Skip to main content
Erschienen in: Wireless Networks 7/2017

17.05.2016

Joint cost and secured node disjoint energy efficient multipath routing in mobile ad hoc network

verfasst von: S. Russia, R. Anita

Erschienen in: Wireless Networks | Ausgabe 7/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The severe resource constraints and deployment environments of mobile ad hoc networks (MANETs) pose challenges for the security and energy consumption during data transmission for these networks. Multipath routing and energy consumption are the important factors to be considered in mobile ad hoc network as it provides a powerful tool for studying security aspects during data transmission. Advances in MANET technology have provided the availability of energy efficient reliable and multi path routing for intrusion tolerance with capability of identifying reliable routes, determining the best redundancy level to increase the operational lifetime of the network. Identifying a secured and energy efficient multipath routing for MANET represents the basic challenge during data transmission. In order to overcome such limitation, a hybrid method called as joint cost and secured node disjoint energy-efficient multipath routing (NDE-MR) is designed for MANET to reduce the energy consumption and execution time during the multipath routing and to improve security during data transfer. Node initialization initializes the mobile nodes with energy efficient model by obtaining the neighbor node data. Next, cost-based multipath route discovery model identifies the path with the least transmission cost through which data forwarding is made. Finally, security is achieved through node disjoint path model by splitting the data packets into different segments. Simulation results show that the NDE-MR model is able to reduce energy consumption and execution time during multipath routing and to increases the security of the network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Vazifehdan, J., Venkatesha Prasad, R., & Niemegeers, I. (2014). Energy-efficient reliable routing considering residual energy in wireless ad hoc networks. IEEE Transactions on Mobile Computing, 13(2), 434–447.CrossRef Vazifehdan, J., Venkatesha Prasad, R., & Niemegeers, I. (2014). Energy-efficient reliable routing considering residual energy in wireless ad hoc networks. IEEE Transactions on Mobile Computing, 13(2), 434–447.CrossRef
2.
Zurück zum Zitat Al-Hamadi, H., & Chen, I.-R. (2013). Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks. IEEE Transactions on Network and Service Management, 10(2), 189–203.CrossRef Al-Hamadi, H., & Chen, I.-R. (2013). Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks. IEEE Transactions on Network and Service Management, 10(2), 189–203.CrossRef
3.
Zurück zum Zitat Li, M., Zhang, L., Li, V. O. K., Shan, X., & Ren, Y. (2005). An energy-aware multipath routing protocol for mobile ad hoc networks. In ACM Sigcomm Asia’05 (pp. 10–12). Li, M., Zhang, L., Li, V. O. K., Shan, X., & Ren, Y. (2005). An energy-aware multipath routing protocol for mobile ad hoc networks. In ACM Sigcomm Asia’05 (pp. 10–12).
4.
Zurück zum Zitat Palaniappan, S., & Chellan, K. (2015). Energy-efficient stable routing using QoS monitoring agents in MANET. EURASIP Journal on Wireless Communications and Networking. doi:10.1186/s13638-014-0234-9. Palaniappan, S., & Chellan, K. (2015). Energy-efficient stable routing using QoS monitoring agents in MANET. EURASIP Journal on Wireless Communications and Networking. doi:10.​1186/​s13638-014-0234-9.
5.
Zurück zum Zitat Gopinatha, S., & Nagarajan, N. (2015). Energy based reliable multicast routing protocol for packet forwarding in MANET. Journal of Applied Research and Technology, 13(3), 374–381.CrossRef Gopinatha, S., & Nagarajan, N. (2015). Energy based reliable multicast routing protocol for packet forwarding in MANET. Journal of Applied Research and Technology, 13(3), 374–381.CrossRef
6.
Zurück zum Zitat Santhi, S., & Sadasivam, G. S. (2014). Design and development of multipath routing protocol using QoS in heterogeneous network. Journal of Scientific and Industrial Research (JSIR), 73(11), 729–734. Santhi, S., & Sadasivam, G. S. (2014). Design and development of multipath routing protocol using QoS in heterogeneous network. Journal of Scientific and Industrial Research (JSIR), 73(11), 729–734.
7.
Zurück zum Zitat Lou, W., Liu, W., Zhang, Y., & Fang, Y. (2009). SPREAD: Improving network security by multipath routing in mobile ad hoc networks. Wireless Networks, 15(3), 279–294.CrossRef Lou, W., Liu, W., Zhang, Y., & Fang, Y. (2009). SPREAD: Improving network security by multipath routing in mobile ad hoc networks. Wireless Networks, 15(3), 279–294.CrossRef
8.
Zurück zum Zitat Gujral, R. K., Grover, J., & Anjali, A. (2013). An analysis of network survivability with variable transmission range and mobility on AODV over MANET. International Journal of Computing Science and Communication Technologies, 5(2), 870–878. Gujral, R. K., Grover, J., & Anjali, A. (2013). An analysis of network survivability with variable transmission range and mobility on AODV over MANET. International Journal of Computing Science and Communication Technologies, 5(2), 870–878.
10.
Zurück zum Zitat Kanakala, S., Ananthula, V. R., & Vempaty, P. (2014). Energy-efficient cluster based routing protocol in mobile ad hoc networks using network coding. Journal of Computer Networks and Communications. doi:10.1155/2014/351020. Kanakala, S., Ananthula, V. R., & Vempaty, P. (2014). Energy-efficient cluster based routing protocol in mobile ad hoc networks using network coding. Journal of Computer Networks and Communications. doi:10.​1155/​2014/​351020.
11.
Zurück zum Zitat Cai, X., Duan, Y., He, Y., Yang, J., & Li, C. (2015). Bee-Sensor-C: An energy-efficient and scalable multipath routing protocol for wireless sensor networks. International Journal of Distributed Sensor Networks. doi:10.1155/2015/976127. Cai, X., Duan, Y., He, Y., Yang, J., & Li, C. (2015). Bee-Sensor-C: An energy-efficient and scalable multipath routing protocol for wireless sensor networks. International Journal of Distributed Sensor Networks. doi:10.​1155/​2015/​976127.
12.
Zurück zum Zitat Kim, S. (2014). Adaptive MANET multipath routing algorithm based on the simulated annealing approach. The Scientific World Journal. doi:10.1155/2014/872526. Kim, S. (2014). Adaptive MANET multipath routing algorithm based on the simulated annealing approach. The Scientific World Journal. doi:10.​1155/​2014/​872526.
13.
Zurück zum Zitat Mo, Y., Dexin, Y., Song, J., Zheng, K., & Guo, Y. (2015). A beacon transmission power control algorithm based on wireless channel load forecasting in VANETs. PLoS One, 10(11), 1–17.CrossRef Mo, Y., Dexin, Y., Song, J., Zheng, K., & Guo, Y. (2015). A beacon transmission power control algorithm based on wireless channel load forecasting in VANETs. PLoS One, 10(11), 1–17.CrossRef
14.
Zurück zum Zitat Abdelhaq, M., Alsaqour, R., & Abdelhaq, S. (2015). Securing mobile ad hoc networks using danger theory-based artificial immune algorithm. PLoS One, 10(5), 1–16.CrossRef Abdelhaq, M., Alsaqour, R., & Abdelhaq, S. (2015). Securing mobile ad hoc networks using danger theory-based artificial immune algorithm. PLoS One, 10(5), 1–16.CrossRef
15.
Zurück zum Zitat Dorri, A., Kamel, S. R., & Kheyrkhah, E. (2015). Security challenges in mobile ad hoc networks: A survey. International Journal of Computer Science and Engineering Survey (IJCSES), 6(1), 1–15.CrossRef Dorri, A., Kamel, S. R., & Kheyrkhah, E. (2015). Security challenges in mobile ad hoc networks: A survey. International Journal of Computer Science and Engineering Survey (IJCSES), 6(1), 1–15.CrossRef
16.
Zurück zum Zitat Kumar, S., & Jena, S. (2010). SCMRP: Secure cluster based multipath routing protocol for wireless sensor networks. In 2010 sixth international conference on wireless communication and sensor networks (WCSN) (pp. 1–6). Kumar, S., & Jena, S. (2010). SCMRP: Secure cluster based multipath routing protocol for wireless sensor networks. In 2010 sixth international conference on wireless communication and sensor networks (WCSN) (pp. 1–6).
17.
Zurück zum Zitat Thamayanthi, M., & Priya, V. (2015). Secured transaction based routing protocol in dynamic mobile ad hoc networks. Discovery, 30(116), 2–9. Thamayanthi, M., & Priya, V. (2015). Secured transaction based routing protocol in dynamic mobile ad hoc networks. Discovery, 30(116), 2–9.
18.
Zurück zum Zitat Gao, W., Li, Q., & Cao, G. (2015). Forwarding redundancy in opportunistic mobile networks: Investigation, elimination and exploitation. IEEE Transactions on Mobile Computing, 14(4), 714–727.CrossRef Gao, W., Li, Q., & Cao, G. (2015). Forwarding redundancy in opportunistic mobile networks: Investigation, elimination and exploitation. IEEE Transactions on Mobile Computing, 14(4), 714–727.CrossRef
19.
Zurück zum Zitat Mahdi, S. A., Othman, M., Ibrahim, H., Desa, J. M., & Sulaiman, J. (2013). Protocols for secure routing and transmission in mobile ad hoc network: A review. Journal of Computer Science, 9(5), 607–619.CrossRef Mahdi, S. A., Othman, M., Ibrahim, H., Desa, J. M., & Sulaiman, J. (2013). Protocols for secure routing and transmission in mobile ad hoc network: A review. Journal of Computer Science, 9(5), 607–619.CrossRef
20.
Zurück zum Zitat Uppal, R. S., Kumar, S., & Singh, H. (2013). Reliable and energy saving multipath routing in multisink wireless sensor networks. Global Journal of Computer Science and Technology Network, Web and Security, 13(13), 1–11. Uppal, R. S., Kumar, S., & Singh, H. (2013). Reliable and energy saving multipath routing in multisink wireless sensor networks. Global Journal of Computer Science and Technology Network, Web and Security, 13(13), 1–11.
21.
Zurück zum Zitat Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Network, 19, 161–173.CrossRef Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Network, 19, 161–173.CrossRef
22.
Zurück zum Zitat Wang, X., Vasilakos, A. V., Chen, M., Liu, Y., & Kwon, T. T. (2012). A survey of green mobile networks: Opportunities and challenges. Mobile Network Application, 17, 4–20.CrossRef Wang, X., Vasilakos, A. V., Chen, M., Liu, Y., & Kwon, T. T. (2012). A survey of green mobile networks: Opportunities and challenges. Mobile Network Application, 17, 4–20.CrossRef
23.
Zurück zum Zitat Li, P., Guo, S., Yuy, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In 2012 Proceedings IEEE INFOCOM (pp. 100–108). Li, P., Guo, S., Yuy, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In 2012 Proceedings IEEE INFOCOM (pp. 100–108).
24.
Zurück zum Zitat Duarte, P. B. F., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119–127.CrossRef Duarte, P. B. F., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119–127.CrossRef
25.
Zurück zum Zitat Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406. Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.
26.
Zurück zum Zitat Liu, L., Song, Y., Zhang, H., Ma, H., Vasilakos, A. V., & Optimization, P. (2015). A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.MathSciNetMATH Liu, L., Song, Y., Zhang, H., Ma, H., Vasilakos, A. V., & Optimization, P. (2015). A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.MathSciNetMATH
27.
Zurück zum Zitat Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.CrossRef
28.
Zurück zum Zitat Yao, Y., Cao, Q., & Vasilakos, A. V. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In 2013 IEEE 10th international conference on mobile ad-hoc and sensor systems. Yao, Y., Cao, Q., & Vasilakos, A. V. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In 2013 IEEE 10th international conference on mobile ad-hoc and sensor systems.
29.
Zurück zum Zitat Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.CrossRef Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.CrossRef
30.
Zurück zum Zitat Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.CrossRef Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.CrossRef
Metadaten
Titel
Joint cost and secured node disjoint energy efficient multipath routing in mobile ad hoc network
verfasst von
S. Russia
R. Anita
Publikationsdatum
17.05.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 7/2017
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1288-x

Weitere Artikel der Ausgabe 7/2017

Wireless Networks 7/2017 Zur Ausgabe