Skip to main content

Effective Path Discovery Among Clusters for Secure Transmission of Data in MANET

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 324))

Abstract

Ad hoc networks are new paradigm of wireless communication for mobile host. Owing to vulnerable nature of mobile ad hoc network (MANET), there are numerous security threats that disturb the development of MANET. In order to overcome such threats, an efficient anonymous routing protocol for MANETs is proposed. For this, secure neighbor should be discovered. After finding the secure neighbors, neighbors are clustered to form zones. For each group of clusters, cluster head (CH) is associated. Instead of sending the route request message to every neighbor nodes, the route request message would be send only to the CH. The CH would decide which all nodes should participate in the routing. The overhead for sending messages gets reduced as the number of route request messages (RREQ) sent is minimum. Among the different paths in the clusters, the shortest path will be determined. This protocol guarantees the security, anonymity, and high reliability of an established route.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Y.C. Hu, A. Perrig, D.B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in 8th annual international conference on mobile computing and networking (mobicom ’02) (2002)

    Google Scholar 

  2. Y.-C. Hu, D.B Johnson, A. Perrig, Secure Efficient Ad Hoc Distance Vector (SEAD) (Elsevier, 2003)

    Google Scholar 

  3. S. Lu, L. Li, K.-Y. Lam, L. Jia, SAODV: A MANET routing protocol that can withstand black hole attack, in Computational Intelligence and Security, CIS ‘09, vol. 2 (2009)

    Google Scholar 

  4. P. Nagrath, S. Mehla, B. Gupta, ARAN: analyzing security of authenticated routing protocol. Int. J. Comput. Sci. Eng. (IJCSE) 02(03), 664–668

    Google Scholar 

  5. J. Kong, X. Hong, ANODR: anonymous on demand routing with untraceable routes for mobile adhoc networks, in Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Computer Science Department University of California, 2003)

    Google Scholar 

  6. A. Boukerche, K. El-Khatib, L. Xu, SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks, in 29th Annual IEEE International Conference on Local Computer Networks (University of Ottawa, 2004)

    Google Scholar 

  7. R. Song, L. Korba, G. Yee, AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-Hoc Networks (NRC Publications, 2005)

    Google Scholar 

  8. T. Sheltami, H.T. Mouftah, An efficient energy aware cluster head formation infrastructure protocol for MANETs, in Eighth IEEE International Symposium on Computers and Communication (2003)

    Google Scholar 

  9. X. Wang, H. Cheng, H. Huang, Constructing a MANET Based on Clusters (Springer Science+Business Media, New York, 2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Madhavan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Madhavan, P., Malathi, P., Abinaya, R. (2015). Effective Path Discovery Among Clusters for Secure Transmission of Data in MANET. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_55

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2126-5_55

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2125-8

  • Online ISBN: 978-81-322-2126-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics