Cluster Computing

, Volume 22, Supplement 6, pp 13609–13618 | Cite as

Secure location aware routing protocol with authentication for data integrity

  • S. GopinathEmail author
  • K. Vinoth Kumar
  • T. Jaya Sankar


Similar to mobile ad hoc network (MANET), cloud computing also has properties including wireless communication within predesigned network and also limitations such as network privacy and performance. With regards to MANET security is a prime concern where the security is compromised through several attackers. Attacks can be of two types—active and passive. These attacks are prone to network devices and the network is made unavailable. It is hard to identify the location of unknown nodes and attacks when there is a mobility period. Prior studies show that schemes are introduced by authors to protect location of nodes that are genuine from attackers. The MANETs make use of a security routing scheme for the purpose of establishing a secure route along with a secure transmission of data. The main threat to security in case of the MANET is its integrity, privacy and non-repudiation. In order to combat with such threats to security there are several protocols to routing that have been designed for the reduction of the threats in security in the MANET. The need for such protocols that are scalable and energy efficient with the small, low power as well as inexpensive positioning instruments has resulted in the introduction of various routing protocols that are location-based with a promising choice in terms of MANETs. In this study, to strike a balance between location authentication and node identity secure location aware routing protocol (SCLARP) is developed. In the first module of the proposed study, introduction of network and attack model take place, which can follow the rules of secure authentication; whereas, in the second part of the protocol, along with location integrity, secure multicast tree is formed. The main focus of this module is the development of secure multicast groups. In the final module, deployment of public key encryption and decryption scheme take place which deploys in protecting the node from the attackers. As soon as the plain text from the side of the decryption is got the source nod or the parent node will broadcast all data packets to its destination. From the results of the study, it is shown that SCLARP performs better with regards to location and packet integrity, node authentication ratio, end-to-end delay and packet delivery ratio.


MANET Location integrity Secure multicast tree Public key encryption and decryption Node authentication ratio and packet integrity 


  1. 1.
    Narsimha, G.: Trust based certificate revocation for secure routing in MANET. Procedia Comput. Sci. 92, 431–441 (2016)CrossRefGoogle Scholar
  2. 2.
    Soma Sekhar, G., Sreenivas Reddy, E.: ENES: exploratory node eminence state for secure routing in mobile ad hoc networks. Int. J. Appl. Eng. Res. 11(8), 5863–5868 (2016)Google Scholar
  3. 3.
    Patel, V.H., Zaveri, M.A., Rath, H.K.: Trust based routing in mobile ad-hoc networks. Lect. Notes Softw. Eng. 3(4), 318–324 (2015)CrossRefGoogle Scholar
  4. 4.
    Singh, P., Singh, G.: Security issues and link expiration in secure routing protocols in MANET: a review. Int. J. Adv. Res. Comput. Commun. Eng. 3(7), 7559–7565 (2014)Google Scholar
  5. 5.
    Shyamala, C.K., Ashok, N., Narayanan, B.: Trust-based multi-path security scheme for ad-hoc networks. Int. Sci. Press 8(15), 1735–1742 (2015)Google Scholar
  6. 6.
    Jayalakshmi, V., Abdul Razak, T.: Trust based power aware secure source routing protocol using fuzzy logic for mobile adhoc networks. Int. J. Comput. Sci. 43(1), 1–10 (2016)Google Scholar
  7. 7.
    Maxa, J.A., Mahmoud, M.S.B., Larrieu, N.: Secure routing protocol design for UAV ad hoc networks. In: IEEE/AIAA 34th Digital Avionics Systems Conference, pp. 1–15 (2015)Google Scholar
  8. 8.
    Yuezhongyi, S.: Reliable and secure routing ad-hoc algorithm based on collaborative monitor nodes in VANETS. Int. J. Secur. Appl. 9(6), 89–100 (2015)Google Scholar
  9. 9.
    Gandhi, J.R., Jhaveri, R.H.: Packet forwarding misbehaviour isolation using fuzzy trust-based secure routing in MANET. Int. J. Comput. Appl. 122(3), 30–35 (2015)Google Scholar
  10. 10.
    Sethulekshmi, C., Kumar, M.: Energy efficient secure routing in MANETs based on multipath erasure coding. Int. J. Eng. Comput. Sci. 4(10), 14717–14724 (2015)Google Scholar
  11. 11.
    Robinson, H., Rajaram, M.: Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks. Sci. World J. (2015). CrossRefGoogle Scholar
  12. 12.
    Khedkar, K.: Secure and optimizing routing technique for MANETs. Int. J. Innov. Res. Comput. Commun. Eng. 3(6), 6183–6189 (2015)Google Scholar
  13. 13.
    Sridhar, S., Baskaran, R.: Ant based trustworthy routing in mobile ad hoc networks spotlighting quality of service. Am. J. Comput. Sci. Inf. Technol. 3(1), 64–73 (2015)Google Scholar
  14. 14.
    Shyma, M., Nishanth, N.: Secure routing in mobile ad-hoc networks using evidence theory. Int. J. Adv. Trends Comput. Sci. Eng. 4(4), 16–21 (2015)Google Scholar
  15. 15.
    Pal, S., Sethi, S.: A secure on-demand routing protocol in cognitive radio ad hoc network. Int. J. Emerg. Technol. Comput. Appl. Sci. 14(2), 103–109 (2015)Google Scholar
  16. 16.
    Shah, R., Subramaniam, S., Dasarathan, D.B.L.: Mitigating malicious attacks using trust based secure-BEFORE routing strategy in mobile ad hoc networks, CIT. J. Comput. Inf. Technol. 24(3), 237–252 (2016)CrossRefGoogle Scholar
  17. 17.
    Kumuda, U., Venkatraman, P.: An approach for energy based secure routing protocol. Int. J. Comput. Math. Sci. 4(12), 11–14 (2015)Google Scholar
  18. 18.
    Bobade, N.P., Mhala, N.N.: Performance evaluation of ad hoc on demand distance vector in MANETs with varying network size using NS-2 simulation. Int. J. Comput. Sci. Eng. 2(08), 2731–2735 (2010)Google Scholar
  19. 19.
    Chaudhary, M.S., Singh, V.: Simulation and study of AODV routing protocol under CBR and TCP traffic source. Int. J. Future Comput. Commun. 3(2), 84 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • S. Gopinath
    • 1
    Email author
  • K. Vinoth Kumar
    • 2
  • T. Jaya Sankar
    • 3
  1. 1.Department of ECEKarpagam Institute of TechnologyCoimbatoreIndia
  2. 2.K. Ramakrishnan College of EngineeringTiruchchirappalliIndia
  3. 3.University College of EngineeringAnna UniversityTiruchchirappalliIndia

Personalised recommendations