A Secure Trust based Routing Protocol for Scheme Enhancing Quality of Service in Mobile AdHoc Networks

  • Authors

    • G. Sripriya
    • Dr. T. Santha
    2018-11-30
    https://doi.org/10.14419/ijet.v7i4.28.28349
  • .
  • -Security is an essential requirement for any kind of networking. Security for MANET is more complicated due to its free infrastructure, decentralization and limited resources. So many protocols are designed for the security of MANET. Key management scheme is one of the schemes used in MANET for its high security. In this paper, Threshold based public key management scheme is applied to the On-Demand Vector Routing Protocol for the better performance and high security. Simulation using Network Simulator-2 (NS-2) and under various network conditions shows that threshold based public key management with On-Demand Vector Routing Protocol can greatly improve security and performance in terms of packet delivery ratio, routing overhead and energy consumption.

     

  • References

    1. [1] Zapata, M.G. and Asokan, N., 2002, September. Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security (pp. 1-10). ACM.

      [2] Yang, R. and Sun, X., 2015, August. DMAODV: A MAODV-Based Multipath Routing Algorithm. In Distributed Computing and Applications for Business Engineering and Science (DCABES), 2015 14th International Symposium on (pp. 220-223). IEEE.

      [3] Loganathan,P. and Purusothaman,T., 2013. An Energy Efficient Key Management and Authentication Technique for Multicasting in Ad Hoc Networks. Journal of Theoretical & Applied Information Technology, 53(1),(pp.54-62).

      [4] Gowda, S.R. and Hiremath, P.S., 2013. Review of security approaches in routing protocol in mobile adhoc network. International Journal of Computer Science Issues (IJCSI), 10(1), (pp.242-251).

      [5] Borkar, G.M., Mahajan, A.R. and Jawade, P., 2017, Trust Based Secure Optimal Route Selection and Enhancing QoS in Mobile Ad-Hoc Networks Using AOMDV-SAPTV and DE-Algorithm, IOSR Journal of Computer Engineering (IOSR-JCE),(pp. 55-62).

      [6] Younis, M., Farrag, O. and Althouse, B., 2012. TAM: A tiered authentication of multicast protocol for ad-hoc networks. IEEE Transactions on Network and Service Management, 9(1), pp.100-113.

      [7] Hu, Y.C., Perrig, A. and Johnson, D.B., 2005. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless networks, 11(1-2), pp.21-38.

      [8] Curtmola, R. and Nita-Rotaru, C., 2007, June. BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks. In Sensor, Mesh and Ad Hoc Communications and Networks, 2007. SECON'07. 4th Annual IEEE Communications Society Conference on (pp. 263-272). IEEE.

      [9] Vedhavarshini, R. and Anand, T., 2014. Efficient Data Packet Transmission in MANET using Enhanced Hybrid Cryptographic Technique. International Journal of Computer Science and Information Technologies (IJCSIT), 5(3), pp.3309-3311.

      [10] Zamani, A.T. and Zubair, S., 2014. Key management scheme in mobile Ad Hoc networks. International Journal of Emerging Research in Management &Technology, 3(4), pp.157-165.

      [11] Zamani, A. and Zubair, S., 2014. Secure and efficient key management scheme in MANETs. OSR J. Comput. Eng, 16, pp.146-158.

      [12] Du, D. and Xiong, H., 2011, July. A dynamic key management scheme for MANETs. In Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2011 (Vol. 1, pp. 779-783). IEEE.

      [13] Jabbar, W.A., Ismail, M., Nordin, R. and Arif, S., 2017. Power-efficient routing schemes for MANETs: a survey and open issues. Wireless Networks, 23(6), pp.1917-1952.

      [14] Dangi, A. and Tiwari, M.K., 2016. A Secure Hybrid Communication Approach for Disaster Recovery System in MANETS. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 5(1), pp.PP-001.

      [15] Singhi, N. and Pippal, R.S., 2018. Analysis of Key Management Schemes in MANET. International Journal of Applied Environmental Sciences, 13(2), pp.161-169.

      [16] Ayman, E.S., 2014. A new hierarchical group key management based on clustering scheme for mobile ad hoc networks. IJACSA) International Journal of Advanced Computer Science and Applications, 5(4).

      [17] Wu, B., Wu, J. and Dong, Y., 2009. An efficient group key management scheme for mobile ad hoc networks. International Journal of Security and Networks, 4(1-2), pp.125-134.

      [18] Cho, J.H., Chan, K.S. and Chen, I.R., 2013, March. Composite trust-based public key management in mobile ad hoc networks. In Proceedings of the 28th annual ACM symposium on applied computing (pp. 1949-1956). ACM.

      [19] Hamouid, K. and Adi, K., 2010. Secure and robust threshold key management (SRKM) scheme for ad hoc networks. Security and communication networks, 3(6), pp.517-534.

      [20] Gomathi, K. and Parvathavarthini, B., 2010, December. An efficient cluster based key management scheme for MANET with authentication. In Trendz in Information Sciences & Computing (TISC), 2010 (pp. 202-205). IEEE.

      [21] Capkun, S., Buttyán, L. and Hubaux, J.P., 2003. Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on mobile computing, (1), pp.52-64.

      [22] Rhee, K.H., Park, Y.H. and Tsudik, G., 2004. An architecture for key management in hierarchical mobile ad-hoc networks. Journal of Communications and Networks, 6(2), pp.156-162.

      [23] Pužar, M., Andersson, J., Plagemann, T. and Roudier, Y., 2005, July. Skimpy: A simple key management protocol for manets in emergency and rescue operations. In European Workshop on Security in Ad-hoc and Sensor Networks (pp. 14-26). Springer, Berlin, Heidelberg.

  • Downloads

  • How to Cite

    Sripriya, G., & T. Santha, D. (2018). A Secure Trust based Routing Protocol for Scheme Enhancing Quality of Service in Mobile AdHoc Networks. International Journal of Engineering & Technology, 7(4.28), 717-722. https://doi.org/10.14419/ijet.v7i4.28.28349