Abstract
In mobile ad hoc networks (MANET), the malicious attackers may attack the location information and routing messages. Hence these information need to be protected by means of authentication, integrity and encryption. In this paper, we propose a privacy preservation and protection for cluster based geographic routing protocol in MANET. In this technique, cluster head is chosen based on node value which is estimated based on degree difference, node mobility and residual energy. The cluster consists of GPS enabled node and antenna equipped node. The cluster that contains at least one G-Node considers the remaining energy, speed of the node along with the mobility of node to select the cluster head. In order to perform privacy and anonymity protection of cluster members, the cluster head then initializes group signature scheme. Then the secured routing technique is deployed where the routing packets are protected by encryption. By simulation results, we show that the proposed technique reduces the network overhead.
Similar content being viewed by others
References
Lin, H. & Labiod, H. (2006). INGEO: INdoor GEOgraphic routing protocol for MANETs. In Proceedings of the 3rd International Conference on Mobile Computing and Ubiquitous Networking, 2006.
Yen, Y. S., Chao, H. C., Chang, R. S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.
Dvir, A., & Vasilakos, A. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.
Zou, C., & Chigan, C. (2009). On anonymous on-demand source routing protocol for MANETs. Wiley’s Journal of Security and Communication Networks, 2(6), 476–491.
Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, PP(99), 1–13.
Yang, M., Li, Y., Jin, D., Zeng, L., Xin, W., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. ACM/Springer Mobile Networks and Applications, 20(1), 4–18.
Marwaha, S., Srinivasan, D., Tham, Chen. Khong., & Athanasios, V. V. (2004). Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks. Evolutionary Computation, 2, 1964–1971.
Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.
Peng, L., Song, G., Shui, Y., & Athanasios, V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In IEEE 2012 Proceedings of INFOCOM, Orlando, FL.
Li, P., Guo, S., Shui, Y., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.
Spyropoulos, T., Rais, R. N. B., Turletti, T., Obraczka, K., & Vasilakos, A. (2010). Routing for disruption tolerant networks: taxonomy and design. Wireless Networks, 16(8), 2349–2370.
Vasilakos, A., Zhang, Y., & Spyropoulos, T. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.
Costas, B., Kannan, R., & Athanasios, V. V. (2012). Approximating congestion + dilation in networks via “Quality of Routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.
Youssef, M., Ibrahim, M., Abdelatif, M., Lin, C., & Athanasios, V. V. (2014). Routing metrics of cognitive radio networks: a survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.
Xiang, X., Zhou, Z., & Wang, X. (2007). Self-adaptive on demand geographic routing protocols for mobile ad hoc networks. In IEEE Communications Society Subject Matter Experts for Publication in the IEEE INFOCOM 2007 Proceedings.
Rathidevi, E., & Kumaran, N. S. (2013). Geographical routing in MANET using flexible combination of push and pull algorithm. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064, March 2013.
Athanasios, V. V., Lib, Z., Simonb, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.
Quan, W., Xu, C. Vasilakos, A. V., & Guan, J. (2014). TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in content-centric networking. IFIP Networking (to appear).
Ramteke, R., & Panda, S. K. (2011). Attacks on geographic routing protocols for wireless sensor network (thesis).
Venkatesan, K. G. S., Resmi, R., & Remya, R. (2014). Anonymizing geographic routing for preserving location privacy using unlinkability and unobservability. International Journal of Advanced Research in Computer Science and Software Engineering, 4(3), 523–528.
Handrale, S., & Pathan, S. K. (2014). Location based and energy efficient anonymous routing protocol for MANET. International Journal of Computer Science and Information Technologies, 5(6), 7789–7794.
Attar, A., Tang, H., Richard Yu, F., & Vasilakos, A. (2012). A survey of security challenges in cognitive radio networks: solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.
Muthusenthil, B., & Murugavalli, S. (2014). Location aided cluster based geographical routing protocol for intermittently connected MANET. International Review on Computers and Software, 9(1), 1–9.
Ben Mahmoud, M. S., & Larrieu, N. (2013). An ADS-B based secure geographical routing protocol for aeronautical ad hoc networks. In Proceedings of the IEEE 36th Annual Computer Software and Applications Conference (COMPSAC).
Sharon Ranjini, S., & Shine Let, G. (2013). Security-efficient routing for highly dynamic MANETS 2013. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, 2(4).
Leinmuller, T., Maihofer, C., Schoch, E., & Kargl, F. (2006). Improved security in geographical adhoc routing through autonomous position verification. In 2006 Proceeding Vanet 06 of the 3rd International Workshop on Vechicular adhoc Networks.
Shen, H., & Zhao, L. (2013). ALERT: An anonymous location-based efficient routing protocol in MANETs. IEEE Transactions on Mobile Computing, 12(6), 1079–1093.
El Defrawy, K., & Tsudik, G. (2011). ALARM: Anonymous location-aided routing in suspicious MANETs. Mobile Computing IEEE Transactions, 10, 1345–1358.
Lyu, C., Gu, D., Zhang, Y., Lin, T., & Zhang, X. (2013). Towards efficient and secure geographic routing protocol for hostile wireless sensor networks. International Journal of Distributed Sensor Networks, Networks, 2013.
Zhang, X. M., Gu, D., Zhang, Y., Lin, T., & Zhang, X. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.
Song, Y., Liu, L., Ma, H., & Vasilakos, A. V. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.
Liang, L., Song, Y., Zhang, H., Ma, H., & Vasilakos, A. V. (2015). Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.
Bagherian, E., & Khorsandi, S. ARMAN: A new anonymous routing protocol for mobile Ad-Hoc networks, ©2009 IEEE.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Muthusenthil, B., Murugavalli, S. Privacy preservation and protection for cluster based geographic routing protocol in MANET. Wireless Netw 23, 79–87 (2017). https://doi.org/10.1007/s11276-015-1135-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-015-1135-5