Advertisement

Cluster Computing

, Volume 22, Supplement 5, pp 11513–11525 | Cite as

Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation

  • G. Venkata SwaroopEmail author
  • G. Murugaboopathi
Article

Abstract

Mobile ad hoc networks (MANETs) have received increasing attention due to their ease of deployment and mobility. However, MANETs are more suspicious to various malicious activates and unauthorized access. In order to overcome this issue, we have proposed a cluster based certificate revocation method to isolate the malicious node and prevent the unauthorized access. The proposed algorithm effectively used to solve security issues in MANET. The proposed framework is demonstrated as following blocks, namely, cluster construction, cluster head selection, certificate authority, node classification, certificate revocation and evaluation of false accusations. Especially, we have proposed ECMS algorithm for identifying the best cluster head in each cluster. The ECMS algorithm is stands for energy (E), connectivity (C), mobility (M) and signal to noise ratio (S). The sensor nodes present in the network are classified into three types, namely, normal node, warned node, and revoked node. In certificate revocation procedure, every node present in the network is monitored with the help of one-hop neighbours. These neighbours are also used to collect the malicious information about the sensor nodes. If any node is wrongly identified as a malicious node then its legitimate nodes send the vindication packets (VPs) to the appropriate gateways to correct the mistake. The performance of the proposed cluster based certificate revocation method is evaluated on the basis of various parameters it includes successful certification ratio (SSR), settling time (ST), average certification delay (ACD), packet delivery ratio, normalized overhead (NRO), end-to-end delay and throughput. The simulation results of the proposed algorithm are compared with the trust based algorithm, non-voting based algorithm and voting based algorithm. The experimental results proved the good performance of the proposed cluster based certificate revocation method.

Keywords

Mobile ad hoc networks (MANETs) Certificate revocation Security Energy Connectivity Mobility Signal to noise ratio 

References

  1. 1.
    Giridhar, R., Suresh, S.: Cluster based certificate authority scheme in WSN. In: International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 367–371. IEEE (2016)Google Scholar
  2. 2.
    Patil, B., Biradar, S.R.: Cluster based authentication scheme for wireless multimedia sensor networks. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, p. 99. ACM (2016)Google Scholar
  3. 3.
    Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks. Comput. Stand. Interfaces 36(3), 513–523 (2014)CrossRefGoogle Scholar
  4. 4.
    Venkata Swaroop, G., Murugaboopathi, G., Kalaiselvan, S.A.: TAEACK: a time adaptive enhanced ACK mechanism for detecting and preventing sink-hole attacks in MANET. Aust. J. Basic Appl. Sci. 9(27), 291–299 (2015)Google Scholar
  5. 5.
    Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wirel. Commun. 13(5), 8–15 (2006)CrossRefGoogle Scholar
  6. 6.
    Rabieh, K., Mahmoud, M., Tonyali, S.: Scalable certificate revocation schemes for smart grid ami networks using bloom filters. IEEE Trans. Dependable Secure Comput. 14(4), 420–432 (2017)CrossRefGoogle Scholar
  7. 7.
    Azer, M.A., El-Kassas, S.M., El-Soudani, M.S.: Certification and revocation schemes in ad hoc networks survey and challenges. In: ICSNC 2007, Second International Conference on Systems and Networks Communications, pp. 17–17. IEEE (2007)Google Scholar
  8. 8.
    Thein, M.C.M., Thein, T.: An energy efficient cluster-head selection for wireless sensor networks. In: 2010 International Conference on Intelligent systems, modelling and simulation (ISMS), pp. 287–291. IEEE (2010)Google Scholar
  9. 9.
    Varatharajan, R., Manogaran, G., Priyan, M.K., Sundarasekar, R.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust. Comput.  https://doi.org/10.1007/s10586-017-0977-2 (2017)
  10. 10.
    Varatharajan, R., Manogaran, G., Priyan, M.K., Balaş, V.E., Barna, C.: Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimed. Tools Appl.  https://doi.org/10.1007/s11042-017-4768-9 (2017)
  11. 11.
    Varatharajan, R., Vasanth, K., Gunasekaran, M., Priyan, M., Gao, X.Z.: An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Comput. Electr. Eng.  https://doi.org/10.1016/j.compeleceng.2017.05.035Get (2017)
  12. 12.
    Rabieh, K., Mahmoud, M.M., Akkaya, K., Tonyali, S.: Scalable certificate revocation schemes for smart grid ami networks using bloom filters. IEEE Trans. Dependable Secure Comput. 14(4), 420–432 (2017)CrossRefGoogle Scholar
  13. 13.
    Khan, T., Ahmad, N., Cao, Y., Jalal, S.A., Asif, M., ul Haq, S., Cruichshank, H.: Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey. Sci. China Inf. Sci. 60(10), 100301 (2017)CrossRefGoogle Scholar
  14. 14.
    Raja, J.B., Pandian, S.C., Pamina, J.: Certificate revocation mechanism in mobile ADHOC grid architecture. Int. J. Comput. Sci. Trends Technol. 5, 125–130 (2017)Google Scholar
  15. 15.
    Singh, B., Lobiyal, D.K.: A novel energy-aware cluster head selection based on particle swarm optimization for wireless sensor networks. Hum.-Centric Comput. Inf. Sci. 2(1), 13 (2012)CrossRefGoogle Scholar
  16. 16.
    Kang, S.H., Nguyen, T.: Distance based thresholds for cluster head selection in wireless sensor networks. IEEE Commun. Lett. 16(9), 1396–1399 (2012)CrossRefGoogle Scholar
  17. 17.
    Liu, W., Nishiyama, H., Ansari, N., Yang, J., Kato, N.: Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 24(2), 239–249 (2013)CrossRefGoogle Scholar
  18. 18.
    Rachedi, A., Benslimane, A.: A secure architecture for mobile ad hoc networks. In: International Conference on Mobile Ad-Hoc and Sensor Networks, pp. 424–435. Springer, Berlin (2006)Google Scholar
  19. 19.
    Gomathi, K., Parvathavarthini, B.: An efficient cluster based key management scheme for MANET with authentication. In: Trendz in Information Sciences & Computing (TISC), pp. 202–205. IEEE (2010)Google Scholar
  20. 20.
    Abusalah, A., Khokhar, A., Guizani, A.: A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutor. 10(4), 78–93 (2008)CrossRefGoogle Scholar
  21. 21.
    Park, Y., Park, Y., Moon, S.: Anonymous cluster-based MANETs with threshold signature. Int. J. Distrib. Sensor Netw.  https://doi.org/10.1155/2013/374713 (2013)
  22. 22.
    Christopher, D.J.P.: Cluster-based certificate revocation for mobile ad hoc networksGoogle Scholar
  23. 23.
    Jose, J., Sasi, S.B.: Certificate revocation in MANET using clustering. In: IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1–3. IEEE (2015)Google Scholar
  24. 24.
    Jarang, M.R., Nimbalkar, M.V.: Implementation of cluster based certificate revocation in mobile ad hoc networks. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 610–615. IEEE (2015)Google Scholar
  25. 25.
    Maraiya, K., Kant, K., Gupta, N.: Efficient cluster head selection scheme for data aggregation in wireless sensor network. Int. J. Comput. Appl. 23(9), 10–18 (2011)Google Scholar
  26. 26.
    Park, K., Nishiyama, H., Ansari, N., Kato, N.: Certificate revocation to cope with false accusations in mobile ad hoc networks. In: IEEE 71st, Vehicular Technology Conference (VTC 2010-Spring), pp. 1–5. IEEE (2010)Google Scholar
  27. 27.
    Rivas, D.A., Barceló-Ordinas, J.M., Zapata, M.G., Morillo-Pozo, J.D.: Security on VANETs: privacy, misbehaving nodes, false information and secure data aggregation. J. Netw. Comput. Appl. 34(6), 1942–1955 (2011)CrossRefGoogle Scholar
  28. 28.
    Moore, T., Clulow, J., Nagaraja, S., Anderson, R.: New strategies for revocation in ad-hoc networks. In: European Workshop on Security in Ad-hoc and Sensor Networks, pp. 232–246. Springer, Berlin (2007)Google Scholar
  29. 29.
    Chinni, S., Thomas, J., Ghinea, G., Shen, Z.: Trust model for certificate revocation in ad hoc networks. Ad Hoc Netw. 6(3), 441–457 (2008)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Department of Computer ApplicationsSt. Peter’s Institute of Higher Education and ResearchAvadiIndia
  2. 2.Department of Computer Science and EngineeringKalasalingam UniversityVirudhunagarIndia

Personalised recommendations