Skip to main content

Advertisement

Log in

Energy efficient secured routing protocol for MANETs

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The design of routing protocol with energy efficiency and security is a challenging task. To overcome this challenge, we propose energy-efficient secured routing protocol. The objective of our work is to provide a secured routing protocol, which is energy efficient. To provide security for both link and message without relying on the third party, we provide security to the protocol by choosing a secure link for routing using Secure Optimized Link State Routing Protocol. Each node chooses multipoint relay nodes amongst the set of one-hop neighbors, so as to reach all two-hop neighbors. The access control entity authorizes nodes announcing the node identification to the network. In addition, the access control entity signs a public key Ki, a private key ki, and the certificate Ci required by an authorized node to obtain the group key. Each node maintains a route table with power status as one of its entry. After selecting the link, on requirement of a new route, we check nodes’ power status in its routing table and then accordingly arise a route. Then, we perform group key distribution using the generated keys using a small number of messages which helps reducing energy consumption. The group key can be altered periodically to avoid nonauthorized nodes and to avoid the use of the same group key in more than some amount of data. Then, we provide communication privacy for both message sender and message recipient using Secure Source Anonymous Message Authentication Scheme. Thereby, the message sender or the sending node generates a source anonymous message authentication for message for releasing each message based on the MES scheme. Hence, our approach will provide message content authenticity without relying on any trusted third parties.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Taneja, S., & Kush, A. (2012). Energy efficient, secure and stable routing protocol for MANET. Global Journal of Computer Science and Technology, Network Web and Security, 12(10), Version 1.0 May 2012

  2. Kong, J., Hong, X., Yi, Y., Sang Park, J., Liu, J., & Gerla, M. (2005) A secure ad hoc routing approach using localized self-healing communities. In Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing, pp. 254–265

  3. Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.

    Article  Google Scholar 

  4. Attar, A., et al. (2012). A survey of security challenges in cognitive radio networks: solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  5. Li, P., et al. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. INFOCOM 2012, pp. 100–108

  6. Li, P., et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.

    Article  Google Scholar 

  7. Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.

    Article  Google Scholar 

  8. Busch, C., et al. (2012). Approximating congestion + dilation in networks via “quality of routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.

    Article  MathSciNet  Google Scholar 

  9. Yen, Y.-S., et al. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.

    Article  Google Scholar 

  10. Meng, T., et al. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE TMC. doi:10.1109/TC.2015.2417543.

    Google Scholar 

  11. Mazhar, N. (2010). Energy efficient security in MANETs: A comparison of cryptographic and artificial immune systems. Pakistan Journal of Engineering and Applied Sciences, 7, 71–94.

  12. Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs ACM SIGCOMM. Computer Communication Review, 41(4), 405–406.

    Google Scholar 

  13. Zhang, X. M., et al. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.

    Article  Google Scholar 

  14. Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.

    Google Scholar 

  15. Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.

    Article  Google Scholar 

  16. Yao, G., et al. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.

    Article  MathSciNet  Google Scholar 

  17. Yan, Z., et al. (2014). A survey on trust management for Internet of Things. J. Network and Computer Applications, 42, 120–134.

    Article  Google Scholar 

  18. Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.

    Article  Google Scholar 

  19. Liu, B., et al. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.

    Article  Google Scholar 

  20. Jing, Q., et al. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.

    Article  Google Scholar 

  21. Zhou, J., et al. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.

    Article  Google Scholar 

  22. Wei, L., et al. (2010). SecCloud: Bridging secure storage and computation in cloud. ICDCS Workshops 2010, pp. 52–61

  23. Fadlullah, Z. M., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.

    Article  Google Scholar 

  24. Wang, T., et al. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.

    Article  Google Scholar 

  25. He, D., et al. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.

    Article  Google Scholar 

  26. Zhou, J., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.

    Article  Google Scholar 

  27. Yan, Z., et al. A security and trust framework for virtualized networks and software-defined networking security and communication networks

  28. Zhou, L., et al. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.

    Article  Google Scholar 

  29. Zhou, L., et al. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.

    Article  Google Scholar 

  30. Yang, M., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. MONET, 20(1), 4–18.

    MathSciNet  Google Scholar 

  31. Abbas, A. M., & Kure, Ø. (2008). Quality of service in mobile ad hoc networks: A survey. International Journal of Ad Hoc and Ubiquitous Computing, 6, 75–98.

    Article  Google Scholar 

  32. Fernandes, N. C., & Duarte, O. C. M. B. (2008). An efficient group key management for secure routing in ad hoc networks. IEEE communications society subject matter experts for publication in the IEEE “GLOBECOM” 2008 proceedings

  33. Jaiswal, R., Sahu, M. C., Mishra, A., & Sharma, S. (2012) Survey of energy efficient multicast routing protocols in MANET. International Journal of Advanced Research in Computer Science and Electronics Engineering, 1(5), 14.

    Google Scholar 

  34. Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.

    Article  Google Scholar 

  35. Banerjee, A., Bhattacharyya, & A., Bose, D. (2012). Power and trust based secured routing approach in MANET. International Journal of Security, Privacy and Trust Management (IJSPTM), 1(3/4), 37–51.

  36. Rajesh Babu, M., & Selvan, S. (2010). An energy efficient secure authenticated routing protocol for mobile adhoc networks. American Journal of Scientific Research. ISSN 1450-223X

  37. Ren, J., Li, Y., & Li, T. (2010). SPM: Source privacy for mobile ad hoc networks, Hindawi Publishing Corporation. EURASIP Journal on Wireless Communications and Networking, 2010, 5. doi:10.1155/2010/534712.

  38. Vemana Chary, D., Padmanabham, P., & Prabhakara Rao, B. (2012). Energy efficient routing protocol for mobile ad hoc networks using trust based security. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 605–611.

  39. Nithya, S., & Chandrasekar, P. (2012). Heuristic approach for secure energy efficient routing in mobile ad hoc network. International Journal of Modern Engineering Research, 2(1), 298–303.

    Google Scholar 

  40. Gadiparthi, M., Paladugu, R., Paladugu, S., & Vejendla, M. (2011). A fuzzy QOS key base secured MANET routing with multipath data fragmentation (FQKSMR). International Journal of Computer Technology and Applications, 2(3), 655–665.

  41. Kumari, S., & Shrivastava, M. (2012). Secure DSR protocol in MANET using energy efficient intrusion detection system. International Journal of Networks and Systems, 1(1), 6–11.

  42. Kush, A., Sharma, D., & Taneja, S. (2011). A secure and power efficient routing scheme for ad hoc networks. International Journal of Computer Applications (0975–8887), 21(6), 20–25.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tejpreet Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, T., Singh, J. & Sharma, S. Energy efficient secured routing protocol for MANETs. Wireless Netw 23, 1001–1009 (2017). https://doi.org/10.1007/s11276-015-1176-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1176-9

Keywords

Navigation