Skip to main content
Top
Published in: Cluster Computing 4/2019

06-02-2018

A generalized framework for disruption tolerant secure opportunistic routing during emergency situations using MANETs

Authors: K. Pushpalatha, M. Karthikeyan

Published in: Cluster Computing | Special Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile ad-hoc networks (MANETs) play a constitutive role in the field of telecommunication. It enables communication between moving nodes by using auto-node configuration and multi hop wireless routing strategies. During disasters, the existing telecommunication structure is either completely destroyed or partially collapsed. Thus, it is very difficult to perform data communications during that period and also it takes more time to restore it to its original structure. The purpose of this research paper is to ensure reliable and secured communication using opportunistic routing between mobile nodes during such emergency situations. The existing methods of the disaster routing protocols do not guarantee reliable delivery of data in a secured manner and it assumes that the nodes are configured with a unique IP address before participating in the communication. This paper presents a novel framework disruption tolerant secure opportunistic routing (DTSOR) method that ensures secure communication between high mobility nodes. Cluster based address auto configuration mechanism and trace analysis are preferred methods used to select the optimal path for forwarding the packets. Selected path further ensures security using puzzle based data anonymization method. Performance analysis and simulation results shows that proposed framework outperforms the state of the art approaches in terms of the packet delivery ratio, network overhead and throughput.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Tyagi, A.S.S.: Study of MANET: characteristics, challenges, application and security attacks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 252–257 (2013) Tyagi, A.S.S.: Study of MANET: characteristics, challenges, application and security attacks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 252–257 (2013)
2.
go back to reference Onwuka, E., Folaponmile, A., Ahmed, M.: MANET : a reliable network in disaster areas. JORIND 9(2), 105–113 (2011). ISSN 1596 – 8308 Onwuka, E., Folaponmile, A., Ahmed, M.: MANET : a reliable network in disaster areas. JORIND 9(2), 105–113 (2011). ISSN 1596 – 8308
3.
go back to reference Droms, R.: Dynamic host configuration protocol in internet engineering task force (IETF), RFC 2131, March 1997 Droms, R.: Dynamic host configuration protocol in internet engineering task force (IETF), RFC 2131, March 1997
5.
go back to reference Zhou, H., Ni, L.M., Mutka, M.W.: Prophet address allocation for large scale MANETs. Ad Hoc Netw. J. 1(4), 423–434 (2003)CrossRef Zhou, H., Ni, L.M., Mutka, M.W.: Prophet address allocation for large scale MANETs. Ad Hoc Netw. J. 1(4), 423–434 (2003)CrossRef
6.
go back to reference Nesargi, S., Prakash, R.: MANETconf: configuration of hosts in a mobile ad hoc network, In: Proceedings of the 21st Annual Joint Conference of IEEE Computer and Communication Societies (INFOCOM 2002), New York, NY, June 2002 Nesargi, S., Prakash, R.: MANETconf: configuration of hosts in a mobile ad hoc network, In: Proceedings of the 21st Annual Joint Conference of IEEE Computer and Communication Societies (INFOCOM 2002), New York, NY, June 2002
7.
go back to reference Perkins, C., Malinen, J., Wakikawa, R., Belding-Royer, E.M., Sun, Y.: IP address autoconfiguration for ad hoc networks, draft-ietf-manet-autoconf-01.txt, November 2001 Perkins, C., Malinen, J., Wakikawa, R., Belding-Royer, E.M., Sun, Y.: IP address autoconfiguration for ad hoc networks, draft-ietf-manet-autoconf-01.txt, November 2001
8.
go back to reference Cunha, D.O., Duarte, O.C.M.B., Pujolle, G.: A cooperationaware routing scheme for fast varying fading wireless channels. IEEE Commun. Lett. 12(10), 794–796 (2008)CrossRef Cunha, D.O., Duarte, O.C.M.B., Pujolle, G.: A cooperationaware routing scheme for fast varying fading wireless channels. IEEE Commun. Lett. 12(10), 794–796 (2008)CrossRef
9.
go back to reference Fernandes, N.C., Moreira, M.D., Duarte, O.C.M.B.: A self-organized mechanism for thwarting malicious access in ad hoc networks, In: Proceedings of the 29th IEEE INFOCOM Miniconf., San Diego, CA, pp. 1–5 April 2010 Fernandes, N.C., Moreira, M.D., Duarte, O.C.M.B.: A self-organized mechanism for thwarting malicious access in ad hoc networks, In: Proceedings of the 29th IEEE INFOCOM Miniconf., San Diego, CA, pp. 1–5 April 2010
10.
go back to reference Jiang, J., Han, G., Wang, F., Shu, L., Guizani, M.: An efficient distributed trust model for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(5), 1228–1237 (2015)CrossRef Jiang, J., Han, G., Wang, F., Shu, L., Guizani, M.: An efficient distributed trust model for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(5), 1228–1237 (2015)CrossRef
11.
go back to reference Feng, R., Xu, X., Zhou, X., Wan, J.: A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory. Sensors 11, 1345–1360 (2011)CrossRef Feng, R., Xu, X., Zhou, X., Wan, J.: A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory. Sensors 11, 1345–1360 (2011)CrossRef
12.
go back to reference Rivest, R., Shamir, A., Wagner, D.: Time-Lock Puzzles and Timed-Release Crypto, technical report. Massachusetts Institute of Technology (1996) Rivest, R., Shamir, A., Wagner, D.: Time-Lock Puzzles and Timed-Release Crypto, technical report. Massachusetts Institute of Technology (1996)
14.
go back to reference Perkins, C., Royer, E., Elizabeth, M.: Ad hoc on demand distance vector routing protocol Perkins, C., Royer, E., Elizabeth, M.: Ad hoc on demand distance vector routing protocol
16.
go back to reference Park, V., Corson, S.: Temporally-ordered routing algorithm (TORA) functional specification. IETF, (2001) Park, V., Corson, S.: Temporally-ordered routing algorithm (TORA) functional specification. IETF, (2001)
17.
go back to reference Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR). IETF (2003) Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR). IETF (2003)
18.
go back to reference Perkins, C.E., Bhagwat, P.: DSDV Routing Over a Multihop Wireless Network of Mobile Computers. Addison-Wesley Longman Publishing Co, Chicago (2001) Perkins, C.E., Bhagwat, P.: DSDV Routing Over a Multihop Wireless Network of Mobile Computers. Addison-Wesley Longman Publishing Co, Chicago (2001)
19.
go back to reference Boukerche, A., Darehshoorzadeh, A.: Opportunistic routing in wireless networks: models, algorithms, and classifications. ACM Comput. Surv. (CSUR) 47(2), 22 (2014)CrossRef Boukerche, A., Darehshoorzadeh, A.: Opportunistic routing in wireless networks: models, algorithms, and classifications. ACM Comput. Surv. (CSUR) 47(2), 22 (2014)CrossRef
20.
go back to reference Vaidya, N.H.: Weak duplicate address detection in mobile Ad-hoc networks. In: Proceedings of the MOBIHOC’02, Lausanne, Switzerland, pp. 206–216 (2002) Vaidya, N.H.: Weak duplicate address detection in mobile Ad-hoc networks. In: Proceedings of the MOBIHOC’02, Lausanne, Switzerland, pp. 206–216 (2002)
21.
go back to reference Ros, F., Ruiz, P., Perkins, C.E.: Extensible MANET auto-configuration protocol (EMAP), Internet Draft, March 2006. Accessed 25 Nov 2010 Ros, F., Ruiz, P., Perkins, C.E.: Extensible MANET auto-configuration protocol (EMAP), Internet Draft, March 2006. Accessed 25 Nov 2010
22.
go back to reference Yousef, A., Al-Mahdi, H., Kalil, M.A., Mitschele-Thiel, A.: LHA: logical hierarchical addressing protocol for mobile Ad hoc networks. In: Proceedings of the PM2HW2 N ’07, Crete Island, Greece, pp. 96–99 October 2007 Yousef, A., Al-Mahdi, H., Kalil, M.A., Mitschele-Thiel, A.: LHA: logical hierarchical addressing protocol for mobile Ad hoc networks. In: Proceedings of the PM2HW2 N ’07, Crete Island, Greece, pp. 96–99 October 2007
23.
go back to reference Weniger, K.: PACMAN: passive auto configuration for mobile Ad hoc networks. IEEE J. Sel. Area Commun. 23(3), 507–519 (2005)CrossRef Weniger, K.: PACMAN: passive auto configuration for mobile Ad hoc networks. IEEE J. Sel. Area Commun. 23(3), 507–519 (2005)CrossRef
24.
go back to reference Ghosh, U., Datta, R.: A secure addressing scheme for large scale managed MANETs. IEEE Trans. Netw. Serv. Manag. 12(3), 483–495 (2015)CrossRef Ghosh, U., Datta, R.: A secure addressing scheme for large scale managed MANETs. IEEE Trans. Netw. Serv. Manag. 12(3), 483–495 (2015)CrossRef
25.
go back to reference Rohit, R., Singh, D.: A study of various address allocation schemes for mobile Ad Hoc networks. Int. J. Emerg. Trends Technol. 3(1), 100–115 (2014) Rohit, R., Singh, D.: A study of various address allocation schemes for mobile Ad Hoc networks. Int. J. Emerg. Trends Technol. 3(1), 100–115 (2014)
26.
go back to reference Cavalli, A., Orset, J.: Secure hosts auto-configuration in mobile ad hoc networks. Ad Hoc Netw. 3(5), 656–667 (2005)CrossRef Cavalli, A., Orset, J.: Secure hosts auto-configuration in mobile ad hoc networks. Ad Hoc Netw. 3(5), 656–667 (2005)CrossRef
28.
go back to reference Proaño, A., Lazos, L.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secure Comput. 9(1), 101–114 (2012)CrossRef Proaño, A., Lazos, L.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secure Comput. 9(1), 101–114 (2012)CrossRef
29.
go back to reference Juels, A., Brainard, J.: Client puzzles: a cryptographic countermeasure against connection depletion attacks. In: Proceedings of the Network and Distributed System Security Symposiyum (NDSS), pp. 151–165 (1999) Juels, A., Brainard, J.: Client puzzles: a cryptographic countermeasure against connection depletion attacks. In: Proceedings of the Network and Distributed System Security Symposiyum (NDSS), pp. 151–165 (1999)
Metadata
Title
A generalized framework for disruption tolerant secure opportunistic routing during emergency situations using MANETs
Authors
K. Pushpalatha
M. Karthikeyan
Publication date
06-02-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 4/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1849-0

Other articles of this Special Issue 4/2019

Cluster Computing 4/2019 Go to the issue

Premium Partner