Secured routing over MANET with power management

Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes that communicate with each another without any fixed networking infrastructure. Since the nodes in this network are mobile, security and power efficiency are the major concerns in this field. This paper is an effort to combine these factors of security and power to achieve more reliable routing. Most of the protocols in this category are either incorporating security features or considering power factor. In the study no existing protocol is merging the two factors to see results. The adhoc environment is accessible to both legitimate network users and malicious attackers. The adhoc environment has the constraint of power factor. The proposed scheme is intended to incorporate both factors on existing protocols. The simulation experiments have been carried over network simulator (version 2.34) and the results have been computed using packet delivery fraction and average end to end delay with respect to both speed and pause time. The study will help in making protocol more robust against attacks and implementing power factor to achieve stable routing in routing protocols.

[1]  Jing Liu,et al.  Secure Routing for Mobile Ad Hoc Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[2]  Imrich Chlamtac,et al.  Energy-conserving access protocols for identification networks , 1999, TNET.

[3]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[4]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[5]  P. Gupta,et al.  Power Aware Virtual Node Routing Protocol for Ad hoc Networks , .

[6]  Leandros Tassiulas,et al.  Energy conserving routing in wireless ad-hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[7]  Kevin R. Fall,et al.  Ns: notes and documentation , 1997 .

[8]  Phalguni Gupta,et al.  Secured Routing Scheme for Adhoc Networks , 2009 .

[9]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[10]  Ding-Zhu Du,et al.  Wireless Network Security , 2009, EURASIP J. Wirel. Commun. Netw..

[11]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[12]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[13]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2001, MobiCom '01.

[14]  Deborah Estrin,et al.  Adaptive Energy-Conserving Routing for Multihop Ad Hoc Networks , 2000 .

[15]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[16]  Michele Zorzi,et al.  Energy efficiency of media access protocols for mobile data networks , 1998, IEEE Trans. Commun..

[17]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[18]  Teresa H. Meng,et al.  Minimum energy mobile wireless networks , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).

[19]  Piyush Gupta,et al.  Critical Power for Asymptotic Connectivity in Wireless Networks , 1999 .

[20]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[21]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[22]  Radia J. Perlman,et al.  Fault-Tolerant Broadcast of Routing Information , 1983, Comput. Networks.