Energy Efficient Administrator Based Secure Routing in MANET

  • Himadri Nath Saha
  • Debika Bhattacharyya
  • P. K. Banerjee
Part of the Advances in Intelligent Systems and Computing book series (volume 167)

Abstract

The lack of static infrastructure causes several issues in mobile Ad Hoc network, such as energy utilization, node authentication and secure routing. In this paper we propose a new scheme for energy efficient secure routing of data packets in MANET. This approach will reduce the computational overhead to make it more energy efficient than existing schemes. As there is no stationary infrastructure,each node in MANET acts a router that forwards data packets to other nodes. Therefore selection of effective, suitable, adaptive and robust routing scheme is of utmost importance. We have reduced the amount of network activity for each node required to route a data packet. This leads to lesser wastage of energy and increases security.Our simulation results will show how this is energy efficient and secure. Finally we have discussed how this scheme prevents various attacks which may jeopardize any wireless network.

Keywords

Administrator Associative node Traversed Administrator field Watch nodes Backtracking bit Routing Manet 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Rubin, I., Behzad, A., Zhang, R., Luo, H., Caballero, E.: TBONE: A Mobile-Backbone Protocol for Ad Hoc Wireless Networks. In: Proceedings of IEEE Aerospace Conference, vol. 6, pp. 2727–2740 (2002)Google Scholar
  2. 2.
    Liu, K., Deng, J., Member, IEEE, Varshney, P.K., Fellow, IEEE, Balakrishnan, K., Member IEEE: An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs. IEEE Transaction on Mobile Computing 6(5) (May 2007)Google Scholar
  3. 3.
    Matri, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In: Proceedings of Mobicom 2000, pp. 255–265 (2000)Google Scholar
  4. 4.
    Gonzalez- Computers & Security 25(18), 736–744 (2000)Google Scholar
  5. 5.
    Papadimitratos, P., Haas, Z.J.: Secure message transmission in mobile ad hoc networks, Ad Hoc Networks, pp. 193–209. IEEE (2003)Google Scholar
  6. 6.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. In: ACM MobiCom 2002, pp. 12–23 (2002)Google Scholar
  7. 7.
    Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), pp. 3–13 (2002)Google Scholar
  8. 8.
    Komala, C.R., Shetty, S., Padmashree, S., Elevarasi, E.: Wireless Ad hoc Mobile Networks. In: National Conference on Computing, Communication and Technology, pp. 168–174 (2010)Google Scholar
  9. 9.
    Zhou, L., Hass, Z.: Securing Ad Hoc Networks. IEEE Network Magazine 13, 24–30 (1999)CrossRefGoogle Scholar
  10. 10.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole Attacks in Wireless Networks. IEEE Journal on Selected Areas in Communication, 370– 380 (2006)Google Scholar
  11. 11.
    Johnson, D.B., Maltz, D.A.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks, IETF Draft, 49 pages (October 1999)Google Scholar
  12. 12.
    Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 78–87 (2002)Google Scholar
  13. 13.
    Perkins, C.E., Royer, E.M., Das, S.R.: Ad Hoc On-demand Distance Vector Routing, IETF Draft (October 1999)Google Scholar
  14. 14.
    Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. Comp. Comm. Rev., 234–244 (October 1994)Google Scholar
  15. 15.
    Das, S.R., Perkins, C.E., Royer, E.M.: Performance Comparison of Two On-demand Routing Protocols for Ad Hoc NetworksGoogle Scholar
  16. 16.
    Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing (2003)Google Scholar
  17. 17.
    Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks, http://www.scribd.com/doc/26788447/Avoiding-Black-Hole-and-Cooperative-Black-Hole-Attacks-in-Wireless-Ad-hoc-Networks
  18. 18.
    Razak, S.A., Furnell, S., Clarke, N., Brooke, P.: A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks- A Friend Approach. Springer, Heidelberg (2006)Google Scholar
  19. 19.
    Lee, J.-S., Chang, C.-C.: Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications, International Journal of Computer Science and Security 1(1), 67 (2006)Google Scholar
  20. 20.
    Johnson, D.B., Maltz, D.A., Broch, J.: DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc NetworksGoogle Scholar
  21. 21.
    Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: Proceedings of Mobicom 2000, pp. 275–283 (2000)Google Scholar
  22. 22.
    Khokhar, R.H., Ngadi, M.A., Mandala, S.: A Review of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Computer Science and Security 2(3), 18–29; International Conference on Wireless Networks (ICWN 2003), Las Vegas, Nevada, USA, pp. 570– 575 (2003)Google Scholar
  23. 23.
    Blum, J.J., Member, IEEE, kandarian, A.E., Member, IEEE: A Reliable Link-Layer Protocol for Robust and Scalable Intervehicle Communications. IEEE Transactions on Intelligent Transportation Systems 8(1) (March 2007)Google Scholar
  24. 24.
    Shanthi, N., Lganesan, Ramar, K.: Study of Different Attacks on Multicast Mobile Ad-hoc Network. Journal of Theoretical and Applied Information Technology, 45Google Scholar
  25. 25.
    Klein-Berndt, L.: A Quick Guide to AODV RoutingGoogle Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  • Himadri Nath Saha
    • 1
  • Debika Bhattacharyya
    • 1
  • P. K. Banerjee
    • 2
  1. 1.Department of Computer Science and EngineeringInstitute of Engineering & ManagementKolkataIndia
  2. 2.Department of Electronics and Tele Communication EngineeringJadavpur UniversityKolkataIndia

Personalised recommendations