Energy efficient secured routing protocol for MANETs

The design of routing protocol with energy efficiency and security is a challenging task. To overcome this challenge, we propose energy-efficient secured routing protocol. The objective of our work is to provide a secured routing protocol, which is energy efficient. To provide security for both link and message without relying on the third party, we provide security to the protocol by choosing a secure link for routing using Secure Optimized Link State Routing Protocol. Each node chooses multipoint relay nodes amongst the set of one-hop neighbors, so as to reach all two-hop neighbors. The access control entity authorizes nodes announcing the node identification to the network. In addition, the access control entity signs a public key Ki, a private key ki, and the certificate Ci required by an authorized node to obtain the group key. Each node maintains a route table with power status as one of its entry. After selecting the link, on requirement of a new route, we check nodes’ power status in its routing table and then accordingly arise a route. Then, we perform group key distribution using the generated keys using a small number of messages which helps reducing energy consumption. The group key can be altered periodically to avoid nonauthorized nodes and to avoid the use of the same group key in more than some amount of data. Then, we provide communication privacy for both message sender and message recipient using Secure Source Anonymous Message Authentication Scheme. Thereby, the message sender or the sending node generates a source anonymous message authentication for message for releasing each message based on the MES scheme. Hence, our approach will provide message content authenticity without relying on any trusted third parties.

[1]  Athanasios V. Vasilakos,et al.  Routing Metrics of Cognitive Radio Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[2]  Athanasios V. Vasilakos,et al.  Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey , 2014, Mobile Networks and Applications.

[3]  Athanasios V. Vasilakos,et al.  Survey on channel reciprocity based key establishment techniques for wireless systems , 2015, Wirel. Networks.

[4]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[5]  Athanasios V. Vasilakos,et al.  Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.

[6]  Dipayan Bose,et al.  POWER AND TRUST BASED SECURED ROUTING APPROACH IN MANET , 2012 .

[7]  Athanasios V. Vasilakos,et al.  Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.

[8]  Athanasios V. Vasilakos,et al.  Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks , 2016, IEEE Transactions on Computers.

[9]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[10]  Nauman Mazhar,et al.  Energy Efficient Security in MANETs: A Comparison of Cryptographic and Artificial Immune Systems , 2016 .

[11]  Athanasios V. Vasilakos,et al.  Delay Tolerant Networks: Protocols and Applications , 2011 .

[12]  Ash Mohammad Abbas,et al.  Quality of Service in mobile ad hoc networks: a survey , 2010, Int. J. Ad Hoc Ubiquitous Comput..

[13]  Athanasios V. Vasilakos,et al.  Leveraging software-defined networking for security policy enforcement , 2016, Inf. Sci..

[14]  Tongtong Li,et al.  SPM: Source Privacy for Mobile Ad Hoc Networks , 2010, EURASIP J. Wirel. Commun. Netw..

[15]  Athanasios V. Vasilakos,et al.  Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[16]  Athanasios V. Vasilakos,et al.  DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.

[17]  Naixue Xiong,et al.  Context-Aware Middleware for Multimedia Services in Heterogeneous Networks , 2010, IEEE Intelligent Systems.

[18]  Athanasios V. Vasilakos,et al.  Approximating Congestion + Dilation in Networks via "Quality of Routing" Games , 2012, IEEE Trans. Computers.

[19]  Divya Sharma,et al.  A Secure and Power Efficient Routing Scheme for Ad Hoc Networks , 2011 .

[20]  Xiaoyan Hong,et al.  A secure ad-hoc routing approach using localized self-healing communities , 2005, MobiHoc '05.

[21]  Sneha Kumari,et al.  Secure DSR Protocol in MANET Using Energy Efficient Intrusion Detection System , 2012 .

[22]  Sanjay Sharma,et al.  SURVEY OF ENERGY EFFICIENT MULTICAST ROUTING PROTOCOLS IN MANET , 2012 .

[23]  Athanasios V. Vasilakos,et al.  CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding , 2012, 2012 Proceedings IEEE INFOCOM.

[24]  Xiaolei Dong,et al.  Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Athanasios V. Vasilakos,et al.  A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.

[26]  Athanasios V. Vasilakos,et al.  Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks , 2011, IEEE Journal on Selected Areas in Communications.

[27]  Yue Zhang,et al.  Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks , 2015, IEEE Transactions on Mobile Computing.

[28]  Athanasios V. Vasilakos,et al.  SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[29]  Ashwani Kush,et al.  “Energy Efficient, Secure and Stable Routing Protocol for MANET” , 2012 .

[30]  Athanasios V. Vasilakos,et al.  Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter , 2015, IEEE Transactions on Information Forensics and Security.

[31]  Vemana Chary,et al.  Energy Efficient Routing Protocol for Mobile Ad hoc Networks using Trust Based Security , 2012 .

[32]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[33]  Athanasios V. Vasilakos,et al.  Directional routing and scheduling for green vehicular delay tolerant networks , 2012, Wireless Networks.

[34]  Xiaolei Dong,et al.  4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..

[35]  Athanasios V. Vasilakos,et al.  Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs , 2011, Math. Comput. Model..

[36]  Otto Carlos Muniz Bandeira Duarte,et al.  An Efficient Group Key Management for Secure Routing in Ad Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[37]  Athanasios V. Vasilakos,et al.  Information centric network: Research challenges and opportunities , 2015, J. Netw. Comput. Appl..

[38]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[39]  Athanasios V. Vasilakos,et al.  Backpressure-based routing protocol for DTNs , 2010, SIGCOMM '10.