Skip to main content
Top
Published in: Cluster Computing 5/2019

01-12-2017

Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation

Authors: G. Venkata Swaroop, G. Murugaboopathi

Published in: Cluster Computing | Special Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile ad hoc networks (MANETs) have received increasing attention due to their ease of deployment and mobility. However, MANETs are more suspicious to various malicious activates and unauthorized access. In order to overcome this issue, we have proposed a cluster based certificate revocation method to isolate the malicious node and prevent the unauthorized access. The proposed algorithm effectively used to solve security issues in MANET. The proposed framework is demonstrated as following blocks, namely, cluster construction, cluster head selection, certificate authority, node classification, certificate revocation and evaluation of false accusations. Especially, we have proposed ECMS algorithm for identifying the best cluster head in each cluster. The ECMS algorithm is stands for energy (E), connectivity (C), mobility (M) and signal to noise ratio (S). The sensor nodes present in the network are classified into three types, namely, normal node, warned node, and revoked node. In certificate revocation procedure, every node present in the network is monitored with the help of one-hop neighbours. These neighbours are also used to collect the malicious information about the sensor nodes. If any node is wrongly identified as a malicious node then its legitimate nodes send the vindication packets (VPs) to the appropriate gateways to correct the mistake. The performance of the proposed cluster based certificate revocation method is evaluated on the basis of various parameters it includes successful certification ratio (SSR), settling time (ST), average certification delay (ACD), packet delivery ratio, normalized overhead (NRO), end-to-end delay and throughput. The simulation results of the proposed algorithm are compared with the trust based algorithm, non-voting based algorithm and voting based algorithm. The experimental results proved the good performance of the proposed cluster based certificate revocation method.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Giridhar, R., Suresh, S.: Cluster based certificate authority scheme in WSN. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 367–371. IEEE (2016) Giridhar, R., Suresh, S.: Cluster based certificate authority scheme in WSN. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 367–371. IEEE (2016)
2.
go back to reference Patil, B., Biradar, S.R.: Cluster based authentication scheme for wireless multimedia sensor networks. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, p. 99. ACM (2016) Patil, B., Biradar, S.R.: Cluster based authentication scheme for wireless multimedia sensor networks. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, p. 99. ACM (2016)
3.
go back to reference Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks. Comput. Stand. Interfaces 36(3), 513–523 (2014)CrossRef Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks. Comput. Stand. Interfaces 36(3), 513–523 (2014)CrossRef
4.
go back to reference Venkata Swaroop, G., Murugaboopathi, G., Kalaiselvan, S.A.: TAEACK: a time adaptive enhanced ACK mechanism for detecting and preventing sink-hole attacks in MANET. Aust. J. Basic Appl. Sci. 9(27), 291–299 (2015) Venkata Swaroop, G., Murugaboopathi, G., Kalaiselvan, S.A.: TAEACK: a time adaptive enhanced ACK mechanism for detecting and preventing sink-hole attacks in MANET. Aust. J. Basic Appl. Sci. 9(27), 291–299 (2015)
5.
go back to reference Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wirel. Commun. 13(5), 8–15 (2006)CrossRef Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wirel. Commun. 13(5), 8–15 (2006)CrossRef
6.
go back to reference Rabieh, K., Mahmoud, M., Tonyali, S.: Scalable certificate revocation schemes for smart grid ami networks using bloom filters. IEEE Trans. Dependable Secure Comput. 14(4), 420–432 (2017)CrossRef Rabieh, K., Mahmoud, M., Tonyali, S.: Scalable certificate revocation schemes for smart grid ami networks using bloom filters. IEEE Trans. Dependable Secure Comput. 14(4), 420–432 (2017)CrossRef
7.
go back to reference Azer, M.A., El-Kassas, S.M., El-Soudani, M.S.: Certification and revocation schemes in ad hoc networks survey and challenges. In: ICSNC 2007, Second International Conference on Systems and Networks Communications, pp. 17–17. IEEE (2007) Azer, M.A., El-Kassas, S.M., El-Soudani, M.S.: Certification and revocation schemes in ad hoc networks survey and challenges. In: ICSNC 2007, Second International Conference on Systems and Networks Communications, pp. 17–17. IEEE (2007)
8.
go back to reference Thein, M.C.M., Thein, T.: An energy efficient cluster-head selection for wireless sensor networks. In: 2010 International Conference on Intelligent systems, modelling and simulation (ISMS), pp. 287–291. IEEE (2010) Thein, M.C.M., Thein, T.: An energy efficient cluster-head selection for wireless sensor networks. In: 2010 International Conference on Intelligent systems, modelling and simulation (ISMS), pp. 287–291. IEEE (2010)
10.
12.
go back to reference Rabieh, K., Mahmoud, M.M., Akkaya, K., Tonyali, S.: Scalable certificate revocation schemes for smart grid ami networks using bloom filters. IEEE Trans. Dependable Secure Comput. 14(4), 420–432 (2017)CrossRef Rabieh, K., Mahmoud, M.M., Akkaya, K., Tonyali, S.: Scalable certificate revocation schemes for smart grid ami networks using bloom filters. IEEE Trans. Dependable Secure Comput. 14(4), 420–432 (2017)CrossRef
13.
go back to reference Khan, T., Ahmad, N., Cao, Y., Jalal, S.A., Asif, M., ul Haq, S., Cruichshank, H.: Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey. Sci. China Inf. Sci. 60(10), 100301 (2017)CrossRef Khan, T., Ahmad, N., Cao, Y., Jalal, S.A., Asif, M., ul Haq, S., Cruichshank, H.: Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey. Sci. China Inf. Sci. 60(10), 100301 (2017)CrossRef
14.
go back to reference Raja, J.B., Pandian, S.C., Pamina, J.: Certificate revocation mechanism in mobile ADHOC grid architecture. Int. J. Comput. Sci. Trends Technol. 5, 125–130 (2017) Raja, J.B., Pandian, S.C., Pamina, J.: Certificate revocation mechanism in mobile ADHOC grid architecture. Int. J. Comput. Sci. Trends Technol. 5, 125–130 (2017)
15.
go back to reference Singh, B., Lobiyal, D.K.: A novel energy-aware cluster head selection based on particle swarm optimization for wireless sensor networks. Hum.-Centric Comput. Inf. Sci. 2(1), 13 (2012)CrossRef Singh, B., Lobiyal, D.K.: A novel energy-aware cluster head selection based on particle swarm optimization for wireless sensor networks. Hum.-Centric Comput. Inf. Sci. 2(1), 13 (2012)CrossRef
16.
go back to reference Kang, S.H., Nguyen, T.: Distance based thresholds for cluster head selection in wireless sensor networks. IEEE Commun. Lett. 16(9), 1396–1399 (2012)CrossRef Kang, S.H., Nguyen, T.: Distance based thresholds for cluster head selection in wireless sensor networks. IEEE Commun. Lett. 16(9), 1396–1399 (2012)CrossRef
17.
go back to reference Liu, W., Nishiyama, H., Ansari, N., Yang, J., Kato, N.: Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 24(2), 239–249 (2013)CrossRef Liu, W., Nishiyama, H., Ansari, N., Yang, J., Kato, N.: Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 24(2), 239–249 (2013)CrossRef
18.
go back to reference Rachedi, A., Benslimane, A.: A secure architecture for mobile ad hoc networks. In: International Conference on Mobile Ad-Hoc and Sensor Networks, pp. 424–435. Springer, Berlin (2006) Rachedi, A., Benslimane, A.: A secure architecture for mobile ad hoc networks. In: International Conference on Mobile Ad-Hoc and Sensor Networks, pp. 424–435. Springer, Berlin (2006)
19.
go back to reference Gomathi, K., Parvathavarthini, B.: An efficient cluster based key management scheme for MANET with authentication. In: Trendz in Information Sciences & Computing (TISC), pp. 202–205. IEEE (2010) Gomathi, K., Parvathavarthini, B.: An efficient cluster based key management scheme for MANET with authentication. In: Trendz in Information Sciences & Computing (TISC), pp. 202–205. IEEE (2010)
20.
go back to reference Abusalah, A., Khokhar, A., Guizani, A.: A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutor. 10(4), 78–93 (2008)CrossRef Abusalah, A., Khokhar, A., Guizani, A.: A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutor. 10(4), 78–93 (2008)CrossRef
22.
go back to reference Christopher, D.J.P.: Cluster-based certificate revocation for mobile ad hoc networks Christopher, D.J.P.: Cluster-based certificate revocation for mobile ad hoc networks
23.
go back to reference Jose, J., Sasi, S.B.: Certificate revocation in MANET using clustering. In: IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1–3. IEEE (2015) Jose, J., Sasi, S.B.: Certificate revocation in MANET using clustering. In: IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1–3. IEEE (2015)
24.
go back to reference Jarang, M.R., Nimbalkar, M.V.: Implementation of cluster based certificate revocation in mobile ad hoc networks. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 610–615. IEEE (2015) Jarang, M.R., Nimbalkar, M.V.: Implementation of cluster based certificate revocation in mobile ad hoc networks. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 610–615. IEEE (2015)
25.
go back to reference Maraiya, K., Kant, K., Gupta, N.: Efficient cluster head selection scheme for data aggregation in wireless sensor network. Int. J. Comput. Appl. 23(9), 10–18 (2011) Maraiya, K., Kant, K., Gupta, N.: Efficient cluster head selection scheme for data aggregation in wireless sensor network. Int. J. Comput. Appl. 23(9), 10–18 (2011)
26.
go back to reference Park, K., Nishiyama, H., Ansari, N., Kato, N.: Certificate revocation to cope with false accusations in mobile ad hoc networks. In: IEEE 71st, Vehicular Technology Conference (VTC 2010-Spring), pp. 1–5. IEEE (2010) Park, K., Nishiyama, H., Ansari, N., Kato, N.: Certificate revocation to cope with false accusations in mobile ad hoc networks. In: IEEE 71st, Vehicular Technology Conference (VTC 2010-Spring), pp. 1–5. IEEE (2010)
27.
go back to reference Rivas, D.A., Barceló-Ordinas, J.M., Zapata, M.G., Morillo-Pozo, J.D.: Security on VANETs: privacy, misbehaving nodes, false information and secure data aggregation. J. Netw. Comput. Appl. 34(6), 1942–1955 (2011)CrossRef Rivas, D.A., Barceló-Ordinas, J.M., Zapata, M.G., Morillo-Pozo, J.D.: Security on VANETs: privacy, misbehaving nodes, false information and secure data aggregation. J. Netw. Comput. Appl. 34(6), 1942–1955 (2011)CrossRef
28.
go back to reference Moore, T., Clulow, J., Nagaraja, S., Anderson, R.: New strategies for revocation in ad-hoc networks. In: European Workshop on Security in Ad-hoc and Sensor Networks, pp. 232–246. Springer, Berlin (2007) Moore, T., Clulow, J., Nagaraja, S., Anderson, R.: New strategies for revocation in ad-hoc networks. In: European Workshop on Security in Ad-hoc and Sensor Networks, pp. 232–246. Springer, Berlin (2007)
29.
go back to reference Chinni, S., Thomas, J., Ghinea, G., Shen, Z.: Trust model for certificate revocation in ad hoc networks. Ad Hoc Netw. 6(3), 441–457 (2008)CrossRef Chinni, S., Thomas, J., Ghinea, G., Shen, Z.: Trust model for certificate revocation in ad hoc networks. Ad Hoc Netw. 6(3), 441–457 (2008)CrossRef
Metadata
Title
Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation
Authors
G. Venkata Swaroop
G. Murugaboopathi
Publication date
01-12-2017
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 5/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1415-1

Other articles of this Special Issue 5/2019

Cluster Computing 5/2019 Go to the issue

Premium Partner