Skip to main content
Log in

Privacy preservation and protection for cluster based geographic routing protocol in MANET

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In mobile ad hoc networks (MANET), the malicious attackers may attack the location information and routing messages. Hence these information need to be protected by means of authentication, integrity and encryption. In this paper, we propose a privacy preservation and protection for cluster based geographic routing protocol in MANET. In this technique, cluster head is chosen based on node value which is estimated based on degree difference, node mobility and residual energy. The cluster consists of GPS enabled node and antenna equipped node. The cluster that contains at least one G-Node considers the remaining energy, speed of the node along with the mobility of node to select the cluster head. In order to perform privacy and anonymity protection of cluster members, the cluster head then initializes group signature scheme. Then the secured routing technique is deployed where the routing packets are protected by encryption. By simulation results, we show that the proposed technique reduces the network overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Lin, H. & Labiod, H. (2006). INGEO: INdoor GEOgraphic routing protocol for MANETs. In Proceedings of the 3rd International Conference on Mobile Computing and Ubiquitous Networking, 2006.

  2. Yen, Y. S., Chao, H. C., Chang, R. S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.

    Article  Google Scholar 

  3. Dvir, A., & Vasilakos, A. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.

    Google Scholar 

  4. Zou, C., & Chigan, C. (2009). On anonymous on-demand source routing protocol for MANETs. Wiley’s Journal of Security and Communication Networks, 2(6), 476–491.

    Google Scholar 

  5. Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, PP(99), 1–13.

    Google Scholar 

  6. Yang, M., Li, Y., Jin, D., Zeng, L., Xin, W., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. ACM/Springer Mobile Networks and Applications, 20(1), 4–18.

    Article  Google Scholar 

  7. Marwaha, S., Srinivasan, D., Tham, Chen. Khong., & Athanasios, V. V. (2004). Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks. Evolutionary Computation, 2, 1964–1971.

    Google Scholar 

  8. Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.

    Article  Google Scholar 

  9. Peng, L., Song, G., Shui, Y., & Athanasios, V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In IEEE 2012 Proceedings of INFOCOM, Orlando, FL.

  10. Li, P., Guo, S., Shui, Y., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.

    Article  Google Scholar 

  11. Spyropoulos, T., Rais, R. N. B., Turletti, T., Obraczka, K., & Vasilakos, A. (2010). Routing for disruption tolerant networks: taxonomy and design. Wireless Networks, 16(8), 2349–2370.

    Article  Google Scholar 

  12. Vasilakos, A., Zhang, Y., & Spyropoulos, T. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.

    Google Scholar 

  13. Costas, B., Kannan, R., & Athanasios, V. V. (2012). Approximating congestion + dilation in networks via “Quality of Routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.

    Article  MathSciNet  Google Scholar 

  14. Youssef, M., Ibrahim, M., Abdelatif, M., Lin, C., & Athanasios, V. V. (2014). Routing metrics of cognitive radio networks: a survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.

    Article  Google Scholar 

  15. Xiang, X., Zhou, Z., & Wang, X. (2007). Self-adaptive on demand geographic routing protocols for mobile ad hoc networks. In IEEE Communications Society Subject Matter Experts for Publication in the IEEE INFOCOM 2007 Proceedings.

  16. Rathidevi, E., & Kumaran, N. S. (2013). Geographical routing in MANET using flexible combination of push and pull algorithm. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064, March 2013.

  17. Athanasios, V. V., Lib, Z., Simonb, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.

    Article  Google Scholar 

  18. Quan, W., Xu, C. Vasilakos, A. V., & Guan, J. (2014). TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in content-centric networking. IFIP Networking (to appear).

  19. Ramteke, R., & Panda, S. K. (2011). Attacks on geographic routing protocols for wireless sensor network (thesis).

  20. Venkatesan, K. G. S., Resmi, R., & Remya, R. (2014). Anonymizing geographic routing for preserving location privacy using unlinkability and unobservability. International Journal of Advanced Research in Computer Science and Software Engineering, 4(3), 523–528.

    Google Scholar 

  21. Handrale, S., & Pathan, S. K. (2014). Location based and energy efficient anonymous routing protocol for MANET. International Journal of Computer Science and Information Technologies, 5(6), 7789–7794.

    Google Scholar 

  22. Attar, A., Tang, H., Richard Yu, F., & Vasilakos, A. (2012). A survey of security challenges in cognitive radio networks: solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  23. Muthusenthil, B., & Murugavalli, S. (2014). Location aided cluster based geographical routing protocol for intermittently connected MANET. International Review on Computers and Software, 9(1), 1–9.

    Google Scholar 

  24. Ben Mahmoud, M. S., & Larrieu, N. (2013). An ADS-B based secure geographical routing protocol for aeronautical ad hoc networks. In Proceedings of the IEEE 36th Annual Computer Software and Applications Conference (COMPSAC).

  25. Sharon Ranjini, S., & Shine Let, G. (2013). Security-efficient routing for highly dynamic MANETS 2013. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, 2(4).

  26. Leinmuller, T., Maihofer, C., Schoch, E., & Kargl, F. (2006). Improved security in geographical adhoc routing through autonomous position verification. In 2006 Proceeding Vanet 06 of the 3rd International Workshop on Vechicular adhoc Networks.

  27. Shen, H., & Zhao, L. (2013). ALERT: An anonymous location-based efficient routing protocol in MANETs. IEEE Transactions on Mobile Computing, 12(6), 1079–1093.

    Article  Google Scholar 

  28. El Defrawy, K., & Tsudik, G. (2011). ALARM: Anonymous location-aided routing in suspicious MANETs. Mobile Computing IEEE Transactions, 10, 1345–1358.

    Article  Google Scholar 

  29. Lyu, C., Gu, D., Zhang, Y., Lin, T., & Zhang, X. (2013). Towards efficient and secure geographic routing protocol for hostile wireless sensor networks. International Journal of Distributed Sensor Networks, Networks, 2013.

  30. Zhang, X. M., Gu, D., Zhang, Y., Lin, T., & Zhang, X. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.

    Article  Google Scholar 

  31. Song, Y., Liu, L., Ma, H., & Vasilakos, A. V. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417–430.

    Article  Google Scholar 

  32. Liang, L., Song, Y., Zhang, H., Ma, H., & Vasilakos, A. V. (2015). Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.

    MathSciNet  Google Scholar 

  33. Bagherian, E., & Khorsandi, S. ARMAN: A new anonymous routing protocol for mobile Ad-Hoc networks, ©2009 IEEE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Muthusenthil.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muthusenthil, B., Murugavalli, S. Privacy preservation and protection for cluster based geographic routing protocol in MANET. Wireless Netw 23, 79–87 (2017). https://doi.org/10.1007/s11276-015-1135-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1135-5

Keywords

Navigation