Skip to main content
Erschienen in: Cluster Computing 4/2019

05.02.2018

Fuzzy enhanced secure multicast routing for improving authentication in MANET

verfasst von: V. Brindha, T. Karthikeyan, P. Manimegalai

Erschienen in: Cluster Computing | Sonderheft 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security is a major concern in mobile ad hoc network (MANET) that ensure packet authentication and integrity. A data transmitted from source to destination node has to be protected from the active and passive attacks. Certificate based secure routing scheme are developed precisely to ensure authentication with certificate mechanism. However, this paper uses fuzzy enhanced secure multicast routing (FSMR) scheme ensure better security in network and data. To estimate the presence of misbehaving nodes, FSMR is established based on normal and abnormal behaviors from the statistical data. Certificateless routing is used in the proposed system and it authenticates the data from the concept of key generation, signcryption and unsigncryption. Packets are routed and validated without the knowledge of certificate routing. The evaluation on proposed system proves that the proposed system has better data packet authentication with lesser energy consumption. Further, the proposed system attains better performance in terms of authenticity, data integrity, network lifetime, average delay and maximum throughput.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ganapathy, S., Jaisankar, N., Yogesh, P., Kannan, A.: An intelligent intrusion detection system using outlier detection and multiclass SVM. Int. J. Recent Trends Eng. Technol. 5, 166–169 (2011) Ganapathy, S., Jaisankar, N., Yogesh, P., Kannan, A.: An intelligent intrusion detection system using outlier detection and multiclass SVM. Int. J. Recent Trends Eng. Technol. 5, 166–169 (2011)
2.
Zurück zum Zitat Prasanna Venkatesan, T., Rajakumar, P., Pitchaikkannu, A.: An Effective intrusion detection system for MANETs. In: International Journal of Computer Applications, International Conference on Advances in Computer Engineering & Applications, pp. 29–34 (2013) Prasanna Venkatesan, T., Rajakumar, P., Pitchaikkannu, A.: An Effective intrusion detection system for MANETs. In: International Journal of Computer Applications, International Conference on Advances in Computer Engineering & Applications, pp. 29–34 (2013)
3.
Zurück zum Zitat Saini, A.: Security enhancement in AODV protocol in MANET. Int. J. Adv. Res. Sci. Softw. Eng. 5(6), 704–709 (2015) Saini, A.: Security enhancement in AODV protocol in MANET. Int. J. Adv. Res. Sci. Softw. Eng. 5(6), 704–709 (2015)
4.
Zurück zum Zitat Chahal, P., Tak, G.K.: Hybrid protocol for handling security using SBPGP. Int. J. Comput. Appl. 115(22), 40–44 (2015) Chahal, P., Tak, G.K.: Hybrid protocol for handling security using SBPGP. Int. J. Comput. Appl. 115(22), 40–44 (2015)
5.
Zurück zum Zitat Sharma, P., Pandit, S.V.: Anonymous packet format (APF) based secure and effective routing protocol in MANET. Int. J. Appl. Innov. Eng. Manag. 4(2), 146–152 (2015) Sharma, P., Pandit, S.V.: Anonymous packet format (APF) based secure and effective routing protocol in MANET. Int. J. Appl. Innov. Eng. Manag. 4(2), 146–152 (2015)
6.
Zurück zum Zitat Tornos, J.L., Salazar, J.L.: Secure trust management with source routing protocol for MANETs. Netw. Protoc. Algorithms 7(2), 42–59 (2015) Tornos, J.L., Salazar, J.L.: Secure trust management with source routing protocol for MANETs. Netw. Protoc. Algorithms 7(2), 42–59 (2015)
7.
Zurück zum Zitat Saha, H.N., Singh, R., Bhattacharyya, D.: Hardware implementation of fidelity based on demand routing protocol in MANETs. Int. J. Comput. Netw. Inf. Secur. 8, 39–48 (2015) Saha, H.N., Singh, R., Bhattacharyya, D.: Hardware implementation of fidelity based on demand routing protocol in MANETs. Int. J. Comput. Netw. Inf. Secur. 8, 39–48 (2015)
8.
Zurück zum Zitat Munjal, R., Kumar, R.: A modified approach for secure routing mechanism in MANET. Int. J. Innov. Res. Comput. Commun. Eng. 3(9), 8117–8121 (2015) Munjal, R., Kumar, R.: A modified approach for secure routing mechanism in MANET. Int. J. Innov. Res. Comput. Commun. Eng. 3(9), 8117–8121 (2015)
9.
Zurück zum Zitat Singh, D., Singh, A.: Enhanced secure trusted AODV (ESTA) protocol to mitigate blackhole attack in mobile ad hoc networks. Future Internet 7, 342–362 (2015)CrossRef Singh, D., Singh, A.: Enhanced secure trusted AODV (ESTA) protocol to mitigate blackhole attack in mobile ad hoc networks. Future Internet 7, 342–362 (2015)CrossRef
10.
Zurück zum Zitat Tyagi, K.: Anamika, : Security certified LARDAR protocol in mobile ad hoc network. Int. J. Comput. Sci. Trends Technol. 3(3), 18–23 (2015) Tyagi, K.: Anamika, : Security certified LARDAR protocol in mobile ad hoc network. Int. J. Comput. Sci. Trends Technol. 3(3), 18–23 (2015)
11.
Zurück zum Zitat Babu, K.S., Sathvik, C.: Enhancement of MANET security using cross-layer technology. Int. J. Adv. Res. Comput. Eng. Technol. 4(8), 3415–3418 (2015) Babu, K.S., Sathvik, C.: Enhancement of MANET security using cross-layer technology. Int. J. Adv. Res. Comput. Eng. Technol. 4(8), 3415–3418 (2015)
12.
Zurück zum Zitat Jegatheesan, A., Manimegalai, D.: Secure key sharing in mobile ad hoc network using content invisibility scheme. WSEAS Trans. Comput. 14, 124–133 (2015) Jegatheesan, A., Manimegalai, D.: Secure key sharing in mobile ad hoc network using content invisibility scheme. WSEAS Trans. Comput. 14, 124–133 (2015)
13.
Zurück zum Zitat Bhakte, H., Kulkarni, R.: Prevention of black hole attacks in AODV-based MANETs using secure route discovery. J. Multidiscip. Eng. Sci. Technol. 2(7), 1851–1856 (2015) Bhakte, H., Kulkarni, R.: Prevention of black hole attacks in AODV-based MANETs using secure route discovery. J. Multidiscip. Eng. Sci. Technol. 2(7), 1851–1856 (2015)
14.
Zurück zum Zitat Karthika, N., Ranilakshmi, S.: An efficient anonymity protection technique using attribute based encryption in mobile adhoc networks. Int. J. Res. Appl. Sci. Eng. Technol. 3(8), 285–291 (2015) Karthika, N., Ranilakshmi, S.: An efficient anonymity protection technique using attribute based encryption in mobile adhoc networks. Int. J. Res. Appl. Sci. Eng. Technol. 3(8), 285–291 (2015)
15.
Zurück zum Zitat Pranusha, A., Murali, G.: A hybrid key management scheme for secure MANET communications. Int. J. Res. Eng. Technol. 4(2), 38–40 (2015)CrossRef Pranusha, A., Murali, G.: A hybrid key management scheme for secure MANET communications. Int. J. Res. Eng. Technol. 4(2), 38–40 (2015)CrossRef
16.
Zurück zum Zitat Mohanraj, R.: MANET routing and data security with multiple packet collision control using acyclic node-links. Comput. Sci. Appl. 2(1), 1–9 (2015) Mohanraj, R.: MANET routing and data security with multiple packet collision control using acyclic node-links. Comput. Sci. Appl. 2(1), 1–9 (2015)
17.
Zurück zum Zitat kaur, G., Garg, U.: Effective energy consumption chaining routing protocol with routing technique for MANET. Int. J. Sci. Eng. Technol. Res. 4(1), 36–41 (2015) kaur, G., Garg, U.: Effective energy consumption chaining routing protocol with routing technique for MANET. Int. J. Sci. Eng. Technol. Res. 4(1), 36–41 (2015)
18.
Zurück zum Zitat Jain, A., Jain, Y.K.: Reduce flooding based DDoS attack and improve network performance parameters by using NS-2 simulator. Int. J. Multidiscip. Res. Dev. 2(2), 384–392 (2015) Jain, A., Jain, Y.K.: Reduce flooding based DDoS attack and improve network performance parameters by using NS-2 simulator. Int. J. Multidiscip. Res. Dev. 2(2), 384–392 (2015)
19.
Zurück zum Zitat Khin, E.E., Phyu, T.: Enhancing AODV routing protocol to eliminate black hole attack in MANET. Int. J. Comput. Sci. Bus. Inf. 15(2), 1–14 (2015) Khin, E.E., Phyu, T.: Enhancing AODV routing protocol to eliminate black hole attack in MANET. Int. J. Comput. Sci. Bus. Inf. 15(2), 1–14 (2015)
20.
Zurück zum Zitat Kalaimani, A., Ambika, B.: Secure routing using ASOR protocol for MANETs. Int. J. Comput. Sci. Eng. Technol. 06(1), 1–4 (2015) Kalaimani, A., Ambika, B.: Secure routing using ASOR protocol for MANETs. Int. J. Comput. Sci. Eng. Technol. 06(1), 1–4 (2015)
21.
Zurück zum Zitat Geramiraz, F., Memaripour, A.S., Abbaspour, M.: Adaptive anomaly-based intrusion detection system using fuzzy controller. Int. J. Netw. Secur. 14(6), 352–361 (2012) Geramiraz, F., Memaripour, A.S., Abbaspour, M.: Adaptive anomaly-based intrusion detection system using fuzzy controller. Int. J. Netw. Secur. 14(6), 352–361 (2012)
22.
Zurück zum Zitat Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion detection system for MANETs. IEEE Trans. Ind. Electron. 60(3), 1089–1098 (2013)CrossRef Shakshuki, E.M., Kang, N., Sheltami, T.R.: EAACK—a secure intrusion detection system for MANETs. IEEE Trans. Ind. Electron. 60(3), 1089–1098 (2013)CrossRef
23.
Zurück zum Zitat Singal, G., Laxmi, V., Gaur, M.S., Todi, S., Rao, V., Tripathi, M., Kushwaha, R.: Multi-constraints link stable multicast routing protocol in MANETs. Ad Hoc Netw. 63, 115–128 (2017)CrossRef Singal, G., Laxmi, V., Gaur, M.S., Todi, S., Rao, V., Tripathi, M., Kushwaha, R.: Multi-constraints link stable multicast routing protocol in MANETs. Ad Hoc Netw. 63, 115–128 (2017)CrossRef
24.
Zurück zum Zitat Laouid, A., Dahmani, A., Bounceur, A., Euler, R., Lalem, F., Tari, A.: A distributed multi-path routing algorithm to balance energy consumption in wireless sensor networks. Ad Hoc Netw. 64, 53–64 (2017)CrossRef Laouid, A., Dahmani, A., Bounceur, A., Euler, R., Lalem, F., Tari, A.: A distributed multi-path routing algorithm to balance energy consumption in wireless sensor networks. Ad Hoc Netw. 64, 53–64 (2017)CrossRef
25.
Zurück zum Zitat Yadav, A.K., Das, S.K., Tripathi, S.: EFMMRP: design of efficient fuzzy based multi-constraint multicast routing protocol for wireless ad-hoc network. Comput. Netw. 118, 15–23 (2017)CrossRef Yadav, A.K., Das, S.K., Tripathi, S.: EFMMRP: design of efficient fuzzy based multi-constraint multicast routing protocol for wireless ad-hoc network. Comput. Netw. 118, 15–23 (2017)CrossRef
26.
Zurück zum Zitat Rajan, C., Shanthi, N.: Swarm optimized multicasting for wireless network. Life Sci. J. 10(4), 511–516 (2013) Rajan, C., Shanthi, N.: Swarm optimized multicasting for wireless network. Life Sci. J. 10(4), 511–516 (2013)
Metadaten
Titel
Fuzzy enhanced secure multicast routing for improving authentication in MANET
verfasst von
V. Brindha
T. Karthikeyan
P. Manimegalai
Publikationsdatum
05.02.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 4/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1282-9

Weitere Artikel der Sonderheft 4/2019

Cluster Computing 4/2019 Zur Ausgabe