Skip to main content
Erschienen in: Cluster Computing 5/2019

01.12.2017

Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation

verfasst von: G. Venkata Swaroop, G. Murugaboopathi

Erschienen in: Cluster Computing | Sonderheft 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile ad hoc networks (MANETs) have received increasing attention due to their ease of deployment and mobility. However, MANETs are more suspicious to various malicious activates and unauthorized access. In order to overcome this issue, we have proposed a cluster based certificate revocation method to isolate the malicious node and prevent the unauthorized access. The proposed algorithm effectively used to solve security issues in MANET. The proposed framework is demonstrated as following blocks, namely, cluster construction, cluster head selection, certificate authority, node classification, certificate revocation and evaluation of false accusations. Especially, we have proposed ECMS algorithm for identifying the best cluster head in each cluster. The ECMS algorithm is stands for energy (E), connectivity (C), mobility (M) and signal to noise ratio (S). The sensor nodes present in the network are classified into three types, namely, normal node, warned node, and revoked node. In certificate revocation procedure, every node present in the network is monitored with the help of one-hop neighbours. These neighbours are also used to collect the malicious information about the sensor nodes. If any node is wrongly identified as a malicious node then its legitimate nodes send the vindication packets (VPs) to the appropriate gateways to correct the mistake. The performance of the proposed cluster based certificate revocation method is evaluated on the basis of various parameters it includes successful certification ratio (SSR), settling time (ST), average certification delay (ACD), packet delivery ratio, normalized overhead (NRO), end-to-end delay and throughput. The simulation results of the proposed algorithm are compared with the trust based algorithm, non-voting based algorithm and voting based algorithm. The experimental results proved the good performance of the proposed cluster based certificate revocation method.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Giridhar, R., Suresh, S.: Cluster based certificate authority scheme in WSN. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 367–371. IEEE (2016) Giridhar, R., Suresh, S.: Cluster based certificate authority scheme in WSN. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 367–371. IEEE (2016)
2.
Zurück zum Zitat Patil, B., Biradar, S.R.: Cluster based authentication scheme for wireless multimedia sensor networks. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, p. 99. ACM (2016) Patil, B., Biradar, S.R.: Cluster based authentication scheme for wireless multimedia sensor networks. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, p. 99. ACM (2016)
3.
Zurück zum Zitat Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks. Comput. Stand. Interfaces 36(3), 513–523 (2014)CrossRef Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks. Comput. Stand. Interfaces 36(3), 513–523 (2014)CrossRef
4.
Zurück zum Zitat Venkata Swaroop, G., Murugaboopathi, G., Kalaiselvan, S.A.: TAEACK: a time adaptive enhanced ACK mechanism for detecting and preventing sink-hole attacks in MANET. Aust. J. Basic Appl. Sci. 9(27), 291–299 (2015) Venkata Swaroop, G., Murugaboopathi, G., Kalaiselvan, S.A.: TAEACK: a time adaptive enhanced ACK mechanism for detecting and preventing sink-hole attacks in MANET. Aust. J. Basic Appl. Sci. 9(27), 291–299 (2015)
5.
Zurück zum Zitat Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wirel. Commun. 13(5), 8–15 (2006)CrossRef Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wirel. Commun. 13(5), 8–15 (2006)CrossRef
6.
Zurück zum Zitat Rabieh, K., Mahmoud, M., Tonyali, S.: Scalable certificate revocation schemes for smart grid ami networks using bloom filters. IEEE Trans. Dependable Secure Comput. 14(4), 420–432 (2017)CrossRef Rabieh, K., Mahmoud, M., Tonyali, S.: Scalable certificate revocation schemes for smart grid ami networks using bloom filters. IEEE Trans. Dependable Secure Comput. 14(4), 420–432 (2017)CrossRef
7.
Zurück zum Zitat Azer, M.A., El-Kassas, S.M., El-Soudani, M.S.: Certification and revocation schemes in ad hoc networks survey and challenges. In: ICSNC 2007, Second International Conference on Systems and Networks Communications, pp. 17–17. IEEE (2007) Azer, M.A., El-Kassas, S.M., El-Soudani, M.S.: Certification and revocation schemes in ad hoc networks survey and challenges. In: ICSNC 2007, Second International Conference on Systems and Networks Communications, pp. 17–17. IEEE (2007)
8.
Zurück zum Zitat Thein, M.C.M., Thein, T.: An energy efficient cluster-head selection for wireless sensor networks. In: 2010 International Conference on Intelligent systems, modelling and simulation (ISMS), pp. 287–291. IEEE (2010) Thein, M.C.M., Thein, T.: An energy efficient cluster-head selection for wireless sensor networks. In: 2010 International Conference on Intelligent systems, modelling and simulation (ISMS), pp. 287–291. IEEE (2010)
10.
12.
Zurück zum Zitat Rabieh, K., Mahmoud, M.M., Akkaya, K., Tonyali, S.: Scalable certificate revocation schemes for smart grid ami networks using bloom filters. IEEE Trans. Dependable Secure Comput. 14(4), 420–432 (2017)CrossRef Rabieh, K., Mahmoud, M.M., Akkaya, K., Tonyali, S.: Scalable certificate revocation schemes for smart grid ami networks using bloom filters. IEEE Trans. Dependable Secure Comput. 14(4), 420–432 (2017)CrossRef
13.
Zurück zum Zitat Khan, T., Ahmad, N., Cao, Y., Jalal, S.A., Asif, M., ul Haq, S., Cruichshank, H.: Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey. Sci. China Inf. Sci. 60(10), 100301 (2017)CrossRef Khan, T., Ahmad, N., Cao, Y., Jalal, S.A., Asif, M., ul Haq, S., Cruichshank, H.: Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey. Sci. China Inf. Sci. 60(10), 100301 (2017)CrossRef
14.
Zurück zum Zitat Raja, J.B., Pandian, S.C., Pamina, J.: Certificate revocation mechanism in mobile ADHOC grid architecture. Int. J. Comput. Sci. Trends Technol. 5, 125–130 (2017) Raja, J.B., Pandian, S.C., Pamina, J.: Certificate revocation mechanism in mobile ADHOC grid architecture. Int. J. Comput. Sci. Trends Technol. 5, 125–130 (2017)
15.
Zurück zum Zitat Singh, B., Lobiyal, D.K.: A novel energy-aware cluster head selection based on particle swarm optimization for wireless sensor networks. Hum.-Centric Comput. Inf. Sci. 2(1), 13 (2012)CrossRef Singh, B., Lobiyal, D.K.: A novel energy-aware cluster head selection based on particle swarm optimization for wireless sensor networks. Hum.-Centric Comput. Inf. Sci. 2(1), 13 (2012)CrossRef
16.
Zurück zum Zitat Kang, S.H., Nguyen, T.: Distance based thresholds for cluster head selection in wireless sensor networks. IEEE Commun. Lett. 16(9), 1396–1399 (2012)CrossRef Kang, S.H., Nguyen, T.: Distance based thresholds for cluster head selection in wireless sensor networks. IEEE Commun. Lett. 16(9), 1396–1399 (2012)CrossRef
17.
Zurück zum Zitat Liu, W., Nishiyama, H., Ansari, N., Yang, J., Kato, N.: Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 24(2), 239–249 (2013)CrossRef Liu, W., Nishiyama, H., Ansari, N., Yang, J., Kato, N.: Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 24(2), 239–249 (2013)CrossRef
18.
Zurück zum Zitat Rachedi, A., Benslimane, A.: A secure architecture for mobile ad hoc networks. In: International Conference on Mobile Ad-Hoc and Sensor Networks, pp. 424–435. Springer, Berlin (2006) Rachedi, A., Benslimane, A.: A secure architecture for mobile ad hoc networks. In: International Conference on Mobile Ad-Hoc and Sensor Networks, pp. 424–435. Springer, Berlin (2006)
19.
Zurück zum Zitat Gomathi, K., Parvathavarthini, B.: An efficient cluster based key management scheme for MANET with authentication. In: Trendz in Information Sciences & Computing (TISC), pp. 202–205. IEEE (2010) Gomathi, K., Parvathavarthini, B.: An efficient cluster based key management scheme for MANET with authentication. In: Trendz in Information Sciences & Computing (TISC), pp. 202–205. IEEE (2010)
20.
Zurück zum Zitat Abusalah, A., Khokhar, A., Guizani, A.: A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutor. 10(4), 78–93 (2008)CrossRef Abusalah, A., Khokhar, A., Guizani, A.: A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutor. 10(4), 78–93 (2008)CrossRef
22.
Zurück zum Zitat Christopher, D.J.P.: Cluster-based certificate revocation for mobile ad hoc networks Christopher, D.J.P.: Cluster-based certificate revocation for mobile ad hoc networks
23.
Zurück zum Zitat Jose, J., Sasi, S.B.: Certificate revocation in MANET using clustering. In: IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1–3. IEEE (2015) Jose, J., Sasi, S.B.: Certificate revocation in MANET using clustering. In: IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1–3. IEEE (2015)
24.
Zurück zum Zitat Jarang, M.R., Nimbalkar, M.V.: Implementation of cluster based certificate revocation in mobile ad hoc networks. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 610–615. IEEE (2015) Jarang, M.R., Nimbalkar, M.V.: Implementation of cluster based certificate revocation in mobile ad hoc networks. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 610–615. IEEE (2015)
25.
Zurück zum Zitat Maraiya, K., Kant, K., Gupta, N.: Efficient cluster head selection scheme for data aggregation in wireless sensor network. Int. J. Comput. Appl. 23(9), 10–18 (2011) Maraiya, K., Kant, K., Gupta, N.: Efficient cluster head selection scheme for data aggregation in wireless sensor network. Int. J. Comput. Appl. 23(9), 10–18 (2011)
26.
Zurück zum Zitat Park, K., Nishiyama, H., Ansari, N., Kato, N.: Certificate revocation to cope with false accusations in mobile ad hoc networks. In: IEEE 71st, Vehicular Technology Conference (VTC 2010-Spring), pp. 1–5. IEEE (2010) Park, K., Nishiyama, H., Ansari, N., Kato, N.: Certificate revocation to cope with false accusations in mobile ad hoc networks. In: IEEE 71st, Vehicular Technology Conference (VTC 2010-Spring), pp. 1–5. IEEE (2010)
27.
Zurück zum Zitat Rivas, D.A., Barceló-Ordinas, J.M., Zapata, M.G., Morillo-Pozo, J.D.: Security on VANETs: privacy, misbehaving nodes, false information and secure data aggregation. J. Netw. Comput. Appl. 34(6), 1942–1955 (2011)CrossRef Rivas, D.A., Barceló-Ordinas, J.M., Zapata, M.G., Morillo-Pozo, J.D.: Security on VANETs: privacy, misbehaving nodes, false information and secure data aggregation. J. Netw. Comput. Appl. 34(6), 1942–1955 (2011)CrossRef
28.
Zurück zum Zitat Moore, T., Clulow, J., Nagaraja, S., Anderson, R.: New strategies for revocation in ad-hoc networks. In: European Workshop on Security in Ad-hoc and Sensor Networks, pp. 232–246. Springer, Berlin (2007) Moore, T., Clulow, J., Nagaraja, S., Anderson, R.: New strategies for revocation in ad-hoc networks. In: European Workshop on Security in Ad-hoc and Sensor Networks, pp. 232–246. Springer, Berlin (2007)
29.
Zurück zum Zitat Chinni, S., Thomas, J., Ghinea, G., Shen, Z.: Trust model for certificate revocation in ad hoc networks. Ad Hoc Netw. 6(3), 441–457 (2008)CrossRef Chinni, S., Thomas, J., Ghinea, G., Shen, Z.: Trust model for certificate revocation in ad hoc networks. Ad Hoc Netw. 6(3), 441–457 (2008)CrossRef
Metadaten
Titel
Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation
verfasst von
G. Venkata Swaroop
G. Murugaboopathi
Publikationsdatum
01.12.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 5/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1415-1

Weitere Artikel der Sonderheft 5/2019

Cluster Computing 5/2019 Zur Ausgabe