E2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT

Integration of mobile ad hoc networks (MANETs) and internet of things (IoT) becomes an emerging paradigm to enable opportunistic communication in IoT. However, the lack of infrastructure in MANET increases involvement of adversaries in IoT environment. Thus security provisioning against severe adversaries is still challenging in MANET-IoT. In this paper, we propose an energy efficient secure routing (E2-SR) scheme to ensure data security and integrity in MANET-IoT. We adapt Certificate based authentication in Hash Chain based Certificate Authentication (HCCA) scheme. Cluster formation is involved with secure verification of IoT devices by elliptic curve group law formulations. For cluster formation, secure dual head clustering with elliptic curve verification (SDHC-EC) algorithm is proposed. Secure routing is enabled by a new Worst Case Particle Swarm Optimization (WC-PSO) algorithm. The WC-PSO algorithm is supported by dual state markov chain model (DS-MCM) for security enhancement. Data security is ensured with data integrity using novel dual XOR-Rivest Cipher6 Encryption with Fuzzy Evaluation (DXOR-RC6 with FE) algorithm. The proposed MANET-IoT network is modeled and tested in ns-3.26 environment. The evaluation shows that E2-SR achieves better results in packet delivery ratio, throughput, residual energy, and routing overhead.

[1]  Arputharaj Kannan,et al.  An Intelligent Secured and Energy Efficient Routing Algorithm for MANETs , 2017, Wirel. Pers. Commun..

[2]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[3]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[4]  S. Murugavalli,et al.  Privacy preservation and protection for cluster based geographic routing protocol in MANET , 2017, Wirel. Networks.

[5]  Weihua Zhuang,et al.  Distributed and Adaptive Medium Access Control for Internet-of-Things-Enabled Mobile Networks , 2017, IEEE Internet of Things Journal.

[6]  Krishna Kant,et al.  Generalized Trust Model for Cooperative Routing in MANETs , 2017, Wirel. Pers. Commun..

[7]  T. R. Reshmi,et al.  Light weight cryptographic address generation (LW-CGA) using system state entropy gathering for IPv6 based MANETs , 2017, China Communications.

[8]  Rajiv Ranjan,et al.  Modelling and Simulation Challenges in Internet of Things , 2017, IEEE Cloud Computing.

[9]  N. Kannan,et al.  Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET , 2017, Wirel. Networks.

[10]  Vallala Sowmya Devi,et al.  Multipath Security Aware Routing Protocol for MANET Based on Trust Enhanced Cluster Mechanism for Lossless Multimedia Data Transfer , 2018, Wireless Personal Communications.

[11]  Arun Kumar Sangaiah,et al.  Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT , 2018, IEEE Access.

[12]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[13]  Asaf Shabtai,et al.  Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks , 2017, IEEE Transactions on Mobile Computing.

[14]  Farookh Khadeer Hussain,et al.  A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT) , 2018, Computing.

[15]  Ram Mohan Chintalapalli,et al.  M-LionWhale: multi-objective optimisation model for secure routing in mobile ad-hoc network , 2018, IET Commun..

[16]  R. M. Chandrasekaran,et al.  A Dummy Packet-Based Hybrid Security Framework for Mitigating Routing Misbehavior in Multi-Hop Wireless Networks , 2018, Wirel. Pers. Commun..

[17]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[18]  Xue Jun Li,et al.  An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs , 2019, IEEE Transactions on Mobile Computing.

[19]  Witold Pedrycz,et al.  Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey , 2018, J. Netw. Comput. Appl..

[20]  G. P. Biswas,et al.  Networking for IoT and applications using existing communication technology , 2017, Egyptian Informatics Journal.