Skip to main content
Erschienen in: Wireless Personal Communications 2/2021

07.05.2021

SEEDRP: a Secure Energy Efficient Dynamic Routing Protocol in Fanets

verfasst von: Vinay Bhardwaj, Navdeep Kaur

Erschienen in: Wireless Personal Communications | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Unmanned Aerial Vehicles (UAVs) are now used for both commercial and military purposes. This technology is not without its share of issues and challenges. The high mobility of UAVs leads to frequent topology changes which may lead to packet loss or routing path failure. The high mobility of the nodes poses a more significant challenge in maintaining active communication links between the nodes. Routing is an integral part of transmission as the establishment of an active route between the source node and the final destination node is vital. It becomes necessary to identify the most optimal path before transmission. To counter these challenges, a secure energy efficient dynamic routing protocol (SEEDRP), is proposed for reliable and secure transmission. The SEEDRP works on two phases (1) SEEDRP-Routing (2) SEEDRP-Security. The first phase implements a distinct dynamic routing algorithm that finds a cost-effective path between the source and the destination nodes. The second phase of the proposed work focuses on a Distinct Dynamic Key generation scheme that secures the transmitted data. The proposed technique is juxtaposed with other existing techniques using a network simulator. The results show that the proposed technique aims at maximizing the QoS standards and helping the nodes save their energy without undermining performance. The SEEDRP scheme helps FANETs achieve good throughput and an effective packet delivery ratio. The SEEDRP is assessed and analyzed using the NS3 simulator to compare its salient characteristics with the existing protocols for FANETs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Choudhary, G., Sharma, V., & You, I. (2019). Sustainable and secure trajectories for the military internet of drones (iod) through an e cient medium access control (mac) protocol. Computers & Electrical Engineering, 74, 59–73CrossRef Choudhary, G., Sharma, V., & You, I. (2019). Sustainable and secure trajectories for the military internet of drones (iod) through an e cient medium access control (mac) protocol. Computers & Electrical Engineering, 74, 59–73CrossRef
2.
Zurück zum Zitat Sanchez-Garc, J., Garc A-Campos, J., Arzamendia, M., Reina, D. G., Toral, S., & Gregor, D. (2018). A survey on unmanned aerial and aquatic vehicle multi-hop networks: Wireless communications, evaluation tools and applications. Computer Communications, 119, 43–65CrossRef Sanchez-Garc, J., Garc A-Campos, J., Arzamendia, M., Reina, D. G., Toral, S., & Gregor, D. (2018). A survey on unmanned aerial and aquatic vehicle multi-hop networks: Wireless communications, evaluation tools and applications. Computer Communications, 119, 43–65CrossRef
3.
Zurück zum Zitat Oubbati, O. S., Lakas, A., Zhou, F., Gunes, M., & Yagoubi, M. B. (2017). A survey on position-based routing protocols for ying ad hoc networks (fanets). Vehicular Communications, 10, 29–56CrossRef Oubbati, O. S., Lakas, A., Zhou, F., Gunes, M., & Yagoubi, M. B. (2017). A survey on position-based routing protocols for ying ad hoc networks (fanets). Vehicular Communications, 10, 29–56CrossRef
4.
Zurück zum Zitat Rubin, I., Zhang, R. (2007). Placement of uavs as communication relays aiding mobile ad hoc wireless networks. In: MILCOM 2007-IEEE Military Communications Conference, IEEE, pp. 1–7. Rubin, I., Zhang, R. (2007). Placement of uavs as communication relays aiding mobile ad hoc wireless networks. In: MILCOM 2007-IEEE Military Communications Conference, IEEE, pp. 1–7.
5.
Zurück zum Zitat Sharma, V., Song, F., You, I., & Atiquzzaman, M. (2017). Energy e cient device discovery for reliable communication in 5g-based iot and bsns using unmanned aerial vehicles. Journal of Network and Computer Applications, 97, 79–95CrossRef Sharma, V., Song, F., You, I., & Atiquzzaman, M. (2017). Energy e cient device discovery for reliable communication in 5g-based iot and bsns using unmanned aerial vehicles. Journal of Network and Computer Applications, 97, 79–95CrossRef
6.
Zurück zum Zitat Halabian, H., Changiz, R., Yu, F. R., Lambadaris, I., & Tang, H. (2012). Optimal reliable relay selection in multiuser cooperative relaying networks. Wireless Networks, 18(6), 591–603CrossRef Halabian, H., Changiz, R., Yu, F. R., Lambadaris, I., & Tang, H. (2012). Optimal reliable relay selection in multiuser cooperative relaying networks. Wireless Networks, 18(6), 591–603CrossRef
7.
Zurück zum Zitat Frew, E. W., & Brown, T. X. (2009). Networking issues for small unmanned aircraft systems. Journal of Intelligent and Robotic Systems, 54(1–3), 21–37CrossRef Frew, E. W., & Brown, T. X. (2009). Networking issues for small unmanned aircraft systems. Journal of Intelligent and Robotic Systems, 54(1–3), 21–37CrossRef
8.
Zurück zum Zitat Shin, D., Sharma, V., Kim, J., Kwon, S., & You, I. (2017). Secure and e cient protocol for route optimization in pmipv6-based smart home iot networks. IEEE Access, 5, 11100–11117CrossRef Shin, D., Sharma, V., Kim, J., Kwon, S., & You, I. (2017). Secure and e cient protocol for route optimization in pmipv6-based smart home iot networks. IEEE Access, 5, 11100–11117CrossRef
9.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2017). Energy and delay e cient dynamic cluster formation using hybrid aga with faco in eaack manets. Wireless Networks, 23(2), 371–385CrossRef Sathiamoorthy, J., & Ramakrishnan, B. (2017). Energy and delay e cient dynamic cluster formation using hybrid aga with faco in eaack manets. Wireless Networks, 23(2), 371–385CrossRef
10.
Zurück zum Zitat He, Y., & Han, Z. (2009). User authentication with provable security against online dictionary attacks. Journal of Networks, 4(3), 200–207CrossRef He, Y., & Han, Z. (2009). User authentication with provable security against online dictionary attacks. Journal of Networks, 4(3), 200–207CrossRef
11.
Zurück zum Zitat Jayaraman, S., Bhagavathiperumal, R., & Mohanakrishnan, U. (2018). A three layered peer-to-peer energy e cient protocol for reliable and secure data transmission in eaack manets. Wireless Personal Communications, 102(1), 201–227CrossRef Jayaraman, S., Bhagavathiperumal, R., & Mohanakrishnan, U. (2018). A three layered peer-to-peer energy e cient protocol for reliable and secure data transmission in eaack manets. Wireless Personal Communications, 102(1), 201–227CrossRef
12.
Zurück zum Zitat Darabkh, K. A., Alfawares, M. G., & Althunibat, S. (2019). Mdrma: Multi-data rate mobility-aware aodv-based protocol for ying ad-hoc networks. Vehicular Communications, 18, 100163CrossRef Darabkh, K. A., Alfawares, M. G., & Althunibat, S. (2019). Mdrma: Multi-data rate mobility-aware aodv-based protocol for ying ad-hoc networks. Vehicular Communications, 18, 100163CrossRef
13.
Zurück zum Zitat Darabkh, K. A., Judeh, M. S., Salameh, H. B., & Althunibat, S. (2018). Mobility aware and dual phase aodv protocol with adaptive hello messages over vehicular ad hoc networks. AEU-International Journal of Electronics and Communications, 94, 277–292CrossRef Darabkh, K. A., Judeh, M. S., Salameh, H. B., & Althunibat, S. (2018). Mobility aware and dual phase aodv protocol with adaptive hello messages over vehicular ad hoc networks. AEU-International Journal of Electronics and Communications, 94, 277–292CrossRef
14.
Zurück zum Zitat Condomines, J.-P., Zhang, R., & Larrieu, N. (2019). Network intrusion detection system for uav ad-hoc communication: From methodology design to real test validation. Ad Hoc Networks, 90, 101759CrossRef Condomines, J.-P., Zhang, R., & Larrieu, N. (2019). Network intrusion detection system for uav ad-hoc communication: From methodology design to real test validation. Ad Hoc Networks, 90, 101759CrossRef
15.
Zurück zum Zitat Bekmezci, I., Sahingoz, O. K., & Temel, S. (2013). Flying ad-hoc networks (fanets): A survey. Ad Hoc Networks, 11(3), 1254–1270CrossRef Bekmezci, I., Sahingoz, O. K., & Temel, S. (2013). Flying ad-hoc networks (fanets): A survey. Ad Hoc Networks, 11(3), 1254–1270CrossRef
16.
Zurück zum Zitat Gupta, L., Jain, R., & Vaszkun, G. (2015). Survey of important issues in uav communication networks. IEEE Communica-tions Surveys & Tutorials, 18(2), 1123–1152CrossRef Gupta, L., Jain, R., & Vaszkun, G. (2015). Survey of important issues in uav communication networks. IEEE Communica-tions Surveys & Tutorials, 18(2), 1123–1152CrossRef
17.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2016). Ceaack{a reduced acknowledgment for better data transmission for manets. International Journal of Computer Network and Information Security (IJCNIS), 8(2), 64–71CrossRef Sathiamoorthy, J., & Ramakrishnan, B. (2016). Ceaack{a reduced acknowledgment for better data transmission for manets. International Journal of Computer Network and Information Security (IJCNIS), 8(2), 64–71CrossRef
18.
Zurück zum Zitat Sathiamoorthy, J., & Ramakrishnan, B. (2018). A competent three-tier fuzzy cluster algorithm for enhanced data trans-mission in cluster eaack manets. Soft Computing, 22(19), 6545–6565CrossRef Sathiamoorthy, J., & Ramakrishnan, B. (2018). A competent three-tier fuzzy cluster algorithm for enhanced data trans-mission in cluster eaack manets. Soft Computing, 22(19), 6545–6565CrossRef
19.
Zurück zum Zitat Arnosti, S. Z., Pires, R. M., Branco, K. R. (2017). Evaluation of cryptography applied to broadcast storm mitigation algorithms in fanets. In 2017 International Conference on Unmanned Aircraft Systems (ICUAS), IEEE, pp. 1368–1377. Arnosti, S. Z., Pires, R. M., Branco, K. R. (2017). Evaluation of cryptography applied to broadcast storm mitigation algorithms in fanets. In 2017 International Conference on Unmanned Aircraft Systems (ICUAS), IEEE, pp. 1368–1377.
20.
Zurück zum Zitat Thompson, R. B., Thulasiraman, P. (2016). Condential and authenticated communications in a large xed-wing uav swarm. In 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), IEEE, pp. 375–382. Thompson, R. B., Thulasiraman, P. (2016). Condential and authenticated communications in a large xed-wing uav swarm. In 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), IEEE, pp. 375–382.
21.
Zurück zum Zitat Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmis-sion in ceaack manets. Journal of Network Communications and Emerging Technologies, 5(1), 144–151 Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmis-sion in ceaack manets. Journal of Network Communications and Emerging Technologies, 5(1), 144–151
22.
Zurück zum Zitat Marina, M. K., & Das, S. R. (2006). Ad hoc on-demand multipath distance vector routing. Wireless communications and mobile computing, 6(7), 969–988CrossRef Marina, M. K., & Das, S. R. (2006). Ad hoc on-demand multipath distance vector routing. Wireless communications and mobile computing, 6(7), 969–988CrossRef
23.
Zurück zum Zitat Chatterjee, P., Sengupta, I., & Ghosh, S. K. (2012). Stacrp: A secure trusted auction oriented clustering based routing protocol for manet. Cluster Computing, 15(3), 303–320CrossRef Chatterjee, P., Sengupta, I., & Ghosh, S. K. (2012). Stacrp: A secure trusted auction oriented clustering based routing protocol for manet. Cluster Computing, 15(3), 303–320CrossRef
24.
Zurück zum Zitat Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2017). Stfdr: Architecture of competent protocol for e cient route discovery and reliable transmission in ceaack manets. Wireless Personal Communications, 97(4), 5817–5839CrossRef Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2017). Stfdr: Architecture of competent protocol for e cient route discovery and reliable transmission in ceaack manets. Wireless Personal Communications, 97(4), 5817–5839CrossRef
25.
Zurück zum Zitat Razak, S. A., Furnell, S. M., & Brooke, P. J. (2004). Attacks against mobile ad hoc networks routing protocol. In 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting. Razak, S. A., Furnell, S. M., & Brooke, P. J. (2004). Attacks against mobile ad hoc networks routing protocol. In 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting.
26.
Zurück zum Zitat Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). A reliable and secure data transmission in ceaack manets using distinct dynamic key with classi ed digital signature cryptographic algorithm. In 2015 International Conference on Computing and Communications Technologies (ICCCT), IEEE, pp. 144–151. Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). A reliable and secure data transmission in ceaack manets using distinct dynamic key with classi ed digital signature cryptographic algorithm. In 2015 International Conference on Computing and Communications Technologies (ICCCT), IEEE, pp. 144–151.
27.
Zurück zum Zitat Nayak, C. (2012). Performance of various algorithms used in cryptography. International Journal of Managment, IT and Engineering, 2(7), 123–128 Nayak, C. (2012). Performance of various algorithms used in cryptography. International Journal of Managment, IT and Engineering, 2(7), 123–128
28.
Zurück zum Zitat Singh, K., & Verma, A. K. (2015). Experimental analysis of aodv, dsdv and olsr routing protocol for ying adhoc networks (fanets). In 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), IEEE, pp. 1–4. Singh, K., & Verma, A. K. (2015). Experimental analysis of aodv, dsdv and olsr routing protocol for ying adhoc networks (fanets). In 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), IEEE, pp. 1–4.
29.
Zurück zum Zitat Sharma, V., Kumar, R., & Kumar, N. (2018). Dptr: Distributed priority tree-based routing protocol for fanets. Computer Communications, 122, 129–151CrossRef Sharma, V., Kumar, R., & Kumar, N. (2018). Dptr: Distributed priority tree-based routing protocol for fanets. Computer Communications, 122, 129–151CrossRef
30.
Zurück zum Zitat Li, X., & Yan, J. (2017). Lepr: Link stability estimation-based preemptive routing protocol for ying ad hoc networks. In 2017 IEEE Symposium on Computers and Communications (ISCC), IEEE, pp. 1079–1084. Li, X., & Yan, J. (2017). Lepr: Link stability estimation-based preemptive routing protocol for ying ad hoc networks. In 2017 IEEE Symposium on Computers and Communications (ISCC), IEEE, pp. 1079–1084.
31.
Zurück zum Zitat Sathiamoorthy, J., Ramakrishnan, B., et al. (2017). Design of a pro cient hybrid protocol for efficient route discovery and secure data transmission in ceaack manets. Journal of information security and applications, 36, 43–58CrossRef Sathiamoorthy, J., Ramakrishnan, B., et al. (2017). Design of a pro cient hybrid protocol for efficient route discovery and secure data transmission in ceaack manets. Journal of information security and applications, 36, 43–58CrossRef
32.
Zurück zum Zitat Gankhuyag, G., Shrestha, A. P., & Yoo, S.-J. (2017). Robust and reliable predictive routing strategy for ying ad-hoc networks. IEEE Access, 5, 643–654CrossRef Gankhuyag, G., Shrestha, A. P., & Yoo, S.-J. (2017). Robust and reliable predictive routing strategy for ying ad-hoc networks. IEEE Access, 5, 643–654CrossRef
33.
Zurück zum Zitat Clapper, J., Young, J., Cartwright, J., & Grimes, J. Unmanned systems roadmap 2007–2032, O ce of the Secretary of Defense 188. Clapper, J., Young, J., Cartwright, J., & Grimes, J. Unmanned systems roadmap 2007–2032, O ce of the Secretary of Defense 188.
34.
Zurück zum Zitat Kerrache, C. A., Barka, E., Lagraa, N., & Lakas, A. (2017). Reputation-aware energy-efficient solution for fanet monitoring. In 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC), IEEE, pp. 1–6. Kerrache, C. A., Barka, E., Lagraa, N., & Lakas, A. (2017). Reputation-aware energy-efficient solution for fanet monitoring. In 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC), IEEE, pp. 1–6.
35.
Zurück zum Zitat Denis, R., & Madhubala, P. (2020). Evolutionary computing assisted visually imperceptible hybrid cryptography and steganography model for secure data communication over cloud environment. International Journal of Computer Networks and Applications (IJCNA), 7(6), 208–230.CrossRef Denis, R., & Madhubala, P. (2020). Evolutionary computing assisted visually imperceptible hybrid cryptography and steganography model for secure data communication over cloud environment. International Journal of Computer Networks and Applications (IJCNA), 7(6), 208–230.CrossRef
36.
Zurück zum Zitat Rahim, R., Murugan, S., Priya, S., Magesh, S., & Manikandan, R. (2020). Taylor based grey wolf optimization algorithm (TGWOA) for energy aware secure routing protocol. International Journal of Computer Networks and Applications (IJCNA), 7(4), 93–102.CrossRef Rahim, R., Murugan, S., Priya, S., Magesh, S., & Manikandan, R. (2020). Taylor based grey wolf optimization algorithm (TGWOA) for energy aware secure routing protocol. International Journal of Computer Networks and Applications (IJCNA), 7(4), 93–102.CrossRef
37.
Zurück zum Zitat Bhardwaj, V., Kaur, N., Vashisht, S., & Jain, S. (2020). SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks. Transactions on Emerging Telecommunications Technologies. Bhardwaj, V., Kaur, N., Vashisht, S., & Jain, S. (2020). SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks. Transactions on Emerging Telecommunications Technologies.
38.
Zurück zum Zitat Usha, M., Sathiamoorthy, J., Ashween, R., & Ramakrishnan, B. N. (2020). Eemccp-a novel architecture protocol design for e cient data transmission in underwater acoustic wireless sensor network. International Journal of Computer Networks and Applications, 7(2), 28–42CrossRef Usha, M., Sathiamoorthy, J., Ashween, R., & Ramakrishnan, B. N. (2020). Eemccp-a novel architecture protocol design for e cient data transmission in underwater acoustic wireless sensor network. International Journal of Computer Networks and Applications, 7(2), 28–42CrossRef
Metadaten
Titel
SEEDRP: a Secure Energy Efficient Dynamic Routing Protocol in Fanets
verfasst von
Vinay Bhardwaj
Navdeep Kaur
Publikationsdatum
07.05.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08513-0

Weitere Artikel der Ausgabe 2/2021

Wireless Personal Communications 2/2021 Zur Ausgabe

Neuer Inhalt