DOI QR코드

DOI QR Code

Trust Predicated Routing Framework with Optimized Cluster Head Selection using Cuckoo Search Algorithm for MANET

  • Sekhar, J. Chandra (Department of Computer Science and Engineering, Acharya Nagarjuna University) ;
  • Prasad, Ramineni Sivarama (Department of Computer Science and Engineering, Acharya Nagarjuna University)
  • Received : 2014.11.20
  • Accepted : 2015.02.12
  • Published : 2015.04.30

Abstract

This paper presents a Cuckoo search algorithm to secure adversaries misdirecting multi-hop routing in Mobile ad hoc networks (MANETs) using a robust Trust Predicated Routing Framework with an optimized cluster head selection. The clustering technique designed in this framework leads to efficient routing in MANETs. The heavy work load in the node causes an energy drop in cluster head, which leads to re-clustering of the group, and another cluster head is selected to avoid packet loss during data transmission. The problem in the re-clustering process is that the overall efficiency of the routing process is reduced and the processing time is increased. A Cuckoo search based optimization algorithm is proposed to solve the problem of re-clustering by selecting the secondary cluster head within the initially formed cluster group and eliminating the reclustering process. The proposed framework enables a node to select a reliable and secure route for MANET and the performance can be evaluated by comparing the simulated results with the AODV routing protocol, which shows that the performance of the proposed routing protocol are improved significantly.

Keywords

References

  1. Wei Liu, Hiroki Nishiyama, Nirwan Ansari, Jie Yang and Nei Kato, "Cluster-based Certificate Revocation withVindication Capability for Mobile Ad Hoc Networks", IEEE Transactions On Parallel And Distributed Systems, vol.24,no.2,pp.239-249,2013. https://doi.org/10.1109/TPDS.2012.85
  2. Sevil Sen, John A.Clark and Juan E.Tapiador, "Security of Self-Organizing NetworksMANET, WSN, WMN, VANET", Auerbach Publications, 2010, 978-1-4398-1920-3.
  3. Hongmei Deng, Wei Li, and Dharma P. Agrawal, "Routing Security in Wireless Ad Hoc Networks", IEEE Communications Magazine, vol.40, no.10, pp.70-75, 2002. https://doi.org/10.1109/MCOM.2002.1039859
  4. Wensheng Zhang, R. Rao, Guohong Cao and George Kesidis, "Secure Routing In Ad Hoc Networks and A Related Intrusion Detection Problem", IEEE Military Communications, vol.2, pp.735-740, 2003.
  5. Anand Patwardhan, Jim Parker and Anupam Joshi, "Secure Routing and Intrusion Detection in Ad Hoc Networks", IEEE Pervasive Computing and Communications, PP.191-199, 2005.
  6. Martin K Parmar and Harikrishna B Jethva, "Survey on Mobile ADHOC Network and Security Attacks on Network Layer", International Journal of Advanced Research in Computer Science and Software Engineering, vol.3, no.11, pp.708-716, 2013.
  7. Yashar Najaflou, Behrouz Jedari, Feng Xia, Laurence T. Yang and Mohammad S. Obaidat, "Safety Challenges and Solutions in Mobile Social Networks", IEEE Systems Journal, no.99, pp.1-21, 2013.
  8. Ghanshyam Prasad Dubey, Prof. Amit Sinhal and Prof. Neetesh Gupta, "Network Performance investigation in Presence of Multiple Vital Node and IDS in MANET", International Journal of Computer Science and Information Technologies, vol.3, no.3, pp.3879-3883, 2012.
  9. A.Jayanand and Prof.Dr.T.Jebarajan, "Performance Investigation and Analysis of Secured MANET Routing Protocols", International Journal of Computer Science and Information Technologies, vol.3, no.2, pp.3512-3516, 2012.
  10. Suman Deswal and Sukhbir Singh, "Implementation of Routing Security Aspects in AODV", International Journal of Computer Theory and Engineering, vol.2, no.1, pp.135-138, 2010.
  11. Yih-Chun Hu, David B. Johnson and Adrian Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks", Elsevier B.V. Ad Hoc Networks, vol.1, pp.175-192, 2003. https://doi.org/10.1016/S1570-8705(03)00019-2
  12. Yih-Chun Hu and Adrian Perrig, "A Survey of SecureWireless Ad Hoc Routing", IEEE Security & Privacy, vol.2, no.3, pp.28-39, 2004.
  13. Levente Buttyan and Ta Vinh Thong, "Formal verification of secure ad-hoc network routing protocols using deductive model-checking", IEEE Wireless and Mobile Networking, pp.1-6, 2010.
  14. V.Balakrishnan, V.Varadharajan, et al. "Fellowship: Defense Against Flooding and Packet Drop Attacks In MANET," Network Operations and Management Symposium, NOMS 2006, pp. 1-4, 2006.
  15. Johann van der Merwe, Dawoud, et al. "Trustworthy Key Management for Mobile Ad Hoc Networks", ACM Computing Surveys (CSUR), Volume 39, Issue 1, 2007.
  16. B.Wu, J.Chen, et al. "A Survey of Attacks andCountermeasures in Mobile Ad Hoc Networks," Wireless/Mobile Network Security, Springer, vol. 17, 2006.
  17. D. Wang, M. Hu, H. Zhi, "A Survey of Secure Routing in Ad Hoc Networks," IEEE Ninth International Conference on Web-Age Information Management, 2008, (WAIM '08), pp.482-486, July 2008.
  18. K.Sanzgiri, D.LaFlamme, et al. "Authenticated Routing for Ad Hoc Networks," Proceedings of IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, March 2005.
  19. Y.C.Hu, A.Perrig, et al."Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proc. MobiCom'02, Atlanta, GA, pp. 12-13 September 2002.
  20. S. Madhavi, Dr. Tai Hoon Kim, " An intrusion detection system in mobile Ad hoc networks", International Journal of Security and Its Applications Vol. 2, No.3, July, 2008.
  21. S. Capkun, L. Buttya, et al."Self-organized publickey management for mobile ad hoc networks," IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar., 2003. https://doi.org/10.1109/TMC.2003.1195151
  22. Yasir Abdelgadir Mohamed*, Azween B. Abdullah, "Security Mechanism For MANETS",Journal of Engineering Science and Technology, Vol. 4, No. 2, pp: 231-242,2009. jestec.taylors.edu.my/.../Vol_4_2_231-242_YASIR%20ABDELGADIR..
  23. H. Huang and S. F. Wu, "An approach to certificate path discovery in mobile ad hoc networks," 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Oct. 2003.
  24. J. Huang and D. Nicol, "A calculus of trust and its application to PKI and identity management," ACM 8th Symposium on Identity and Trust on the Internet, Gaithersburg, MD, USA, April 2009. citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.210.3881
  25. N. V. Vinh, M.-K. Kim, H. Jun, and N. Q. Tung, "Group-based public-key management for selfsecuring large mobile ad-hoc networks," Int'l Forum on Strategic Technology, pp. 250-253, Oct. 2007.
  26. Hua Yang and Zhi-yuan Li, "Simulation and analysis of a modified AODV routing protocols", Computer Science and Network Technology (ICCSNT), vol. 3, pp. 1440-1444, 2011.

Cited by

  1. AODVCS, a new bio-inspired routing protocol based on cuckoo search algorithm for mobile ad hoc networks pp.1572-8196, 2017, https://doi.org/10.1007/s11276-017-1485-2