CSR-AODV: A CRYPTO SECURED ON-DEMAND ROUTING PROTOCOL FOR COGNITIVE RADIO AD HOC NETWORKS

被引:0
|
作者
Musinana, Chandra Sekhar [1 ]
Chilukuri, Kalyana Chakravarthy [1 ]
Reddy, Prasad P. V. G. D. [2 ]
机构
[1] JNT Univ, MVGR Coll Engn Autonomous, Dept Comp Sci & Engn, Kakinada, India
[2] Andhra Univ, Coll Engn, Dept Comp Sci & Syst Engn, Visakhapatnam, Andhra Pradesh, India
来源
HELIX | 2018年 / 8卷 / 03期
关键词
CRAHN; AODV; Trust Values; CRAODV-S; Security; RSA; 32; bit; Integrity; SHA-III;
D O I
10.29042/2018-3383-3393
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Cognitive Radio Ad hoc Network (CRAHN) was a versatile, intuitive radio and network technology that can sense the available channels in the wireless spectrum and will adjust the transmission parameters in a way that it can have multiple communications to run in parallel and also will help to improve the behavior of radio spectrum. In the CRAHN there are many issues that needs to addressed major of them being spectrum scarcity due to the fact that the range of this network will be very short for which we cannot allocate much spectrum as there will be a possibility of not using it or reserving it for Primary Users (PU's) who may not be active at all times and if we allocate more spectrum at peak times it could be advantage but at majority times it will be unused. We have done a comparative study on various available protocols and found that AODV is close to address the above issue. In AODV (Ad hoc on Demand Vector Routing) is a category of Reactive protocol where it will not keep track of any route. The route will be just established whenever any intermediate node has some data to send. Once the data gets successfully transmitted then it will no longer record the address. This property is carried out with the help of maintaining sequence numbers between every pair of nodes. The existing system CRAODV-S mainly focused on security based on trust values, where the mechanism of assigning this value was given based on the Secondary Users(SU's) activities. If the trust value was a bit high than the threshold value then it will be chosen for transmitting messages compared to the remaining nodes with less trust value. This trust value will not be assigned to Primary Users as they will be trusted parties for the network. Based on this trust value the nodes can be categorized as healthy nodes and malicious nodes. The routing also depends on the trusted value of the neighbors for forwarding or receiving a message. In our proposed model CSR-AODV for better security and integrity we have implemented cryptographic techniques in terms of security by using RSA-32 bit and integrity using SHA-III for minimizing the loss of data. Security characteristic is provided by selecting the best optimal route from source to destination and when any intermediate route or node fails then to establish another route for this message transmission is carried out using random key generation. The performance of CSR-AODV and CRAODV-S is assessed for three kinds of routing structure in terms of average throughput, end to end delay, packet delivery ratio and routing overhead for satisfying different requirements from users. The routing structures on which the experiment was carried out are a) Single radio multi-channels b) Equal number of radios and channels and c) Multi-radios multichannels. The simulation result shows that our proposed model gave significant improvement in all performance metrics except for the case of average throughput in single radio multi channel. So this model will be an ideal choice for CRAHN.
引用
收藏
页码:3383 / 3393
页数:11
相关论文
共 50 条
  • [1] A Robust On-Demand Routing Protocol for Cognitive Radio Ad Hoc Networks
    Che-aron, Zamree
    Abdalla, Aisha Hassan
    Abdullah, Khaizuran
    Hassan, Wan Haslina
    Rahman, Md. Arafatur
    [J]. MOBILE AND WIRELESS TECHNOLOGY 2015, 2015, 310 : 33 - 43
  • [2] QSTOD On-demand Routing Protocol for Cognitive Radio Ad-hoc Networks
    Mallat, Yosra
    Ayadi, Mohamed
    Tabaane, Sami
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2016, : 737 - 740
  • [3] On-demand routing protocols for cognitive radio ad hoc networks
    Salim, Shelly
    Moh, Sangman
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013,
  • [4] On-demand routing protocols for cognitive radio ad hoc networks
    Shelly Salim
    Sangman Moh
    [J]. EURASIP Journal on Wireless Communications and Networking, 2013
  • [5] CO-TORA On-demand Routing Protocol for Cognitive Radio Ad-hoc Networks
    El Garoui, Lamia
    Ajib, Wessam
    Elbiaze, Halima
    [J]. 2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 654 - 659
  • [6] A Safe AODV(Ad hoc On-demand Distance Vector) Security Routing Protocol
    Kim, Jin Taek
    Kho, Jeong-Ho
    Lee, Chang-Young
    Lee, Do-Won
    Bang, Cheol-Soo
    Lee, Geuk
    [J]. ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 115 - 118
  • [7] A link-state-aware ad hoc on-demand distance vector(AODV) routing protocol for mobile ad hoc networks
    Yu, XinHao
    Yu, OuYang
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 563 - +
  • [8] I-AODV: Infrastructure based Ad Hoc On-Demand Distance Vector Routing Protocol for Vehicular Ad Hoc Networks
    Iqbal, Faisal
    Babar, Mohammad Inayatullah Khan
    Zafar, Mohammad Haseeb
    Zuhairi, Megat Farez
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SMART INSTRUMENTATION, MEASUREMENT AND APPLICATIONS (ICSIMA 2013), 2013,
  • [9] Spectrum Handoff Aware AODV Routing Protocol for Cognitive Radio Vehicular Ad Hoc Networks
    Sangi, Abdur Rashid
    Alkatheiri, Mohammed S.
    Anamalamudi, Satish
    Alqarni, Mohammed A.
    Memon, Muhammad Hammad
    Yang, Wanan
    [J]. COMPLEXITY, 2021, 2021
  • [10] Modified AODV Routing Protocol for Multi-hop Cognitive Radio Ad Hoc Networks
    Mathew, Melvin
    Let, G. Shine
    Bala, G. Josemin
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 89 - 97