Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network

被引:0
|
作者
S. B. Geetha
Venkanagouda C. Patil
机构
[1] Marathwada Mitra Mandal’s College of Engineering,Department of Computer Engineering
[2] BITM,Department of Electronics and Communication Engineering
来源
关键词
Cryptography; Computational complexity; Energy efficient; Mobile adhoc network; Routing protocol; Wormhole attack;
D O I
暂无
中图分类号
学科分类号
摘要
With the evolution of numerous secure routing protocols in mobile adhoc network, there is a tradeoff between the security effectiveness against wormhole attack and energy required to support execution of such security protocols using cryptographic approaches. This paper discusses about a novel routing protocol that offers higher degree of energy conservation when exchanging routing information and at the same time offers a joint usage of unicast, multicast and broadcasting services for faster routing update as well as faster communication establishment required from security viewpoint. The presented solution enhances multicast routing and develops a novel control message. It also rectifies the problems of an intermittent links owing to dynamic topology using graph-based approach. Compared with existing routing protocol, the proposed system offers better conservation of energy and satisfactory communication performance in mobile ad-hoc network.
引用
收藏
页码:859 / 880
页数:21
相关论文
共 50 条
  • [21] Analysis And Evaluation Optimization Dynamic Source Routing (DSR) Protocol in Mobile Adhoc Network Based on Ant Algorithm
    Istikmal
    2013 INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2013, : 400 - 404
  • [22] An energy efficient clustering with enhanced chicken swarm optimization algorithm with adaptive position routing protocol in mobile adhoc network
    R. Reka
    A. Manikandan
    C. Venkataramanan
    R. Madanachitran
    Telecommunication Systems, 2023, 84 : 183 - 202
  • [23] Design and Implementation of an Energy Efficient Routing Approach based on Existing AODV Protocol in Mobile Adhoc Networks for Military
    Khanna, Nisheeth
    Naik, K. Krishna
    2016 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ELECTRONICS & SUSTAINABLE ENERGY SYSTEMS (ICETEESES), 2016, : 216 - 222
  • [24] Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface
    Bopche, Ghanshyam S.
    Rai, Gopal N.
    Reddy, B. Ramchandra
    Mehtre, B. M.
    INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 324 - 344
  • [25] Analysis of Attack Graph-based Metrics for Quantification of Network Security
    Kundu, Arkadeep
    Ghosh, Nirnay
    Chokshi, Ishan
    Ghosh, Soumya K.
    2012 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2012, : 530 - 535
  • [26] Delay and Energy Aware Protocol in Mobile Adhoc Network using Optimization Algorithm
    Kaur, Dapinder
    Battish, Neeraj
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 793 - 797
  • [27] An attack graph-based probabilistic computing approach of network security
    Ye Y.
    Xu X.-S.
    Jia Y.
    Qi Z.-C.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (10): : 1987 - 1996
  • [28] Anonymity based Secure Cross layer Routing Protocol for Mobile Adhoc Networks.
    Bhusari, Amit A.
    Jawandhiya, P. M.
    Thakare, V. M.
    2018 IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN INTELLIGENT AND COMPUTING IN ENGINEERING (RICE III), 2018,
  • [29] QOS routing protocol of mobile ad hoc network based on energy control
    Peng, Yang
    Lei, Chen
    IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 57 - 62
  • [30] An Energy-based QoS Routing Protocol in mobile Ad Hoc Network
    Lian, Jin
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 19 - 22