Skip to main content
Erschienen in: Wireless Networks 4/2017

27.01.2016

Energy efficient secured routing protocol for MANETs

verfasst von: Tejpreet Singh, Jaswinder Singh, Sandeep Sharma

Erschienen in: Wireless Networks | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The design of routing protocol with energy efficiency and security is a challenging task. To overcome this challenge, we propose energy-efficient secured routing protocol. The objective of our work is to provide a secured routing protocol, which is energy efficient. To provide security for both link and message without relying on the third party, we provide security to the protocol by choosing a secure link for routing using Secure Optimized Link State Routing Protocol. Each node chooses multipoint relay nodes amongst the set of one-hop neighbors, so as to reach all two-hop neighbors. The access control entity authorizes nodes announcing the node identification to the network. In addition, the access control entity signs a public key Ki, a private key ki, and the certificate Ci required by an authorized node to obtain the group key. Each node maintains a route table with power status as one of its entry. After selecting the link, on requirement of a new route, we check nodes’ power status in its routing table and then accordingly arise a route. Then, we perform group key distribution using the generated keys using a small number of messages which helps reducing energy consumption. The group key can be altered periodically to avoid nonauthorized nodes and to avoid the use of the same group key in more than some amount of data. Then, we provide communication privacy for both message sender and message recipient using Secure Source Anonymous Message Authentication Scheme. Thereby, the message sender or the sending node generates a source anonymous message authentication for message for releasing each message based on the MES scheme. Hence, our approach will provide message content authenticity without relying on any trusted third parties.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Taneja, S., & Kush, A. (2012). Energy efficient, secure and stable routing protocol for MANET. Global Journal of Computer Science and Technology, Network Web and Security, 12(10), Version 1.0 May 2012 Taneja, S., & Kush, A. (2012). Energy efficient, secure and stable routing protocol for MANET. Global Journal of Computer Science and Technology, Network Web and Security, 12(10), Version 1.0 May 2012
2.
Zurück zum Zitat Kong, J., Hong, X., Yi, Y., Sang Park, J., Liu, J., & Gerla, M. (2005) A secure ad hoc routing approach using localized self-healing communities. In Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing, pp. 254–265 Kong, J., Hong, X., Yi, Y., Sang Park, J., Liu, J., & Gerla, M. (2005) A secure ad hoc routing approach using localized self-healing communities. In Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing, pp. 254–265
3.
Zurück zum Zitat Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.CrossRef Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.CrossRef
4.
Zurück zum Zitat Attar, A., et al. (2012). A survey of security challenges in cognitive radio networks: solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef Attar, A., et al. (2012). A survey of security challenges in cognitive radio networks: solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef
5.
Zurück zum Zitat Li, P., et al. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. INFOCOM 2012, pp. 100–108 Li, P., et al. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. INFOCOM 2012, pp. 100–108
6.
Zurück zum Zitat Li, P., et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.CrossRef Li, P., et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.CrossRef
7.
Zurück zum Zitat Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.CrossRef Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.CrossRef
8.
Zurück zum Zitat Busch, C., et al. (2012). Approximating congestion + dilation in networks via “quality of routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.MathSciNetCrossRef Busch, C., et al. (2012). Approximating congestion + dilation in networks via “quality of routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.MathSciNetCrossRef
9.
Zurück zum Zitat Yen, Y.-S., et al. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.CrossRef Yen, Y.-S., et al. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.CrossRef
11.
Zurück zum Zitat Mazhar, N. (2010). Energy efficient security in MANETs: A comparison of cryptographic and artificial immune systems. Pakistan Journal of Engineering and Applied Sciences, 7, 71–94. Mazhar, N. (2010). Energy efficient security in MANETs: A comparison of cryptographic and artificial immune systems. Pakistan Journal of Engineering and Applied Sciences, 7, 71–94.
12.
Zurück zum Zitat Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs ACM SIGCOMM. Computer Communication Review, 41(4), 405–406. Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs ACM SIGCOMM. Computer Communication Review, 41(4), 405–406.
13.
Zurück zum Zitat Zhang, X. M., et al. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.CrossRef Zhang, X. M., et al. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.CrossRef
14.
Zurück zum Zitat Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press. Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.
15.
Zurück zum Zitat Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef
16.
Zurück zum Zitat Yao, G., et al. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.MathSciNetCrossRef Yao, G., et al. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.MathSciNetCrossRef
17.
Zurück zum Zitat Yan, Z., et al. (2014). A survey on trust management for Internet of Things. J. Network and Computer Applications, 42, 120–134.CrossRef Yan, Z., et al. (2014). A survey on trust management for Internet of Things. J. Network and Computer Applications, 42, 120–134.CrossRef
18.
Zurück zum Zitat Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
19.
Zurück zum Zitat Liu, B., et al. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.CrossRef Liu, B., et al. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.CrossRef
20.
Zurück zum Zitat Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef
21.
Zurück zum Zitat Zhou, J., et al. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef Zhou, J., et al. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef
22.
Zurück zum Zitat Wei, L., et al. (2010). SecCloud: Bridging secure storage and computation in cloud. ICDCS Workshops 2010, pp. 52–61 Wei, L., et al. (2010). SecCloud: Bridging secure storage and computation in cloud. ICDCS Workshops 2010, pp. 52–61
23.
Zurück zum Zitat Fadlullah, Z. M., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.CrossRef Fadlullah, Z. M., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.CrossRef
24.
Zurück zum Zitat Wang, T., et al. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.CrossRef Wang, T., et al. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.CrossRef
25.
Zurück zum Zitat He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef
26.
Zurück zum Zitat Zhou, J., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.CrossRef Zhou, J., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.CrossRef
27.
Zurück zum Zitat Yan, Z., et al. A security and trust framework for virtualized networks and software-defined networking security and communication networks Yan, Z., et al. A security and trust framework for virtualized networks and software-defined networking security and communication networks
28.
Zurück zum Zitat Zhou, L., et al. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.CrossRef Zhou, L., et al. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.CrossRef
29.
Zurück zum Zitat Zhou, L., et al. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.CrossRef Zhou, L., et al. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.CrossRef
30.
Zurück zum Zitat Yang, M., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. MONET, 20(1), 4–18.MathSciNet Yang, M., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. MONET, 20(1), 4–18.MathSciNet
31.
Zurück zum Zitat Abbas, A. M., & Kure, Ø. (2008). Quality of service in mobile ad hoc networks: A survey. International Journal of Ad Hoc and Ubiquitous Computing, 6, 75–98.CrossRef Abbas, A. M., & Kure, Ø. (2008). Quality of service in mobile ad hoc networks: A survey. International Journal of Ad Hoc and Ubiquitous Computing, 6, 75–98.CrossRef
32.
Zurück zum Zitat Fernandes, N. C., & Duarte, O. C. M. B. (2008). An efficient group key management for secure routing in ad hoc networks. IEEE communications society subject matter experts for publication in the IEEE “GLOBECOM” 2008 proceedings Fernandes, N. C., & Duarte, O. C. M. B. (2008). An efficient group key management for secure routing in ad hoc networks. IEEE communications society subject matter experts for publication in the IEEE “GLOBECOM” 2008 proceedings
33.
Zurück zum Zitat Jaiswal, R., Sahu, M. C., Mishra, A., & Sharma, S. (2012) Survey of energy efficient multicast routing protocols in MANET. International Journal of Advanced Research in Computer Science and Electronics Engineering, 1(5), 14. Jaiswal, R., Sahu, M. C., Mishra, A., & Sharma, S. (2012) Survey of energy efficient multicast routing protocols in MANET. International Journal of Advanced Research in Computer Science and Electronics Engineering, 1(5), 14.
34.
Zurück zum Zitat Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.CrossRef
35.
Zurück zum Zitat Banerjee, A., Bhattacharyya, & A., Bose, D. (2012). Power and trust based secured routing approach in MANET. International Journal of Security, Privacy and Trust Management (IJSPTM), 1(3/4), 37–51. Banerjee, A., Bhattacharyya, & A., Bose, D. (2012). Power and trust based secured routing approach in MANET. International Journal of Security, Privacy and Trust Management (IJSPTM), 1(3/4), 37–51.
36.
Zurück zum Zitat Rajesh Babu, M., & Selvan, S. (2010). An energy efficient secure authenticated routing protocol for mobile adhoc networks. American Journal of Scientific Research. ISSN 1450-223X Rajesh Babu, M., & Selvan, S. (2010). An energy efficient secure authenticated routing protocol for mobile adhoc networks. American Journal of Scientific Research. ISSN 1450-223X
37.
Zurück zum Zitat Ren, J., Li, Y., & Li, T. (2010). SPM: Source privacy for mobile ad hoc networks, Hindawi Publishing Corporation. EURASIP Journal on Wireless Communications and Networking, 2010, 5. doi:10.1155/2010/534712. Ren, J., Li, Y., & Li, T. (2010). SPM: Source privacy for mobile ad hoc networks, Hindawi Publishing Corporation. EURASIP Journal on Wireless Communications and Networking, 2010, 5. doi:10.​1155/​2010/​534712.
38.
Zurück zum Zitat Vemana Chary, D., Padmanabham, P., & Prabhakara Rao, B. (2012). Energy efficient routing protocol for mobile ad hoc networks using trust based security. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 605–611. Vemana Chary, D., Padmanabham, P., & Prabhakara Rao, B. (2012). Energy efficient routing protocol for mobile ad hoc networks using trust based security. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 605–611.
39.
Zurück zum Zitat Nithya, S., & Chandrasekar, P. (2012). Heuristic approach for secure energy efficient routing in mobile ad hoc network. International Journal of Modern Engineering Research, 2(1), 298–303. Nithya, S., & Chandrasekar, P. (2012). Heuristic approach for secure energy efficient routing in mobile ad hoc network. International Journal of Modern Engineering Research, 2(1), 298–303.
40.
Zurück zum Zitat Gadiparthi, M., Paladugu, R., Paladugu, S., & Vejendla, M. (2011). A fuzzy QOS key base secured MANET routing with multipath data fragmentation (FQKSMR). International Journal of Computer Technology and Applications, 2(3), 655–665. Gadiparthi, M., Paladugu, R., Paladugu, S., & Vejendla, M. (2011). A fuzzy QOS key base secured MANET routing with multipath data fragmentation (FQKSMR). International Journal of Computer Technology and Applications, 2(3), 655–665.
41.
Zurück zum Zitat Kumari, S., & Shrivastava, M. (2012). Secure DSR protocol in MANET using energy efficient intrusion detection system. International Journal of Networks and Systems, 1(1), 6–11. Kumari, S., & Shrivastava, M. (2012). Secure DSR protocol in MANET using energy efficient intrusion detection system. International Journal of Networks and Systems, 1(1), 6–11.
42.
Zurück zum Zitat Kush, A., Sharma, D., & Taneja, S. (2011). A secure and power efficient routing scheme for ad hoc networks. International Journal of Computer Applications (0975–8887), 21(6), 20–25. Kush, A., Sharma, D., & Taneja, S. (2011). A secure and power efficient routing scheme for ad hoc networks. International Journal of Computer Applications (0975–8887), 21(6), 20–25.
Metadaten
Titel
Energy efficient secured routing protocol for MANETs
verfasst von
Tejpreet Singh
Jaswinder Singh
Sandeep Sharma
Publikationsdatum
27.01.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2017
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-1176-9

Weitere Artikel der Ausgabe 4/2017

Wireless Networks 4/2017 Zur Ausgabe

Neuer Inhalt