A Novel Markov Model-Based Low-Power and Secure Multihop Routing Mechanism

For the severe impact of limited energy and network attacks caused by open transmission channels on data transmission, this paper presents a low-power and secure multihop routing mechanism based on the Markov state transition theory. The random selection of transmission paths enables the network to resist typical attacks such as interference and interception, thus ensuring the security of data transmission. Meanwhile, the proposed algorithm can reduce the overall energy consumption of the network and balance the load according to the residual energy of each path. Simulation results prove that the routing mechanism proposed in this paper can improve the energy efficiency and the security of the wireless ad hoc network.

[1]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[2]  Madjid Merabti,et al.  On the evaluation of reputation and trust-based schemes in mobile ad hoc networks , 2015, Secur. Commun. Networks.

[3]  Noor Muhammad Khan,et al.  Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks , 2016, J. Sensors.

[4]  Wang Bo,et al.  Trust-based minimum cost opportunistic routing for Ad hoc networks , 2011 .

[5]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[6]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[7]  Kamanashis Biswas,et al.  Security Threats in Mobile Ad Hoc Network , 2007 .

[8]  Zubair Khalid,et al.  GRAdient Cost Establishment (GRACE) for an Energy-Aware Routing in Wireless Sensor Networks , 2009, EURASIP J. Wirel. Commun. Netw..

[9]  Bo Wang,et al.  Trust-based minimum cost opportunistic routing for Ad hoc networks , 2011, J. Syst. Softw..

[10]  Hsien-Chou Liao,et al.  A New Data Encryption Algorithm Based on the Location of Mobile Users , 2008 .

[11]  J. M. Gnanasekar,et al.  Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks , 2017, Int. J. Wirel. Mob. Comput..

[12]  Xiangyun Zhou,et al.  Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.

[13]  Sungyoung Lee,et al.  Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[14]  Lynda Mokdad,et al.  Recursive‐clustering‐based approach for denial of service (DoS) attacks in wireless sensors networks , 2015, Int. J. Commun. Syst..

[15]  J. M. Gnanasekar,et al.  Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks , 2017, Wirel. Pers. Commun..

[16]  Vijay Laxmi,et al.  Bandwidth-aware routing and admission control for efficient video streaming over MANETs , 2015, Wirel. Networks.

[17]  Sandeep A. Thorat,et al.  Opportunistic Routing in Presence of Selfish Nodes for MANET , 2015, Wirel. Pers. Commun..

[18]  Ghufran Ahmed,et al.  Real-time gradient Cost Establishment (RT-GRACE) for an energy-aware routing in Wireless Sensor Networks , 2013, 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[19]  N. Jeyanthi,et al.  A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks , 2018, Wirel. Pers. Commun..

[20]  Jan Janecek,et al.  Distributed phase-shift beamforming power balancing in ad-hoc and sensor networks , 2014, Telecommun. Syst..

[21]  Xuejun Sha,et al.  On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation , 2017, IEEE Transactions on Wireless Communications.

[22]  Ghufran Ahmed,et al.  Adaptive Power-Control Based Energy-Efficient Routing in Wireless Sensor Networks , 2017, Wirel. Pers. Commun..

[23]  Azzedine Boukerche,et al.  A Scalable Bandwidth-Efficient Hybrid Adaptive Service Discovery Protocol for Vehicular Networks with Infrastructure Support , 2014, IEEE Transactions on Mobile Computing.

[24]  Guangjie Han,et al.  A Survivability Clustering Algorithm for Ad Hoc Network Based on a Small-World Model , 2015, Wirel. Pers. Commun..

[25]  Gergely Ács,et al.  Secure Routing in Multi-hop Wireless , 2009 .

[26]  Akanksha Mathur A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms , 2012 .

[27]  Fakhri Karray,et al.  Recent Advances on Context-Awareness and Data/Information Fusion in ITS , 2014, International Journal of Intelligent Transportation Systems Research.

[28]  Sheng Su,et al.  Secure and efficient data collection in wireless image sensor network based on ellipse batch dispersive routing , 2015, Secur. Commun. Networks.

[29]  Xiao Wang,et al.  A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks , 2013, Int. J. Distributed Sens. Networks.

[30]  Sanjay Silakari,et al.  Trust Formulization in Dynamic Source Routing Protocol Using SVM , 2014 .

[31]  Xianzhong Zhou,et al.  A cross-layer protocol for exploiting cooperative diversity in multi-hop wireless ad hoc networks , 2017, Wirel. Networks.