Skip to main content
Erschienen in: Wireless Personal Communications 1/2018

17.05.2018

A Trusted Waterfall Framework Based Peer to Peer Protocol for Reliable and Energy Efficient Data Transmission in MANETs

verfasst von: Usha Mohanakrishnan, Ramakrishnan Bhagavathiperumal, Sathiamoorthy Jayaraman

Erschienen in: Wireless Personal Communications | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

MANETs are wireless networks where nodes have very high mobility. Energy loss and dropping of packets are a common phenomenon in MANETs. Establishing a viable route between the source and the destination is the next big challenge in MANETs. We propose a new fuzzy dynamic cluster routing protocol (FDCRP) which incorporates a trusted waterfall framework that tries to address all of the prevalent issues concerning MANETs. Our proposed work will eliminate the need to find a new route from the source to the destination. Instead it would try to establish a route with the help of a peer group of clusters as the packet travels towards the target node. The loss of energy due to frequent clustering can be mitigated by circulating the node information to all the nodes within the communication range. This is done by using a dynamic broadcasting method to propagate the node information involving a natural technique called ant colony optimization involving fuzzy rules. This information sharing would help a MANET to form clusters dynamically even when the nodes move to a new region. The cluster head would be identified beforehand and will be nominated automatically when the new cluster is formed, thus reducing the time and energy involved in cluster oriented operations. We also incorporate a three tier filtering scheme to isolate the trusted nodes in forming a cluster, as there is a heavy possibility that the cluster nodes or even the cluster head turning malicious in the course of a transmission. The FDCRP protocol will help in improving the network performance when compared to the previous network scenario.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Commnication, 30(14/15), 2826–2841.CrossRef Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Commnication, 30(14/15), 2826–2841.CrossRef
2.
Zurück zum Zitat Tselikis, C., Mitropoulos, S., Komninos, N., & Douligeris, C. (2012). Degree-based clustering algorithms for wireless ad hoc networks under attack. IEEE Communications Letters, 16(5), 619–621.CrossRef Tselikis, C., Mitropoulos, S., Komninos, N., & Douligeris, C. (2012). Degree-based clustering algorithms for wireless ad hoc networks under attack. IEEE Communications Letters, 16(5), 619–621.CrossRef
3.
Zurück zum Zitat Zeng, Y., Cao, J., Guo, S., Yang, K., & Xie, L. (2009) SWCA: A secure weighted clustering algorithm in wireless ad hoc networks. In IEEE wireless communications and networking conference WCNC. Zeng, Y., Cao, J., Guo, S., Yang, K., & Xie, L. (2009) SWCA: A secure weighted clustering algorithm in wireless ad hoc networks. In IEEE wireless communications and networking conference WCNC.
4.
Zurück zum Zitat Nishimura, I., Nagase, T., Takehana, Y., & Yoshioka, Y. (2011). Secure clustering for building certificate management nodes in ad-hoc network. In International conference on network-based information systems, (2011) (pp. 685–689). Nishimura, I., Nagase, T., Takehana, Y., & Yoshioka, Y. (2011). Secure clustering for building certificate management nodes in ad-hoc network. In International conference on network-based information systems, (2011) (pp. 685–689).
5.
Zurück zum Zitat Rifà-Pous, H., & Herrera-Joancomartí, J. (2011). A fair and secure cluster formation process for ad hoc networks. Journal Wireless Personal Communications: An International Journal Archive, 56(3), 625.CrossRef Rifà-Pous, H., & Herrera-Joancomartí, J. (2011). A fair and secure cluster formation process for ad hoc networks. Journal Wireless Personal Communications: An International Journal Archive, 56(3), 625.CrossRef
6.
Zurück zum Zitat Sivaranjani, V., & Rajalakshmi, D. (2012). Secure cluster head election for intrusion detection in MANET. Journal of Computer Applications, 5(EICA2012-4), 10. Sivaranjani, V., & Rajalakshmi, D. (2012). Secure cluster head election for intrusion detection in MANET. Journal of Computer Applications, 5(EICA2012-4), 10.
7.
Zurück zum Zitat Bechler, M., Hof, H., Kraft, D., Pahlke, F., & Wolf, L. (2004). A cluster-based security architecture for Ad Hoc networks. In Proceedings of the 23rd annual joint conference of the IEEE computer and communications societies (INFOCOM’04) (vol. 4, pp. 2393–2403). Bechler, M., Hof, H., Kraft, D., Pahlke, F., & Wolf, L. (2004). A cluster-based security architecture for Ad Hoc networks. In Proceedings of the 23rd annual joint conference of the IEEE computer and communications societies (INFOCOM’04) (vol. 4, pp. 2393–2403).
8.
Zurück zum Zitat Adams, W. J., & Davis, N. J. (2005). Toward a decentralized trust based access control system for dynamic collaboration. In Proceedings of the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop (SMC’05) (pp. 317–324). Adams, W. J., & Davis, N. J. (2005). Toward a decentralized trust based access control system for dynamic collaboration. In Proceedings of the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop (SMC’05) (pp. 317–324).
9.
Zurück zum Zitat Boukerche, A., & Ren, Y. (2008). A security management scheme using a novel computational reputation model for wireless and mobile Ad Hoc networks. In Proceedings of the 5th ACM international symposium on performance evaluation of wireless ad-hoc, sensor, and ubiquitous networks (PE-WASUN’08) (pp. 88–95). Boukerche, A., & Ren, Y. (2008). A security management scheme using a novel computational reputation model for wireless and mobile Ad Hoc networks. In Proceedings of the 5th ACM international symposium on performance evaluation of wireless ad-hoc, sensor, and ubiquitous networks (PE-WASUN’08) (pp. 88–95).
10.
Zurück zum Zitat Li, R., Li, J., Liu, P., & Chen, H. (2007). An objective trust management framework for mobile Ad Hoc networks. In Proceedings of the IEEE 65th vehicular technology conference (VTC’07) (pp. 56– 60). Li, R., Li, J., Liu, P., & Chen, H. (2007). An objective trust management framework for mobile Ad Hoc networks. In Proceedings of the IEEE 65th vehicular technology conference (VTC’07) (pp. 56– 60).
11.
Zurück zum Zitat Theodorakopoulos, G., & Baras, J. S. (2004). Trust evaluation in adhoc networks. In Proceedings of the ACM workshop on wireless security (WiSe’04) (pp. 1–10). Theodorakopoulos, G., & Baras, J. S. (2004). Trust evaluation in adhoc networks. In Proceedings of the ACM workshop on wireless security (WiSe’04) (pp. 1–10).
12.
Zurück zum Zitat Jiang, T., & Baras, J. S. (2004). Ant-based adaptive trust evidence distribution in MANET. In Proceedings of the 24th international conference on distributed computing systems workshops (pp. 588–593). Jiang, T., & Baras, J. S. (2004). Ant-based adaptive trust evidence distribution in MANET. In Proceedings of the 24th international conference on distributed computing systems workshops (pp. 588–593).
13.
Zurück zum Zitat Yan, Z., Zhang, P., & Virtan, T. (2003). Trust evaluation based security solution in Ad Hoc networks. In Proceedings of 7th Nordic workshop on secure IT systems. Yan, Z., Zhang, P., & Virtan, T. (2003). Trust evaluation based security solution in Ad Hoc networks. In Proceedings of 7th Nordic workshop on secure IT systems.
14.
Zurück zum Zitat Pirzada, A. A., & McDonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian conference on computer science (ACSC’04) (vol. 26, pp. 47–54). Pirzada, A. A., & McDonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian conference on computer science (ACSC’04) (vol. 26, pp. 47–54).
15.
Zurück zum Zitat Ghosh, T., Pissinou, N., & Makki, K. (2004). Collaborative trust based secure routing in multihop Ad Hoc networks. In Proceedings of the 3rd international IFIP-TC6 networking conference on networking technologies, services, and protocols; performance of computer and communication networks; mobile and wireless communications of Lecture Notes in Computer Science, Athens, Greece, May 9–14, 2004 (vol. 3042, pp. 1446–1451). Ghosh, T., Pissinou, N., & Makki, K. (2004). Collaborative trust based secure routing in multihop Ad Hoc networks. In Proceedings of the 3rd international IFIP-TC6 networking conference on networking technologies, services, and protocols; performance of computer and communication networks; mobile and wireless communications of Lecture Notes in Computer Science, Athens, Greece, May 9–14, 2004 (vol. 3042, pp. 1446–1451).
16.
Zurück zum Zitat Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile Ad Hoc networks. Mobile Networks and Applications, 10(6), 985–995.CrossRef Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile Ad Hoc networks. Mobile Networks and Applications, 10(6), 985–995.CrossRef
17.
Zurück zum Zitat Milan, F., Jaramillo,J. J., & Srikant, R. (2006). Achieving cooperation in multihop wireless networks of selfish nodes. In Proceedings of the workshop on game theory for communications and networks (GameNets’06). Milan, F., Jaramillo,J. J., & Srikant, R. (2006). Achieving cooperation in multihop wireless networks of selfish nodes. In Proceedings of the workshop on game theory for communications and networks (GameNets’06).
18.
Zurück zum Zitat Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile Ad Hoc networks. Wireless Networks, 16(4), 969–984.CrossRef Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile Ad Hoc networks. Wireless Networks, 16(4), 969–984.CrossRef
19.
Zurück zum Zitat Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile Ad Hoc networks. Journal of Cluster Computing, 5(2), 193–204.CrossRef Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile Ad Hoc networks. Journal of Cluster Computing, 5(2), 193–204.CrossRef
20.
Zurück zum Zitat Chatterjee, P., Sengupta, I., & Ghosh, S. K. (2012). STACRP: a secure trusted auction oriented clustering based routing protocol for MANET. Cluster Computing, 15, 303–320.CrossRef Chatterjee, P., Sengupta, I., & Ghosh, S. K. (2012). STACRP: a secure trusted auction oriented clustering based routing protocol for MANET. Cluster Computing, 15, 303–320.CrossRef
21.
Zurück zum Zitat Sathiamoorthy, J., Ramakrishnan, B., & Usha. M. (2015). A reliable and secure data transmission in CEAACK MANETs using Distinct Dynamic Key with classified Digital Signature Cryptographic Algorithm. In IEEE international conference on computing and communications technologies (ICCCT). Sathiamoorthy, J., Ramakrishnan, B., & Usha. M. (2015). A reliable and secure data transmission in CEAACK MANETs using Distinct Dynamic Key with classified Digital Signature Cryptographic Algorithm. In IEEE international conference on computing and communications technologies (ICCCT).
22.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2016). CEAACK—a reduced acknowledgment for better data transmission for MANETs. International Journal of Computer Network and Information Security, 2, 64–71.CrossRef Sathiamoorthy, J., & Ramakrishnan, B. (2016). CEAACK—a reduced acknowledgment for better data transmission for MANETs. International Journal of Computer Network and Information Security, 2, 64–71.CrossRef
23.
Zurück zum Zitat Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144–151. Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144–151.
24.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2017). A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs. Springer Soft Computing 11 July 2017 (Online) (pp. 1–21). Sathiamoorthy, J., & Ramakrishnan, B. (2017). A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs. Springer Soft Computing 11 July 2017 (Online) (pp. 1–21).
25.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2017). A reliable data transmission in EAACK MANETs using hybrid three-tier competent fuzzy cluster algorithm. Wireless Personal Communication, 94, 1–20.CrossRef Sathiamoorthy, J., & Ramakrishnan, B. (2017). A reliable data transmission in EAACK MANETs using hybrid three-tier competent fuzzy cluster algorithm. Wireless Personal Communication, 94, 1–20.CrossRef
26.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2016). Energy and delay efficient dynamic cluster formation using improved ant colony optimization algorithm in EAACK MANETs. Wireless Personal Communication, 95, 1–122. Sathiamoorthy, J., & Ramakrishnan, B. (2016). Energy and delay efficient dynamic cluster formation using improved ant colony optimization algorithm in EAACK MANETs. Wireless Personal Communication, 95, 1–122.
27.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2015). Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK. Journal of Wireless Networks, 23, 1–15. Sathiamoorthy, J., & Ramakrishnan, B. (2015). Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK. Journal of Wireless Networks, 23, 1–15.
28.
Zurück zum Zitat Ali, H., Shahzad, W., & Khan, F. A. (2012). Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Applied Soft Computing, 12, 1913–1928.CrossRef Ali, H., Shahzad, W., & Khan, F. A. (2012). Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Applied Soft Computing, 12, 1913–1928.CrossRef
29.
Zurück zum Zitat Yadav, S., & Jain, R. (2012). Attacks in MANET. International Journal of Latest Trends in Engineering and Technology (IJLTET), 1(3), 273. Yadav, S., & Jain, R. (2012). Attacks in MANET. International Journal of Latest Trends in Engineering and Technology (IJLTET), 1(3), 273.
30.
Zurück zum Zitat Lalar, S. (2014). Security in MANET: Vulnerabilities, attacks & solutions. International Journal of Multidisciplinary and Current Research, 2, 62. Lalar, S. (2014). Security in MANET: Vulnerabilities, attacks & solutions. International Journal of Multidisciplinary and Current Research, 2, 62.
31.
Zurück zum Zitat Buchegger, S., & Boudec, J. (2002). Performance analysis of the confidant protocol cooperation of nodes fairness in dynamic ad-hoc networks. In Proceedings of international symposium on mobile ad hoc networking and computing mobihoc and 2002 (pp. 226–236). Buchegger, S., & Boudec, J. (2002). Performance analysis of the confidant protocol cooperation of nodes fairness in dynamic ad-hoc networks. In Proceedings of international symposium on mobile ad hoc networking and computing mobihoc and 2002 (pp. 226–236).
32.
Zurück zum Zitat Liu, J., & Issarny, V. (2004). Enhanced reputation mechanism for mobile ad hoc networks. In Proceedings of 2nd international conference on trust management. Liu, J., & Issarny, V. (2004). Enhanced reputation mechanism for mobile ad hoc networks. In Proceedings of 2nd international conference on trust management.
33.
Zurück zum Zitat Anderegg, L., & Eidenbenz, S. (2003). Ad hoc-VCG: A truthful and cost efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of mobile computing network, 2003 (pp. 245–259). Anderegg, L., & Eidenbenz, S. (2003). Ad hoc-VCG: A truthful and cost efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of mobile computing network, 2003 (pp. 245–259).
Metadaten
Titel
A Trusted Waterfall Framework Based Peer to Peer Protocol for Reliable and Energy Efficient Data Transmission in MANETs
verfasst von
Usha Mohanakrishnan
Ramakrishnan Bhagavathiperumal
Sathiamoorthy Jayaraman
Publikationsdatum
17.05.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5829-8

Weitere Artikel der Ausgabe 1/2018

Wireless Personal Communications 1/2018 Zur Ausgabe

Neuer Inhalt