Skip to main content

2021 | OriginalPaper | Buchkapitel

Robust and Secure Routing Protocols for MANET-Based Internet of Things Systems—A Survey

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent decades, the Internet of things (IoT) has had a huge impact on various domains, such as logistics, health care, robotics, and manufacturing, coping with an enormous amount of data transferred by different resource-constrained IoT network devices. For diverse applications, IoT can be seen as a network of devices comprising hardware, software, sensors, actuators, and connectivity allowing the networked system to link, communicate, and share information. In IoT configurations, billions of devices can be connected to the Internet to transfer data quickly, efficiently, and securely. Though there are great advancements in IoT technologies, certain limitations are still to be considered. Firstly, IoT devices have limited resources like memory, computing power, and energy (Khanpara and Lavingia in Multimedia big data computing for IoT applications. Springer, Singapore, pp. 37–57, 2020). Besides, IoT devices may link the behavior of a person to their identity which challenges the privacy of a person. Many researchers have made numerous successful attempts to integrate reliable protocols with IoT devices that can function efficiently in a resource-constrained environment and robustly against data transmission security and privacy issues. IoT integrates with the wireless sensor network (WSN) and the mobile ad hoc network (MANET) in smart environments and is becoming much more desirable and economically efficient. The MANET is not only ideal for disaster situations but can also be used for robotic communication. Interaction with the IoT systems between WSNs and MANETs enables the development of new MANET-based IoT systems which give the consumer more mobility and lower costs. At the same time, the networking aspects open up new challenging issues. Hence, this chapter discusses various existing secure MANET protocols that provide secure data transmission and can also be used in the IoT environment to provide robustness in the presence of a variety of threats and vulnerabilities. This chapter also presents some major challenges in the emerging domain of MANET-based IoT systems for robotics.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abusalah, L., Khokhar, A., & Guizani, M. (2008a). A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys & Tutorials, 10(4), 78–93.CrossRef Abusalah, L., Khokhar, A., & Guizani, M. (2008a). A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys & Tutorials, 10(4), 78–93.CrossRef
Zurück zum Zitat Afzal, S. R., Biswas, S., Koh, J., Raza, T., Lee, G., & Kim, D. (2008). RSRP: a robust secure routing protocol for mobile ad hoc networks. In 2008 IEEE Wireless Communications and Networking Conference, Las Vegas, NV (pp. 2313–2318). 10.1109/WCNC.2008.408. Afzal, S. R., Biswas, S., Koh, J., Raza, T., Lee, G., & Kim, D. (2008). RSRP: a robust secure routing protocol for mobile ad hoc networks. In 2008 IEEE Wireless Communications and Networking Conference, Las Vegas, NV (pp. 2313–2318). 10.1109/WCNC.2008.408.
Zurück zum Zitat Ahmad, M., Chen, Q., Najam-Ul-Islam, M., Iqbal, M. A., & Hussain, S. (2017). On the secure optimized link state routing (SOLSR) protocol for MANETs. In 2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), Nanjing. Ahmad, M., Chen, Q., Najam-Ul-Islam, M., Iqbal, M. A., & Hussain, S. (2017). On the secure optimized link state routing (SOLSR) protocol for MANETs. In 2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), Nanjing.
Zurück zum Zitat Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198–213.CrossRef Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198–213.CrossRef
Zurück zum Zitat Alam, T. (2019a). IoT-Fog: A communication framework using blockchain in the Internet of Things. International Journal of Recent Technology and Engineering (IJRTE), 7(6). Alam, T. (2019a). IoT-Fog: A communication framework using blockchain in the Internet of Things. International Journal of Recent Technology and Engineering (IJRTE), 7(6).
Zurück zum Zitat Boulaiche, M., & Bouallouche-Medjkoune, L. (2017). Hsecgr: Highly secure geographic routing. Journal of Network and Computer Applications, 80, 189–199.CrossRef Boulaiche, M., & Bouallouche-Medjkoune, L. (2017). Hsecgr: Highly secure geographic routing. Journal of Network and Computer Applications, 80, 189–199.CrossRef
Zurück zum Zitat Deepika, D., & Anand, N. (2013). Complete scenario of routing protocols, security leaks and attacks in MANETs. Journal Proceedings of the IJARCSEE, 3(10). Deepika, D., & Anand, N. (2013). Complete scenario of routing protocols, security leaks and attacks in MANETs. Journal Proceedings of the IJARCSEE, 3(10).
Zurück zum Zitat Dhiman, D., & Nayyar, A. (2013). Complete scenario of routing protocols security leaks and attacks in MANETs. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10). Dhiman, D., & Nayyar, A. (2013). Complete scenario of routing protocols security leaks and attacks in MANETs. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10).
Zurück zum Zitat Dubey, S., Singh, P., Yadav, P., & Singh, K. K. (2020). Household waste management system using IoT and machine learning. Procedia Computer Science, 167, 1950–1959.CrossRef Dubey, S., Singh, P., Yadav, P., & Singh, K. K. (2020). Household waste management system using IoT and machine learning. Procedia Computer Science, 167, 1950–1959.CrossRef
Zurück zum Zitat Gupta, R., Tanwar, S., Al-Turjman, F., Italiya, P., Nauman, A., & Kim, S. W. (2020). Smart contract privacy protection using AI in cyber-physical systems: tools, techniques and challenges. IEEE Access, 8, 24746–24772.CrossRef Gupta, R., Tanwar, S., Al-Turjman, F., Italiya, P., Nauman, A., & Kim, S. W. (2020). Smart contract privacy protection using AI in cyber-physical systems: tools, techniques and challenges. IEEE Access, 8, 24746–24772.CrossRef
Zurück zum Zitat Karlsson, J., Dooley, L., & Pulkkis, G. (2012). Routing security in mobile ad-hoc networks. Issues in Informing Science and Information Technology, 9, 369–383.CrossRef Karlsson, J., Dooley, L., & Pulkkis, G. (2012). Routing security in mobile ad-hoc networks. Issues in Informing Science and Information Technology, 9, 369–383.CrossRef
Zurück zum Zitat Karlsson, J., Dooley, L. S., & Pulkkis, G. (2018, August). Secure routing for MANET connected Internet of Things systems. In 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 114–119). IEEE. Karlsson, J., Dooley, L. S., & Pulkkis, G. (2018, August). Secure routing for MANET connected Internet of Things systems. In 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 114–119). IEEE.
Zurück zum Zitat Karthigeyan, I., Manoj, B. S., & Murthy, C. S. R. (2005). A distributed laxity-based priority scheduling scheme for time-sensitive traffic in mobile ad hoc networks. Ad Hoc Networks, 3(1), 27–50. Karthigeyan, I., Manoj, B. S., & Murthy, C. S. R. (2005). A distributed laxity-based priority scheduling scheme for time-sensitive traffic in mobile ad hoc networks. Ad Hoc Networks, 3(1), 27–50.
Zurück zum Zitat Khanpara, P. (2014). A review on fuzzy logic based routing in ad hoc networks. International Journal of Advanced Research in Engineering and Technology, 5(5), 75–81. Khanpara, P. (2014). A review on fuzzy logic based routing in ad hoc networks. International Journal of Advanced Research in Engineering and Technology, 5(5), 75–81.
Zurück zum Zitat Khanpara, P., & Lavingia, K. (2020). Energy conservation in multimedia big data computing and the Internet of Things—A challenge. In Multimedia Big Data Computing for IoT Applications (pp. 37–57). Singapore: Springer. Khanpara, P., & Lavingia, K. (2020). Energy conservation in multimedia big data computing and the Internet of Things—A challenge. In Multimedia Big Data Computing for IoT Applications (pp. 37–57). Singapore: Springer.
Zurück zum Zitat Khanpara, P., & Trivedi, B. (2008). Survivability in MANETs. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 7(1). Khanpara, P., & Trivedi, B. (2008). Survivability in MANETs. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 7(1).
Zurück zum Zitat Khanpara, P., & Trivedi, B. (2017). Security in mobile ad hoc networks. In Proceedings of International Conference on Communication and Networks (pp. 501–511). Singapore: Springer. Khanpara, P., & Trivedi, B. (2017). Security in mobile ad hoc networks. In Proceedings of International Conference on Communication and Networks (pp. 501–511). Singapore: Springer.
Zurück zum Zitat Khanpara, P., & Trivedi, B. (2018). Survivability in MANETs. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 7(1). Khanpara, P., & Trivedi, B. (2018). Survivability in MANETs. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 7(1).
Zurück zum Zitat Khanpara, P., Valiveti, S., & Kotecha, K. (2010). Routing in ad hoc network using ant colony optimization. In International Conference on Future Generation Communication and Networking (pp. 393–404). Berlin, Heidelberg: Springer. Khanpara, P., Valiveti, S., & Kotecha, K. (2010). Routing in ad hoc network using ant colony optimization. In International Conference on Future Generation Communication and Networking (pp. 393–404). Berlin, Heidelberg: Springer.
Zurück zum Zitat Kim, J., & Tsudik, G. (2009). SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks, 7(6), 1097–1109.CrossRef Kim, J., & Tsudik, G. (2009). SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks, 7(6), 1097–1109.CrossRef
Zurück zum Zitat Lacey, T. H., Mills, R. F., Mullins, B. E., Raines, R. A., Oxley, M. E., & Rogers, S. K. (2012). RIPsec—Using reputation-based multilayer security to protect MANETs. Computers & Security, 31(1 (2012): 122–136. Lacey, T. H., Mills, R. F., Mullins, B. E., Raines, R. A., Oxley, M. E., & Rogers, S. K. (2012). RIPsec—Using reputation-based multilayer security to protect MANETs. Computers & Security, 31(1 (2012): 122–136.
Zurück zum Zitat Lin, C., Lai, W., Huang, Y., & Chou, M. (2008). Secure routing protocol with malicious nodes detection for ad hoc networks. In 22nd International Conference on Advanced Information Networking and Applications—Workshops (Aina Workshops 2008), Okinawa (pp. 1272–1277). https://doi.org/10.1109/waina.2008.47. Lin, C., Lai, W., Huang, Y., & Chou, M. (2008). Secure routing protocol with malicious nodes detection for ad hoc networks. In 22nd International Conference on Advanced Information Networking and Applications—Workshops (Aina Workshops 2008), Okinawa (pp. 1272–1277). https://​doi.​org/​10.​1109/​waina.​2008.​47.
Zurück zum Zitat Mahapatra, B., Patnaik, S., & Nayyar, A. (2019). Effect of multiple-agent deployment in MANET. Recent Patents on Computer Science, 12(3), 180–190.CrossRef Mahapatra, B., Patnaik, S., & Nayyar, A. (2019). Effect of multiple-agent deployment in MANET. Recent Patents on Computer Science, 12(3), 180–190.CrossRef
Zurück zum Zitat Moudni, H., Er-rouidi, M., Mouncif, H., & El Hadadi, B. (2016). Secure routing protocols for mobile ad hoc networks. In 2016 International Conference on Information Technology for Organizations Development (IT4OD) (pp. 17). IEEE. Moudni, H., Er-rouidi, M., Mouncif, H., & El Hadadi, B. (2016). Secure routing protocols for mobile ad hoc networks. In 2016 International Conference on Information Technology for Organizations Development (IT4OD) (pp. 17). IEEE.
Zurück zum Zitat Nayyar, A. (2012, January). Simulation based evaluation of reactive routing protocol for MANET. In 2012 Second International Conference on Advanced Computing & Communication Technologies (pp. 561–568). IEEE. Nayyar, A. (2012, January). Simulation based evaluation of reactive routing protocol for MANET. In 2012 Second International Conference on Advanced Computing & Communication Technologies (pp. 561–568). IEEE.
Zurück zum Zitat Nayyar, A. (2013). Enhanced anomaly detection IDS-based scheme for dynamic MANET on-demand (DYMO) routing protocol for MANETS. International Journal of Computer Science and Mobile Computing, 2(4), 384–390. Nayyar, A. (2013). Enhanced anomaly detection IDS-based scheme for dynamic MANET on-demand (DYMO) routing protocol for MANETS. International Journal of Computer Science and Mobile Computing, 2(4), 384–390.
Zurück zum Zitat Padikkapparambil, J., Ncube, C., Singh, K. K., & Singh, A. (2020). Internet of Things technologies for elderly health-care applications. In Emergence of Pharmaceutical Industry Growth with Industrial IoT Approach (pp. 217–243). Academic. Padikkapparambil, J., Ncube, C., Singh, K. K., & Singh, A. (2020). Internet of Things technologies for elderly health-care applications. In Emergence of Pharmaceutical Industry Growth with Industrial IoT Approach (pp. 217–243). Academic.
Zurück zum Zitat Perkins, C. E. (2001, January). Ad hoc networking. Reading: Addison-Wesley. Perkins, C. E. (2001, January). Ad hoc networking. Reading: Addison-Wesley.
Zurück zum Zitat Rajput, S. S., & Trivedi, M.C. (2014). Securing zone routing protocol in manet using authentication technique. In 2014 International Conference on Computational Intelligence and Communication Networks (pp. 872–877). IEEE. Rajput, S. S., & Trivedi, M.C. (2014). Securing zone routing protocol in manet using authentication technique. In 2014 International Conference on Computational Intelligence and Communication Networks (pp. 872–877). IEEE.
Zurück zum Zitat Rath, M., & Pattanayak, B. K. (2019, January 1). Security protocol with ids framework using mobile agent in robotic MANET. International Journal of Information Security and Privacy (IJISP), 13(1), 46–58. Rath, M., & Pattanayak, B. K. (2019, January 1). Security protocol with ids framework using mobile agent in robotic MANET. International Journal of Information Security and Privacy (IJISP), 13(1), 46–58.
Zurück zum Zitat Sachs, G. (2014). The internet of things: Making sense of the next mega-trend. Technical report, Goldman Sachs. Sachs, G. (2014). The internet of things: Making sense of the next mega-trend. Technical report, Goldman Sachs.
Zurück zum Zitat Sehgal, A., Agrawal, R., Bhardwaj, R., & Singh, K. K. (2020). Reliability analysis of wireless link for IOT applications under shadow-fading conditions. Procedia Computer Science, 167, 1515–1523.CrossRef Sehgal, A., Agrawal, R., Bhardwaj, R., & Singh, K. K. (2020). Reliability analysis of wireless link for IOT applications under shadow-fading conditions. Procedia Computer Science, 167, 1515–1523.CrossRef
Zurück zum Zitat Shah, M., & Khanpara, P. (2019). Survey of techniques used for tolerance of flooding attacks in DTN. In Information and Communication Technology for Intelligent Systems (pp. 599–607). Singapore: Springer. Shah, M., & Khanpara, P. (2019). Survey of techniques used for tolerance of flooding attacks in DTN. In Information and Communication Technology for Intelligent Systems (pp. 599–607). Singapore: Springer.
Zurück zum Zitat Singh, A. K., Firoz, N., Tripathi, A., Singh, K. K., Choudhary, P., & Vashist, P. C. (2020a). Internet of Things: From hype to reality. An Industrial IoT Approach for Pharmaceutical Industry Growth, 2, 191.CrossRef Singh, A. K., Firoz, N., Tripathi, A., Singh, K. K., Choudhary, P., & Vashist, P. C. (2020a). Internet of Things: From hype to reality. An Industrial IoT Approach for Pharmaceutical Industry Growth, 2, 191.CrossRef
Zurück zum Zitat Singh, S., & Kumar, D. (2020). Perceptions of security and privacy in Internet of Things. In 2020 International Conference on Inventive Computation Technologies (ICICT) 2020 February 26, 2020 (pp. 810–813). IEEE. Singh, S., & Kumar, D. (2020). Perceptions of security and privacy in Internet of Things. In 2020 International Conference on Inventive Computation Technologies (ICICT) 2020 February 26, 2020 (pp. 810–813). IEEE.
Zurück zum Zitat Singh, M., Sachan, S., Singh, A., & Singh, K. K. (2020b). Internet of Things in pharma industry: possibilities and challenges. In Emergence of Pharmaceutical Industry Growth with Industrial IoT Approach (pp. 195–216). Academic. Singh, M., Sachan, S., Singh, A., & Singh, K. K. (2020b). Internet of Things in pharma industry: possibilities and challenges. In Emergence of Pharmaceutical Industry Growth with Industrial IoT Approach (pp. 195–216). Academic.
Zurück zum Zitat Sreevidya, C, & Nagaraja, G. S. (2018). Secure multicast routing for wireless sensor networks using ACO-AODV with dhke cryptosystem. In: 2018 Second International Conference on Computing Methodologies and Communication (ICCMC) (pp. 733–737). IEEE. Sreevidya, C, & Nagaraja, G. S. (2018). Secure multicast routing for wireless sensor networks using ACO-AODV with dhke cryptosystem. In: 2018 Second International Conference on Computing Methodologies and Communication (ICCMC) (pp. 733–737). IEEE.
Zurück zum Zitat Srivastava, A., Kumar, D., & Gupta, S. C. (2013). Geographic and reactive routing protocols for manet. In 2013 European Modelling Symposium (pp. 590–594). IEEE. Srivastava, A., Kumar, D., & Gupta, S. C. (2013). Geographic and reactive routing protocols for manet. In 2013 European Modelling Symposium (pp. 590–594). IEEE.
Zurück zum Zitat Srivastava, A., Kumar, D., & Gupta, S. C. (2014). Modelling mobility in emergency scenario for manet applications. In 2014 Recent Advances in Engineering and Computational Sciences (RAECS) (pp. 1–6). IEEE. Srivastava, A., Kumar, D., & Gupta, S. C. (2014). Modelling mobility in emergency scenario for manet applications. In 2014 Recent Advances in Engineering and Computational Sciences (RAECS) (pp. 1–6). IEEE.
Zurück zum Zitat Tanwar, S. (2020). Fog data analytics for IoT applications—next generation process model with state-of-the-art technologies. Studies in Big Data, 76, 1–497. (Springer International Publishing). Tanwar, S. (2020). Fog data analytics for IoT applications—next generation process model with state-of-the-art technologies. Studies in Big Data, 76, 1–497. (Springer International Publishing).
Zurück zum Zitat Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless network security 2007 (pp. 103–135). Boston, MA: Springer. Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless network security 2007 (pp. 103–135). Boston, MA: Springer.
Zurück zum Zitat Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In 2013 Ninth International Conference on Computational intElligence and Security December 14, 2013 (pp. 663–667). IEEE. Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In 2013 Ninth International Conference on Computational intElligence and Security December 14, 2013 (pp. 663–667). IEEE.
Metadaten
Titel
Robust and Secure Routing Protocols for MANET-Based Internet of Things Systems—A Survey
verfasst von
Rajvi Trivedi
Pimal Khanpara
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-66222-6_12

Neuer Inhalt