Abstract
In recent decades, the Internet of things (IoT) has had a huge impact on various domains, such as logistics, health care, robotics, and manufacturing, coping with an enormous amount of data transferred by different resource-constrained IoT network devices. For diverse applications, IoT can be seen as a network of devices comprising hardware, software, sensors, actuators, and connectivity allowing the networked system to link, communicate, and share information. In IoT configurations, billions of devices can be connected to the Internet to transfer data quickly, efficiently, and securely. Though there are great advancements in IoT technologies, certain limitations are still to be considered. Firstly, IoT devices have limited resources like memory, computing power, and energy (Khanpara and Lavingia in Multimedia big data computing for IoT applications. Springer, Singapore, pp. 37–57, 2020). Besides, IoT devices may link the behavior of a person to their identity which challenges the privacy of a person. Many researchers have made numerous successful attempts to integrate reliable protocols with IoT devices that can function efficiently in a resource-constrained environment and robustly against data transmission security and privacy issues. IoT integrates with the wireless sensor network (WSN) and the mobile ad hoc network (MANET) in smart environments and is becoming much more desirable and economically efficient. The MANET is not only ideal for disaster situations but can also be used for robotic communication. Interaction with the IoT systems between WSNs and MANETs enables the development of new MANET-based IoT systems which give the consumer more mobility and lower costs. At the same time, the networking aspects open up new challenging issues. Hence, this chapter discusses various existing secure MANET protocols that provide secure data transmission and can also be used in the IoT environment to provide robustness in the presence of a variety of threats and vulnerabilities. This chapter also presents some major challenges in the emerging domain of MANET-based IoT systems for robotics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abusalah, L., Khokhar, A., & Guizani, M. (2008a). A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys & Tutorials, 10(4), 78–93.
Abusalah, L, Khokhar, A., & Guizani, M. (2008b). A survey of secure mobile Ad Hoc routing protocols. In IEEE Communications Surveys & Tutorials (Vol. 10, Issue No. 4, pp. 78–93), Fourth Quarter. https://doi.org/10.1109/surv.2008.080407.
Afzal, S. R., Biswas, S., Koh, J., Raza, T., Lee, G., & Kim, D. (2008). RSRP: a robust secure routing protocol for mobile ad hoc networks. In 2008 IEEE Wireless Communications and Networking Conference, Las Vegas, NV (pp. 2313–2318). 10.1109/WCNC.2008.408.
Ahmad, M., Chen, Q., Najam-Ul-Islam, M., Iqbal, M. A., & Hussain, S. (2017). On the secure optimized link state routing (SOLSR) protocol for MANETs. In 2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), Nanjing.
Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198–213.
Alam, T., & Aljohanim M. (2015). Design and implementation of an Ad Hoc Network among Android smart devices. In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT) (pp. 1322–1327). IEEE. https://doi.org/10.1109/ICGCIoT.2015.7380671.
Alam, T. (2019a). IoT-Fog: A communication framework using blockchain in the Internet of Things. International Journal of Recent Technology and Engineering (IJRTE), 7(6).
Alam, T. (2019b). Blockchain and its role in the Internet of Things (IoT). International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 5(1), 151–157. https://doi.org/10.32628/CSEIT195137.
Alam, T., & Benaida, M. (2019). The role of cloud-MANET framework in the Internet of Things (IoT). International Journal of Online Engineering (iJOE), 14(12), 97–111. https://doi.org/10.3991/ijoe.v14i12.8338.
Alam, T., & Rababah, B. (2019). Convergence of MANET in communication among smart devices in IoT. International Journal of Wireless and Microwave Technologies (IJWMT), 9(2), 1–10. https://doi.org/10.5815/ijwmt.2019.02.01.
Boulaiche, M., & Bouallouche-Medjkoune, L. (2017). Hsecgr: Highly secure geographic routing. Journal of Network and Computer Applications, 80, 189–199.
Bruzgiene, R., Narbutaite, L., & Adomkus, T. (2017). MANET network in Internet of Things system. In J. H. Ortiz & A. P. de la Cruz (Eds.), Ad Hoc networks. Rijeka: InTech. https://doi.org/10.5772/66408.
Deepika, D., & Anand, N. (2013). Complete scenario of routing protocols, security leaks and attacks in MANETs. Journal Proceedings of the IJARCSEE, 3(10).
Dhiman, D., & Nayyar, A. (2013). Complete scenario of routing protocols security leaks and attacks in MANETs. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10).
Dubey, S., Singh, P., Yadav, P., & Singh, K. K. (2020). Household waste management system using IoT and machine learning. Procedia Computer Science, 167, 1950–1959.
Gupta, R., Tanwar, S., Al-Turjman, F., Italiya, P., Nauman, A., & Kim, S. W. (2020). Smart contract privacy protection using AI in cyber-physical systems: tools, techniques and challenges. IEEE Access, 8, 24746–24772.
Karlsson, J., Dooley, L., & Pulkkis, G. (2012). Routing security in mobile ad-hoc networks. Issues in Informing Science and Information Technology, 9, 369–383.
Karlsson, J., Dooley, L. S., & Pulkkis, G. (2018, August). Secure routing for MANET connected Internet of Things systems. In 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 114–119). IEEE.
Karthigeyan, I., Manoj, B. S., & Murthy, C. S. R. (2005). A distributed laxity-based priority scheduling scheme for time-sensitive traffic in mobile ad hoc networks. Ad Hoc Networks, 3(1), 27–50.
Khanpara, P. (2014). A review on fuzzy logic based routing in ad hoc networks. International Journal of Advanced Research in Engineering and Technology, 5(5), 75–81.
Khanpara, P., & Lavingia, K. (2020). Energy conservation in multimedia big data computing and the Internet of Things—A challenge. In Multimedia Big Data Computing for IoT Applications (pp. 37–57). Singapore: Springer.
Khanpara, P., & Trivedi, B. (2008). Survivability in MANETs. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 7(1).
Khanpara, P., & Trivedi, B. (2017). Security in mobile ad hoc networks. In Proceedings of International Conference on Communication and Networks (pp. 501–511). Singapore: Springer.
Khanpara, P., & Trivedi, B. (2018). Survivability in MANETs. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 7(1).
Khanpara, P., Valiveti, S., & Kotecha, K. (2010). Routing in ad hoc network using ant colony optimization. In International Conference on Future Generation Communication and Networking (pp. 393–404). Berlin, Heidelberg: Springer.
Kim, J., & Tsudik, G. (2009). SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks, 7(6), 1097–1109.
Lacey, T. H., Mills, R. F., Mullins, B. E., Raines, R. A., Oxley, M. E., & Rogers, S. K. (2012). RIPsec—Using reputation-based multilayer security to protect MANETs. Computers & Security, 31(1 (2012): 122–136.
Lin, C., Lai, W., Huang, Y., & Chou, M. (2008). Secure routing protocol with malicious nodes detection for ad hoc networks. In 22nd International Conference on Advanced Information Networking and Applications—Workshops (Aina Workshops 2008), Okinawa (pp. 1272–1277). https://doi.org/10.1109/waina.2008.47.
Lueth, K. L. (2018). State of the IoT 2018: Number of IoT devices now at 7B–market accelerating, 2018. https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/ (visited on 03/04/2019).
Mahapatra, B., Patnaik, S., & Nayyar, A. (2019). Effect of multiple-agent deployment in MANET. Recent Patents on Computer Science, 12(3), 180–190.
Moudni, H., Er-rouidi, M., Mouncif, H., & El Hadadi, B. (2016). Secure routing protocols for mobile ad hoc networks. In 2016 International Conference on Information Technology for Organizations Development (IT4OD) (pp. 17). IEEE.
Nayyar, A. (2012, January). Simulation based evaluation of reactive routing protocol for MANET. In 2012 Second International Conference on Advanced Computing & Communication Technologies (pp. 561–568). IEEE.
Nayyar, A. (2013). Enhanced anomaly detection IDS-based scheme for dynamic MANET on-demand (DYMO) routing protocol for MANETS. International Journal of Computer Science and Mobile Computing, 2(4), 384–390.
Padikkapparambil, J., Ncube, C., Singh, K. K., & Singh, A. (2020). Internet of Things technologies for elderly health-care applications. In Emergence of Pharmaceutical Industry Growth with Industrial IoT Approach (pp. 217–243). Academic.
Perkins, C. E. (2001, January). Ad hoc networking. Reading: Addison-Wesley.
Qiu, X., Liu, J., & Sangi, A. R. (2010). MTSR: Wormhole attack resistant secure routing for Ad hoc network. In 2010 IEEE Youth Conference on Information, Computing and Telecommunications, Beijing (pp. 419–422). https://doi.org/10.1109/ycict.2010.5713134.
Rajput, S. S., & Trivedi, M.C. (2014). Securing zone routing protocol in manet using authentication technique. In 2014 International Conference on Computational Intelligence and Communication Networks (pp. 872–877). IEEE.
Rath, M., & Pattanayak, B. K. (2019, January 1). Security protocol with ids framework using mobile agent in robotic MANET. International Journal of Information Security and Privacy (IJISP), 13(1), 46–58.
Remya, S., & Lakshmi, K. S. (2015). SHARP: Secured hierarchical anonymous routing protocol for MANETs. In 2015 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, 2015 (pp. 1–6). https://doi.org/10.1109/iccci.2015.7218121.
RPL. (2012). IPv6 Routing Protocol for Low-Power and Lossy Networks, Request for Comments (RFC) 6550, IETF. http://tools.ietf.org/html/rfc6550.
Sachs, G. (2014). The internet of things: Making sense of the next mega-trend. Technical report, Goldman Sachs.
Sehgal, A., Agrawal, R., Bhardwaj, R., & Singh, K. K. (2020). Reliability analysis of wireless link for IOT applications under shadow-fading conditions. Procedia Computer Science, 167, 1515–1523.
Shah, M., & Khanpara, P. (2019). Survey of techniques used for tolerance of flooding attacks in DTN. In Information and Communication Technology for Intelligent Systems (pp. 599–607). Singapore: Springer.
Singh, U. (2011). Secure routing protocol in mobile ad hoc networks—A survey and taxonomy. International Journal of Reviews in Computing, 7(2), 9–17. http://www.ijric.org/volumes/Vol7/Vol7No2.pdf.
Singh, A. K., Firoz, N., Tripathi, A., Singh, K. K., Choudhary, P., & Vashist, P. C. (2020a). Internet of Things: From hype to reality. An Industrial IoT Approach for Pharmaceutical Industry Growth, 2, 191.
Singh, S., & Kumar, D. (2020). Perceptions of security and privacy in Internet of Things. In 2020 International Conference on Inventive Computation Technologies (ICICT) 2020 February 26, 2020 (pp. 810–813). IEEE.
Singh, M., Sachan, S., Singh, A., & Singh, K. K. (2020b). Internet of Things in pharma industry: possibilities and challenges. In Emergence of Pharmaceutical Industry Growth with Industrial IoT Approach (pp. 195–216). Academic.
Sreevidya, C, & Nagaraja, G. S. (2018). Secure multicast routing for wireless sensor networks using ACO-AODV with dhke cryptosystem. In: 2018 Second International Conference on Computing Methodologies and Communication (ICCMC) (pp. 733–737). IEEE.
Srivastava, A., Kumar, D., & Gupta, S. C. (2013). Geographic and reactive routing protocols for manet. In 2013 European Modelling Symposium (pp. 590–594). IEEE.
Srivastava, A., Kumar, D., & Gupta, S. C. (2014). Modelling mobility in emergency scenario for manet applications. In 2014 Recent Advances in Engineering and Computational Sciences (RAECS) (pp. 1–6). IEEE.
Tanwar, S. (2020). Fog data analytics for IoT applications—next generation process model with state-of-the-art technologies. Studies in Big Data, 76, 1–497. (Springer International Publishing).
Transmission of IPv6 Packets over IEEE 802.15.4 Networks, Request for Comments (RFC) 4944, IETF, 2007. http://tools.ietf.org/html/rfc4944.
Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless network security 2007 (pp. 103–135). Boston, MA: Springer.
Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In 2013 Ninth International Conference on Computational intElligence and Security December 14, 2013 (pp. 663–667). IEEE.
Zhitang, L., & Shudong, S. (2007). A secure routing protocol for mobile ad hoc networks. In 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), Melbourne, Qld. (pp. 153–157). https://doi.org/10.1109/icis.2007.43.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Trivedi, R., Khanpara, P. (2021). Robust and Secure Routing Protocols for MANET-Based Internet of Things Systems—A Survey. In: Singh, K.K., Nayyar, A., Tanwar, S., Abouhawwash, M. (eds) Emergence of Cyber Physical System and IoT in Smart Automation and Robotics. Advances in Science, Technology & Innovation. Springer, Cham. https://doi.org/10.1007/978-3-030-66222-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-66222-6_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66221-9
Online ISBN: 978-3-030-66222-6
eBook Packages: Earth and Environmental ScienceEarth and Environmental Science (R0)