An Intelligent Secured and Energy Efficient Routing Algorithm for MANETs

Energy consumption and security are two important aspects of Mobile Ad Hoc Networks (MANETs). In MANET, application security can be provided using trust management, key management, firewalls and intrusion detection. Moreover, it is often necessary to communicate secret information in military applications where urgent and reliable communication is more important. However, most of the existing routing algorithms do not focus on the energy and security aspects while routing. Since energy and security are important criteria for reliable communication in MANET, it is essential to consider the energy and security aspects in routing algorithms. The prevention of security attacks on routing protocols and cluster based routing automatically reduces the energy consumption. Hence, we propose a new secured routing protocol called Cluster based Energy Efficient Secure Routing Algorithm (CEESRA) in this paper which is energy efficient and uses cluster based routing in which the trust scores on nodes are used to detect the intruders effectively. This routing algorithm reduces the Denial of Service attacks more efficiently by using intelligent agents for effective decision making in routing. From the experiments conducted with this trust based secured routing algorithm, it has been observed that this proposed routing algorithm not only enhances the security but also reduces the energy consumption and routing delay.

[1]  Abdelfettah Belghith,et al.  A Multipath Layered Cluster Based Routing for Ad Hoc Networks , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[2]  Krishan Kumar,et al.  Literature Survey on Power Control Algorithms for Mobile Ad-hoc Network , 2011, Wirel. Pers. Commun..

[3]  Ramjee Prasad,et al.  Energy Efficient Four Level Cooperative Opportunistic Communication for Wireless Personal Area Networks (WPAN) , 2013, Wirel. Pers. Commun..

[4]  Frank H. P. Fitzek,et al.  Connectivity Probability of Wireless Ad Hoc Networks: Definition, Evaluation, Comparison , 2005, Wirel. Pers. Commun..

[5]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[6]  Santosh Nagaraj,et al.  Bee System Based Base Station Cooperation Technique for Mobile Cellular Networks , 2017, Wirel. Pers. Commun..

[7]  Vladimir Nikulin,et al.  Weighted Threshold-Based Clustering for Intrusion Detection Systems , 2006, Int. J. Comput. Intell. Appl..

[8]  Lei Li,et al.  Two-dimensional trust rating aggregations in service-oriented applications , 2011, IEEE Transactions on Services Computing.

[9]  Anupam Das,et al.  SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems , 2012, IEEE Transactions on Dependable and Secure Computing.

[10]  Min Luo,et al.  An Intrusion Detection Research Based on Spectral Clustering , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[11]  Hongyi Wu,et al.  Clustering and cluster-based routing protocol for delay-tolerant mobile networks , 2010, IEEE Transactions on Wireless Communications.

[12]  Jie Wu,et al.  Uncertainty Modeling and Reduction in MANETs , 2010, IEEE Transactions on Mobile Computing.

[13]  Yixian Yang,et al.  A Cluster-Based Trust Model for Mobile Ad Hoc Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[14]  Mauro De Sanctis,et al.  Energy Efficient Wireless Networks Towards Green Communications , 2011, Wirel. Pers. Commun..

[15]  Arputharaj Kannan,et al.  Intelligent feature selection and classification techniques for intrusion detection in networks: a survey , 2013, EURASIP Journal on Wireless Communications and Networking.

[16]  Meng Jianliang,et al.  The Application on Intrusion Detection Based on K-means Cluster Algorithm , 2009, 2009 International Forum on Information Technology and Applications.

[17]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[18]  Luiz Fernando Sirotheau Serique,et al.  Evaluating Trust in Ad Hoc Network Routing by Induction of Decision Trees , 2012 .

[19]  Daeyoung Park,et al.  Coordinating transmit power and carrier phase for wireless networks with multi-packet reception capability , 2013, EURASIP J. Wirel. Commun. Netw..

[20]  Zheng Yan,et al.  Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.

[21]  Ramjee Prasad,et al.  Energy-Efficient and Improved eWALL: e2WALL , 2017, Wirel. Pers. Commun..