Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network

被引:0
|
作者
S. B. Geetha
Venkanagouda C. Patil
机构
[1] Marathwada Mitra Mandal’s College of Engineering,Department of Computer Engineering
[2] BITM,Department of Electronics and Communication Engineering
来源
关键词
Cryptography; Computational complexity; Energy efficient; Mobile adhoc network; Routing protocol; Wormhole attack;
D O I
暂无
中图分类号
学科分类号
摘要
With the evolution of numerous secure routing protocols in mobile adhoc network, there is a tradeoff between the security effectiveness against wormhole attack and energy required to support execution of such security protocols using cryptographic approaches. This paper discusses about a novel routing protocol that offers higher degree of energy conservation when exchanging routing information and at the same time offers a joint usage of unicast, multicast and broadcasting services for faster routing update as well as faster communication establishment required from security viewpoint. The presented solution enhances multicast routing and develops a novel control message. It also rectifies the problems of an intermittent links owing to dynamic topology using graph-based approach. Compared with existing routing protocol, the proposed system offers better conservation of energy and satisfactory communication performance in mobile ad-hoc network.
引用
收藏
页码:859 / 880
页数:21
相关论文
共 50 条
  • [11] Location estimation based routing for mobile adhoc network
    Mukherjee, Sankar
    Biswas, G. P.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (02) : 1209 - 1224
  • [12] SECURE ZONE BASED ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
    Devi, B. A. S. Roopa
    Murthy, J. V. R.
    Narasimha, G.
    2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 839 - 846
  • [13] Comparison of Proactive and Reactive Routing Protocol in Mobile Adhoc Network Based on "Ant-Algorithm"
    Istikmal
    Leanna, V. Y.
    Rahmat, Basuki
    2013 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS AND ITS APPLICATIONS (IC3INA), 2013, : 153 - 158
  • [14] SPAMR: a Secure Routing Protocol of Wireless Mesh Network to Prevent Wormhole Attack
    Liao Junguo
    Lian Xiaoxu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 226 - 232
  • [15] Enhancement of passive cluster based routing protocol for mobile adhoc networks
    Rangaswamy, A
    Pung, HK
    ELEVENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2002, : 376 - 381
  • [16] Combating against Wormhole Attack in Trust and Energy Aware Secure Routing Protocol (TESRP) in Wireless Sensor Network
    Shukla, Ranu
    Jain, Rekha
    Vyavahare, P. D.
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 555 - 561
  • [17] Performance Analysis and Energy Handling of Adhoc Routing in Viral Mobile Communication Network
    Lokhande, D. G.
    Kyatanavar, D. N.
    ICCCE 2019: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND CYBER-PHYSICAL ENGINEERING, 2020, 570 : 303 - 308
  • [18] A Review on Swarm Intelligence Based Routing Algorithms in Mobile Adhoc Network
    Srivastava, Niharika
    Raghav, Piyush
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [19] An energy efficient clustering with enhanced chicken swarm optimization algorithm with adaptive position routing protocol in mobile adhoc network
    Reka, R.
    Manikandan, A.
    Venkataramanan, C.
    Madanachitran, R.
    TELECOMMUNICATION SYSTEMS, 2023, 84 (02) : 183 - 202
  • [20] Secured on demand position based private routing protocol for mobile Adhoc network - SO2P
    Jaiganesh, M.
    Devi, M. Shyamala
    Prabakar, M. Amutha
    2006 INTERNATIONAL SYMPOSIUM ON AD HOC AND UBIQUITOUS COMPUTING, 2007, : 32 - +