ENERGY EFFICIENT AND AUTHENTICATED ROUTING IN MANET FOR EMERGENCY RESCUE OPERATIONS

Authors:

J. Nandhini,K. Mahalakshmi,K. K. Savitha,A. S. Narmadha,Ms. G. Kalaiarasi,

DOI NO:

https://doi.org/10.26782/jmcms.spl.7/2020.02.00008

Keywords:

MANET,Security,Authentication,Routing,Energy efficiency,Clustering,

Abstract

MANET is an emerging technology that allows the users to interact without physical infrastructure irrespective of geographical location.  In particular, energy efficient routing is the most important design for network operation due to the effect of increased data rates in wireless networks. The security aspects are to be considered for an efficient routing. The main challenge and research area in MANET is a route path identification, intrusion detection and energy consumption. Energy maintenance is the most important issue to be handled in order to avoid the excess usage of resources by mobile nodes which lead to route path breakup. Due to the lack of central server and infrastructure in MANET, security problems are to be addressed in order to preserve the network from attackers. In this work, techniques are proposed to handle energy efficient routing in the clustered environment while maintaining trustworthiness and security under emergency rescue conditions. Nodes are simulated using NS 2 and performance parameters are compared with existing algorithms.

Refference:

I. AmolBhosle&YogadharPandey 2013, ‘Applying Security to Data Using Symmetric Encryption in MANET’, International Journal of Emerging Technology and Advanced Engineering, vol. 3, no. 1, pp. 426-430.

II. AshishBagwari, Pankaj Joshi, VikasRathi&Vikram Singh Soni 2011, ‘Routing Protocol Behavior with Multiple Cluster Head Gateway in Mobile Ad hoc Network’, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), vol. 2, no. 4, pp. 133-142.

III. Elhadi M Shakshuki Nan Jang &Tarek R Sheltami 2013, ‘EAACK: A Secure Intrusion Detection System for MANETs’, IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1089-1098.

IV. Fan-Hsun Tseng, Li-Der Chou & Han-Chieh Chao, 2011, ‘A survey of black hole attacks in wireless Mobile Ad hoc Networks’, Humancentric Computing and Information Sciences, Springer, vol. 1, no. 4, pp. 1-16.

V. Floriano De Rango, Francesca Guerriero&Peppino Fazio, 2012, ‘Link-Stability and Energy Aware Routing Protocol in Distributed Wireless Networks’, IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 4, pp. 713-726.

VI. Ha Dang &Hongyi Wu, 2010, ‘Clustering and Cluster-Based Routing Protocol for Delay-Tolerant Mobile Networks’, IEEE Transactions on Wireless Communications, vol. 9, no. 6, pp. 1874-1881.

VII. HaiyingShen&Lianyu Zhao 2013, ‘ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs’, IEEE Transactions on Mobile Computing, vol. 12, no. 6, pp. 1079-1093.

VIII. Iftikhar Ahmad, HumairaJabeen& Faisal Riaz, 2013, ‘Improved Quality of Service Protocol for Real Time Traffic in MANET’, International Journal of Computer Networks and Communications (IJCNC), vol. 5, no. 4, pp. 75-86.
JavadVazifehdan, Venkatesha Prasad, R &IgnasNiemegeers, 2014, ‘Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks’, IEEE Transactions on Mobile Computing, vol. 13, no. 2, pp. 434-447.

IX. Jinhua Zhu &Xin Wang 2011, ‘Model and Protocol for Energy- Efficient Routing over Mobile Ad hoc Networks’, IEEE Transactions on Mobile Computing, vol. 10, no. 11, pp. 1546-1557.

X. Kamal Kumar Chauhan&Amit Kumar Singh Sanger, 2012, ‘Securing Mobile Ad hoc Networks: Key Management and Routing’, International Journal on AdHoc Networking Systems, vol. 2, no. 2, pp. 65-75.

XI. Karunakaran, S &Thangaraj, P 2011, ‘A cluster Based Service Discovery Protocol for Mobile Ad hoc Networks’, American Journal of Scientific Research, no. 11, pp. 179-190.

XII. Keshav Kumar Tiwari& Sanjay Agrawal 2013, ‘A Secure Reputation- Based Clustering Algorithm for Cluster based energy optimized Mobile Ad hoc Network’, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 5, pp. 232- 236.

XIII. MadhukarRao, G, NadeemBaig, M, Fareed Baba, Md&Kanthi Kumar K, 2011, Energy Efficient Reliable Routing Protocol for Mobile Ad hoc Networks’, IEEE International Conference on Electronics Computer Technology, pp. 296-299.

XIV. MenakaSivakumar 2018, “Secured Routing Deterrent to Internal Attacks for Mobile AD HOC Networks”, Journal of Engineering Science and Technology Review 11 (1) 1 – 9.

XV. MenakaSivakumar 2018, “Secured Routing Deterrent to Internal Attacks for Mobile AD HOC Networks” Journal of Engineering Science and Technology Review 11 (1) 1 – 9.

XVI. Ming Li, Pan Li, Xiaoxia Huang, Yuguang Fang &SavoGlisic, 2015, ‘Energy Consumption Optimization for Multihop Cognitive Cellular Networks’, IEEE Transactions on Mobile Computing, vol. 14, no. 2, pp. 358-372.

XVII. Mohamed, MEA Mahmoud &Xuemin (Sherman) Shen 2013, ‘A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks’, IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 2, pp. 209-224.

XVIII. Pradip De, Yonghe Liu &Sajal K Das, 2010, ‘Energy-Efficient Reprogramming of a Swarm of Mobile Sensors’, IEEE Transactions on Mobile Computing, vol. 9, no. 5, pp. 703-718.

XIX. Seyed Amin Hosseini Seno, Tat Chee Wan &RahmatBudiarto 2011, ‘Energy Efficient Cluster based Routing protocol for MANETs’, International Conference on Computer Engineering and Applications, IPCSIT, vol. 2, pp. 380-384.

XX. Shengrong Bu, Richard Yu, F, Xiaoping Liu, P & Helen Tang 2011, ‘Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad hoc Networks’, IEEE Transactions on Wireless Communications, vol. 10, no. 9, pp. 3064- 3073.

XXI. Sourav Bhattacharya, HenrikBlunck, MikkelBaunKjærgaard&PetteriNurmi 2015, ‘Robust and Energy-Efficient Trajectory Tracking for Mobile Devices’, IEEE Transactions on Mobile Computing, vol. 14, no. 2, pp. 430-443.

XXII. SurendranSubbaraj&PrakashSavarimuthu 2014, ‘Eigen Trust-based non- cooperative game model assisting ACO look-ahead secure routing against selfishness’, EURASIP Journal on Wireless Communications and Networking, vol. 78, no. 1, pp. 1-120.

XXIII. Tao Shu& Marwan Krunz 2010, ‘Coverage-Time Optimization for Clustered Wireless Sensor Networks: A Power-Balancing Approach’, IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp. 202-215.

XXIV. YuvarajKumbharey, SuweshShukla&SushilChaturvedi 2013, ‘Renovated Cluster Based Routing Protocol for MANET’, International Journal of Advanced Computer Research, vol. 3, no. 1, pp. 206-211.

XXV. Zhongyuan Qin, Xinshuai Zhang, KerongFeng, Qunfang Zhang &Jie Huang 2015, ‘An efficient key management scheme based on ECC and AVL Tree for large scale Wireless Sensor Networks’, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, vol. 2015, pp. 1-7.

XXVI. Ziane Sara &MekkiRachida 2015, ‘Energy-Efficient Inter-Domain Routing Protocol for MANETs’, Elsevier, Procedia Computer Science, vol. 52, pp. 1059-1064.

View | Download