRT–ADABCP-HRLD System. The Proposed SIRT–ADABCP-HRLD System shows the Communication Overhead of the Existing system has obtained high compared to the proposed system, due to the efficient route between nodes.

Figure 28 shows the simulation result of Communication Overhead for the proposed SIRT –ADABCP- HRLD System and existing schemes. It shows the Communication Overhead of proposed SIRT –ADABCP- HRLD has obtained low Communication Overhead compared to others, due to high attacker less result. The performance evaluation results of SIRT –ADABCP- HRLD with existing methods in terms of low Communication Overhead of 81.4462% decrease compared to existing methods.

4.3 Packet Delivery Ratio (PDR)

Figure 29 demonstrates the Packet delivery ratio is assessed by a packet received quantity from a packet sent count especially distinguished from other node region rates. Node speed is a constant in MANET; the simulation rate is fixed at 150 ms. In the proposed method Packet delivery ratio is enhanced compared to the existing ESCT, ENM-LAC, and ZRDM-LFPM methods.

Fig. 29
figure 29

Graph for Packet Delivery ratio

$$Packet\;Delivery\;Ratio=\left(Number\;of\;packet\;received/Sent\right)\ast speed$$
(34)

From Eq. 34, the SIRT is to consider the number of nodes indicating the higher delivery ratio over the network with the exact route on the MANET environment, which examines the Packet Delivery ratio and node count. The above graph is shown to reduce the Packet Delivery ratio by presenting the Swift Implicit Response Round Trip Time (SIRT) framework. This was improving the efficiency of assigning sources in the routing process. Here we have a test with the 50 samplings to discover the number of packets to be delivered per minute. The result of Packet Delivery Ratio Inference for Existing ESCT, ENM-LAC, and ZRDM-LFPM system with Proposed SIRT–ADABCP-HRLD System. The Proposed SIRT–ADABCP-HRLD System shows the Packet Delivery ratio of the Existing system has obtained high compared to the proposed system, due to efficient packets delivery source and destination nodes. Figure 29 shows the simulation result of the Packet Delivery ratio for the proposed SIRT –ADABCP- HRLD System and existing schemes. It shows the Packet Delivery ratio of the proposed SIRT–ADABCP-HRLDhas obtained a higher quantity of packets Delivered to the destination compared to the others, due to lower attacker less result. The performance evaluation results of SIRT–ADABCP-HRLDwith existing methods in terms of a high Packet Delivery Ratio (PDR) of 42.2262% increase compared to the existing methods.

4.4 Network Lifetime

This has been calculated by processing time for normal nodes to become dead nodes. i.e., the time taken to energy supply by any participating nodes is referred to as the Network lifetime. Figure 30 manifests the lifetime of the network is estimated by the total process of the proposed system network, effort employed to done communication successfully. In the proposed method network lifetime is enhanced compared to the existing method. For this consideration, each packet relaying node is inspected by the data packet transition. In this era, the network lifetime is balanced concerning the energy spent on routing protocol communication. This proposed Attacker detection automation of the Bees Colony Optimization (ADABCP) protocol is measured using the Network Lifetime. All the participants' nodes do not act in the routing stage at the same time. Some nodes acted as sleep nodes, some of the dead nodes, and most of the nodes are in the alive node.

Fig. 30
figure 30

Graph for network lifetime above Fig. 31 Clarifies by giving a value of the speed of packets delivered vs energy consumption per bit during the one relay (from 1 to100 nodes). This speed of the nodes will declare the lifetime of the network at total energy saving in one packet delivered to the destination

In these three stages, the nodes have preserved the energy to increase the node sensing capability. If one node becomes the dead node, instead of this another node will take the responsibility to transmit the packets to the destination. Rapidly this process happens in the data transmission to improve the network lifetime for the whole network; this postpones energy reduction and is much more useful to continuous packet delivery by the uninterrupted life of the network [76]. The proposed techniques to step-up network lifetime by node energy and routing process. Better network lifetimes are achieved on the target node by the Hybrid Random Late Detection (HRLD). HRLD protocol that is becomes integrated with the node selection process and route optimization process to improve the network lifetime active routing stage. The network lifetime of the suggested protocols is expressed in Fig. 30.

$$Network\;Lifetime=length\;of\;energy\;usage/overall\;energy$$
(35)

From Eq. 35, the packet delivery time is significantly higher for any two selected transmissions. The proposed SIRT–ADABCP-HRLD though packet delivered rate is compared to ESCT, ENM-LAC, and ZRDM-LFPM. The data transmission improves packet delivered by 56.9775%, more as compared to ESCT, ENM-LAC, and ZRDM-LFPM.

4.5 Energy Consumption

Figure 31 establishes energy consumption to evaluate the total energy used for the sender to the receiver node. The proposed method has a high routing delay and is used for packet transmission so energy consumption is minimized compared to the Existing method. In mobile ad hoc networks, the participants' nodes are processed in the data transfer between the nodes by confirming the source and destination availability [21]. After that, route searching, path routing, and data transfer are usually considered. These are happened by spending the node's energy. This energy consumption was considered for data transfer alone, but some energy values are negligible on the RREQ and RRES during the routing process.

Fig. 31
figure 31

Graph for energy consumption

$$Energy\;Consumption=Initial\;Energy-Final\;Energy$$
(36)

From Eq. 36, the proposed SIRT –ADABCP- HRLD, time to live and energy can be calculated on the time of data transfer. Consider the n nodes that have participated in the proposed MANET. Based on the proposed algorithm, the routing chooses the simplest route between nodes, and its energy consumption is very low compared to all existing simulations. In this Fig. 31 nodes have participated, and 1000 request transactions were done. 100 packets/nodes are request transactions before the data transmission. From this consideration, firstly energy consumption for routing with different routing parameters varies from 145 J/Sec to 190 J/Sec on the proposed system. What is 36.31% less value compared to the existing ESCT, ENM-LAC, and ZRDM-LFPM. All 100 nodes are taking 1400 J/Sec to execute all transactions within the stipulated time interval.

If the participant nodes are increased, the energy consumption was consuming higher compare to the ZRDM-LFPM. This has higher energy consumption also reduced in the proposed SIRT –ADABCP- HRLD. SIRT –ADABCP- HRLD consumes lower energy because nodes are continuously attention to the attentiveness of the MANET participants. For this reason, the energy consumption rate avoided still the number of nodes is increased. Finally, the proposed model without error rate, 38.63% times saves the energy than normal existing routing process.

5 Conclusion

In MANET routing, the packets' interaction and data transmission were efficiently discussed concerning the MANET routing. This research involves managing the packets and routes between the source to the destination to maintain the route interaction process. The pursued effective data transaction over the MANET Network always improves the route and reduces the attacker by the proposed (SIRT-ADABCP-HRLD) mechanism. However, the proposed MANET environment is uncompromised for route interaction against security threads. In this research article, the proposed four processing schema are preserved the security measures against routing protocols such as node communication, and data transmission. Productively, Attacker detection automation of the Bees Colony Optimization (ADABCP) Method is worked against attacker detection on the routing process. Furthermore, the proposed Hybrid Random Late Detection (HRLD) routing protocol manages the MANET routing and also overcomes the congestion communication on MANET. Although the Swift Implicit Response Round Trip Time (SIRT) Mechanism helps to find the optimal routing securely and intelligently. The proposed result was compared against existing ESCT, ZRDM-LFPM, and ENM-LAC approaches. As a result, the proposed illustration (SIRT-ADABCP-HRLD) is to be improved by routing and data transmission. In comparison, the proposed method achieves a better ratio for the end-to-end Delay, communication overhead, packet delivery ratio, network lifetime, and energy consumption. the performance evaluation results of SIRT–ADABCP-HRLD with existing methods in terms of low End to End Delay (ms) of 49.8361% compared to existing methods ESCT, ENM-LAC, and ZRDM-LFPM. In terms of low Communication Overhead of 81.4462% decrease compared to existing methods. Although improves packet delivered by 56.9775%, more as compared to ESCT, ENM-LAC, and ZRDM-LFPM. The energy consumption decreased by 36.31% less value compared to the existing process. the energy consumption rate is avoided still the number of nodes is increased. Finally, the proposed model without error rate, 38.63% times saves the energy than normal existing routing process. In the future scope, this research applied to the intrusion detection system and IoT-based suspect detection system to find the Susceptible object and cyber attackers over the internet black chain technology.