Skip to main content
Erschienen in: Wireless Personal Communications 1/2018

15.05.2018

A Three Layered Peer-to-Peer Energy Efficient Protocol for Reliable and Secure Data Transmission in EAACK MANETs

verfasst von: Sathiamoorthy Jayaraman, Ramakrishnan Bhagavathiperumal, Usha Mohanakrishnan

Erschienen in: Wireless Personal Communications | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In a wireless adhoc network packets may be dropped due to the high node mobility. This network behavior undermines the network credibility to successfully route messages. Packet dropping may also be due to the presence of malicious nodes. Also, maintaining a viable route for the packets to travel is a greater challenge as it involves discovering a route and maintaining it for the entire session. It is very important to resolve these issues in order to maintain the performance of an EAACK MANET (Enhanced Adaptive Acknowledgement). The performance of a MANET rests heavily on its successful transmission rate. In order to have a high success rate all of these three issues need to be addressed. We have proposed a protocol (FDCRP) that would incorporate an efficient three layered framework into an EAACK MANET to ensure a high transmission rate. In order to include this framework into EAACK MANETs, the network would be divided into clusters. To manage the high mobility of the nodes and to form clusters faster, we use the node information efficiently. This technique involves the use of fuzzy logic and helps form clusters dynamically. We also incorporate a three tier filtering scheme to isolate the trusted nodes in forming a cluster, as there is a heavy possibility that the cluster nodes or even the cluster head turning malicious in the course of a transmission. The third level of our framework would address the issue of discovering better routes for the packets to reach their destination. This scheme would use the subset of intermediate clusters along the route to deliver the packet successfully to its intended destination. The proposed protocol would be capable of addressing multiple issues in EAACK MANETs thus maximizing the overall performance of the network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communication, 30(14/15), 2826–2841.CrossRef Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communication, 30(14/15), 2826–2841.CrossRef
2.
Zurück zum Zitat Tselikis, C., Mitropoulos, S., Komninos, N., & Douligeris, C. (2012). Degree-based clustering algorithms for wireless Ad Hoc networks under attack. IEEE Communications Letters, 16(5), 619–621.CrossRef Tselikis, C., Mitropoulos, S., Komninos, N., & Douligeris, C. (2012). Degree-based clustering algorithms for wireless Ad Hoc networks under attack. IEEE Communications Letters, 16(5), 619–621.CrossRef
3.
Zurück zum Zitat Zeng, Y., Cao, J., Guo, S., Yang, K., & Xie, L. (2009). SWCA: A secure weighted clustering algorithm in wireless ad hoc networks. In IEEE wireless communications and networking conference WCNC. Zeng, Y., Cao, J., Guo, S., Yang, K., & Xie, L. (2009). SWCA: A secure weighted clustering algorithm in wireless ad hoc networks. In IEEE wireless communications and networking conference WCNC.
4.
Zurück zum Zitat Nishimura, I., Nagase, T., Takehana, Y., & Yoshioka, Y. (2011). Secure clustering for building certificate management nodes in ad-hoc network. In International conference on network-based information systems (pp. 685–689). Nishimura, I., Nagase, T., Takehana, Y., & Yoshioka, Y. (2011). Secure clustering for building certificate management nodes in ad-hoc network. In International conference on network-based information systems (pp. 685–689).
5.
Zurück zum Zitat Rifà-Pous, H., & Herrera-Joancomartí, J. (2011). A fair and secure cluster formation process for ad hoc networks. Journal Wireless Personal Communications: An International Journal archive, 56(3), 625–636.CrossRef Rifà-Pous, H., & Herrera-Joancomartí, J. (2011). A fair and secure cluster formation process for ad hoc networks. Journal Wireless Personal Communications: An International Journal archive, 56(3), 625–636.CrossRef
6.
Zurück zum Zitat Sivaranjani, V., & Rajalakshmi, D. (2012). Secure cluster head election for intrusion detection in MANET. Journal of Computer Applications, 5(EICA2012-4), 10. Sivaranjani, V., & Rajalakshmi, D. (2012). Secure cluster head election for intrusion detection in MANET. Journal of Computer Applications, 5(EICA2012-4), 10.
7.
Zurück zum Zitat Adams, W. J., & Davis, N. J. (2005). Toward a decentralized trust based access control system for dynamic collaboration. In Proceedings of the 6th annual IEEE system, man and cybernetics information assurance workshop (SMC’05) (pp. 317–324). Adams, W. J., & Davis, N. J. (2005). Toward a decentralized trust based access control system for dynamic collaboration. In Proceedings of the 6th annual IEEE system, man and cybernetics information assurance workshop (SMC’05) (pp. 317–324).
8.
Zurück zum Zitat Boukerche, A. & Ren, Y. (2008). A security management scheme using a novel computational reputation model for wireless and mobile Ad Hoc networks. In Proceedings of the 5th ACM international symposium on performance evaluation of wireless ad-hoc, sensor, and ubiquitous networks (PE-WASUN’08) (pp. 88–95). Boukerche, A. & Ren, Y. (2008). A security management scheme using a novel computational reputation model for wireless and mobile Ad Hoc networks. In Proceedings of the 5th ACM international symposium on performance evaluation of wireless ad-hoc, sensor, and ubiquitous networks (PE-WASUN’08) (pp. 88–95).
9.
Zurück zum Zitat Li, R., Li, J., Liu, P., & Chen, H. (2007). An objective trust management framework for mobile Ad Hoc networks. In Proceedings of the IEEE 65th vehicular technology conference (VTC’07) (pp. 56– 60). Li, R., Li, J., Liu, P., & Chen, H. (2007). An objective trust management framework for mobile Ad Hoc networks. In Proceedings of the IEEE 65th vehicular technology conference (VTC’07) (pp. 56– 60).
10.
Zurück zum Zitat Theodorakopoulos, G., & Baras, J. S. (2004). Trust evaluation in adhoc networks. In Proceedings of the ACM workshop on wireless security (WiSe’04) (pp. 1–10). Theodorakopoulos, G., & Baras, J. S. (2004). Trust evaluation in adhoc networks. In Proceedings of the ACM workshop on wireless security (WiSe’04) (pp. 1–10).
11.
Zurück zum Zitat Jiang, T., & Baras, J. S. (2004). Ant-based adaptive trust evidence distribution in MANET. In Proceedings of the 24th international conference on distributed computing systems workshops (pp. 588–593). Jiang, T., & Baras, J. S. (2004). Ant-based adaptive trust evidence distribution in MANET. In Proceedings of the 24th international conference on distributed computing systems workshops (pp. 588–593).
12.
Zurück zum Zitat Yan, Z., Zhang, P., & Virtan, T. (2003). Trust evaluation based security solution in Ad Hoc networks. In Proceedings of 7th nordic workshop on secure IT systems. Yan, Z., Zhang, P., & Virtan, T. (2003). Trust evaluation based security solution in Ad Hoc networks. In Proceedings of 7th nordic workshop on secure IT systems.
13.
Zurück zum Zitat Pirzada, A. A., & McDonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian conference on computer science (ACSC’04) (vol. 26, pp. 47–54). Pirzada, A. A., & McDonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian conference on computer science (ACSC’04) (vol. 26, pp. 47–54).
14.
Zurück zum Zitat Ghosh, T., Pissinou, N., & Makki, K. (2004). Collaborative trust based secure routing in multihop ad hoc networks. In Proceedings of the 3rd international IFIP-TC6 networking conference on NETWORKING 2004. Networking technologies, services, and protocols; performance of computer and communication networks; mobile and wireless communications, Athens, Greece, May 9–14, 2004, Lecture Notes in Computer Science (vol. 3042, pp. 1446–1451). Ghosh, T., Pissinou, N., & Makki, K. (2004). Collaborative trust based secure routing in multihop ad hoc networks. In Proceedings of the 3rd international IFIP-TC6 networking conference on NETWORKING 2004. Networking technologies, services, and protocols; performance of computer and communication networks; mobile and wireless communications, Athens, Greece, May 9–14, 2004, Lecture Notes in Computer Science (vol. 3042, pp. 1446–1451).
15.
Zurück zum Zitat Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10(6), 985–995.CrossRef Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10(6), 985–995.CrossRef
16.
Zurück zum Zitat Milan, F., Jaramillo, J. J., & Srikant, R. (2006). Achieving cooperation in multihop wireless networks of selfish nodes. In Proceedings of the workshop on game theory for communications and networks (GameNets’06). Milan, F., Jaramillo, J. J., & Srikant, R. (2006). Achieving cooperation in multihop wireless networks of selfish nodes. In Proceedings of the workshop on game theory for communications and networks (GameNets’06).
17.
Zurück zum Zitat Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16(4), 969–984.CrossRef Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16(4), 969–984.CrossRef
18.
Zurück zum Zitat Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Journal of Cluster Computing, 5(2), 193–204.CrossRef Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Journal of Cluster Computing, 5(2), 193–204.CrossRef
19.
Zurück zum Zitat Bechler, M., Hof, H., Kraft, D., Pahlke, F., & Wolf, L. (2004). A cluster-based security architecture for ad hoc networks. In Proceedings of the 23rd annual joint conference of the IEEE computer and communications societies (INFOCOM’04) (vol. 4, pp. 2393–2403). Bechler, M., Hof, H., Kraft, D., Pahlke, F., & Wolf, L. (2004). A cluster-based security architecture for ad hoc networks. In Proceedings of the 23rd annual joint conference of the IEEE computer and communications societies (INFOCOM’04) (vol. 4, pp. 2393–2403).
20.
Zurück zum Zitat Chatterjee, P., Sengupta, I., & Ghosh, S. K. (2012). STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. Cluster Computing, 15, 303–320.CrossRef Chatterjee, P., Sengupta, I., & Ghosh, S. K. (2012). STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. Cluster Computing, 15, 303–320.CrossRef
21.
Zurück zum Zitat Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2017). STFDR: Architecture of competent protocol for efficient route discovery and reliable transmission in CEAACK MANETs. Wireless Personal Communications, 97(4), 5817–5839.CrossRef Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2017). STFDR: Architecture of competent protocol for efficient route discovery and reliable transmission in CEAACK MANETs. Wireless Personal Communications, 97(4), 5817–5839.CrossRef
22.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2017). A reliable data transmission in EAACK MANETs using hybrid three-tier competent fuzzy cluster algorithm. Springer Journal of Wireless Personal Communication, 97(4), 5897–5916.CrossRef Sathiamoorthy, J., & Ramakrishnan, B. (2017). A reliable data transmission in EAACK MANETs using hybrid three-tier competent fuzzy cluster algorithm. Springer Journal of Wireless Personal Communication, 97(4), 5897–5916.CrossRef
23.
Zurück zum Zitat Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.CrossRef Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.CrossRef
25.
Zurück zum Zitat Balakrishna, R., Reddy, M. M., Rao, U. R., & Ramachanndra, G. A. (2009). Detection of routing minbehavior in MANET using 2ACK. In IEEE international advance computing conference (IACC 2009), Patiala, India, 6–7 March. Balakrishna, R., Reddy, M. M., Rao, U. R., & Ramachanndra, G. A. (2009). Detection of routing minbehavior in MANET using 2ACK. In IEEE international advance computing conference (IACC 2009), Patiala, India, 6–7 March.
26.
Zurück zum Zitat Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). A reliable and secure data transmission in CEAACK MANETs using distinct dynamic key with classified digital signature cryptographic algorithm. In IEEE international conference on computing and communications technologies (ICCCT). Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). A reliable and secure data transmission in CEAACK MANETs using distinct dynamic key with classified digital signature cryptographic algorithm. In IEEE international conference on computing and communications technologies (ICCCT).
27.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2016). CEAACK—A reduced acknowledgment for better data transmission for MANETs. International Journal of Computer Network and Information Security, 2, 64–71.CrossRef Sathiamoorthy, J., & Ramakrishnan, B. (2016). CEAACK—A reduced acknowledgment for better data transmission for MANETs. International Journal of Computer Network and Information Security, 2, 64–71.CrossRef
28.
Zurück zum Zitat Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144–151. Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144–151.
29.
Zurück zum Zitat Taheri, H., Neamatollahi, P., Younis, O. M., Naghibzadeh, S., & Yaghmaee, M. H. (2012). An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic. Journal of Ad Hoc Networks, 10(7), 1469–1481.CrossRef Taheri, H., Neamatollahi, P., Younis, O. M., Naghibzadeh, S., & Yaghmaee, M. H. (2012). An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic. Journal of Ad Hoc Networks, 10(7), 1469–1481.CrossRef
30.
Zurück zum Zitat Bagci, H., & Yazici, A. (2010). An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. Applied Soft Computing, 13(4), 1741–1749.CrossRef Bagci, H., & Yazici, A. (2010). An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. Applied Soft Computing, 13(4), 1741–1749.CrossRef
31.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2017). A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs. Springer Soft Computing, 11 July 2017 (Online). Sathiamoorthy, J., & Ramakrishnan, B. (2017). A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs. Springer Soft Computing, 11 July 2017 (Online).
32.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2016). Energy and delay efficient dynamic cluster formation using improved ant colony optimization algorithm in EAACK MANETs. Springer Journal of Wireless Personal Communication, 1–122. Sathiamoorthy, J., & Ramakrishnan, B. (2016). Energy and delay efficient dynamic cluster formation using improved ant colony optimization algorithm in EAACK MANETs. Springer Journal of Wireless Personal Communication, 1–122.
33.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2015). Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK. Springer Journal of Wireless Networks, 1–15. Sathiamoorthy, J., & Ramakrishnan, B. (2015). Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK. Springer Journal of Wireless Networks, 1–15.
34.
Zurück zum Zitat Lee, J. S., & Cheng, W. L. (2012). Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication. IEEE Sensors Journal, 12(9), 2891–2897.CrossRef Lee, J. S., & Cheng, W. L. (2012). Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication. IEEE Sensors Journal, 12(9), 2891–2897.CrossRef
Metadaten
Titel
A Three Layered Peer-to-Peer Energy Efficient Protocol for Reliable and Secure Data Transmission in EAACK MANETs
verfasst von
Sathiamoorthy Jayaraman
Ramakrishnan Bhagavathiperumal
Usha Mohanakrishnan
Publikationsdatum
15.05.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5835-x

Weitere Artikel der Ausgabe 1/2018

Wireless Personal Communications 1/2018 Zur Ausgabe

Neuer Inhalt