CFP last date
22 April 2024
Reseach Article

A New Approach of Secure Power Aware Routing for Mobile Ad-Hoc Network

by Manesh P. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 3
Year of Publication: 2013
Authors: Manesh P. Patil
10.5120/11376-6644

Manesh P. Patil . A New Approach of Secure Power Aware Routing for Mobile Ad-Hoc Network. International Journal of Computer Applications. 67, 3 ( April 2013), 24-34. DOI=10.5120/11376-6644

@article{ 10.5120/11376-6644,
author = { Manesh P. Patil },
title = { A New Approach of Secure Power Aware Routing for Mobile Ad-Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 3 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 24-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number3/11376-6644/ },
doi = { 10.5120/11376-6644 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:24:14.366999+05:30
%A Manesh P. Patil
%T A New Approach of Secure Power Aware Routing for Mobile Ad-Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 3
%P 24-34
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In order to assist communication within a mobile Ad-Hoc network, a well-organized routing protocol is required to determine routes between mobile nodes. Power is one of the most important design criteria for Ad-Hoc networks as batteries provide inadequate working capacity to the mobile nodes. Power failure of a mobile node not only affects the node itself but also its ability to forward packets on behalf of others and hence affects the overall network lifetime. Much research efforts have been devoted to develop energy aware routing protocols. In this paper we propose an efficient algorithm, which maximizes the network lifetime by minimizing the power consumption during the source to destination route establishment alongside making the node secure. Limited resource availability such as battery power and security are the major issues to be handled with mobile Ad-Hoc networks. By using Efficient secure routing protocol for mobile ad hoc networks that achieves secrecy of data message and secure the routing operation. The security schemes aims at preventing attacks by malicious node that intentionally disrupt the route discovery process. The protocol also assures a source node generates a route discovery request is able to identify and authenticate the route reply from destination. In mobile Ad-Hoc networks, an attacker can easily disrupt the functioning of the network by attacking the underlying routing protocol. Packets are secure during source to destination transmission by using Two Fish Encryption algorithm. As a case study proposed algorithm has been incorporated along with the route discovery procedure of AODV and PAR, by simulation it is observed that proposed algorithm's performance is better as compare to AODV and PAR in terms of packet delivery ratio and network lifetime for different network scenarios.

References
  1. Forman G. , Zahorjan J. ,"The Challenges of Mobile Computing," IEEE Computer 1994; 27(4):38-47.
  2. N. Sastry, U. Shankar, and D. Wagner¸ "Secure verification of location claims", In Proceedings of The 2nd ACM workshop on wireless security, San Diego, CA, SA: ACM, pp. 1-10, 2003.
  3. Ajina A, G. R . Sakthidharan, Kanchan M. Miskin, "Study of Energy Efficient Power Aware, Routing Algorithm and Applications", Second International Conference on Machine Learning and Computing 2010, vol. , no. , pp. , 299-291, 2010.
  4. L. Abusalah, A. Khokhar, M. Guizani, "Trust Aware Routing in Mobile Ad Hoc Networks", In Proceeding of Communication Society subject matter experts for publication in the IEEE GLOBECOM-2006, 2006.
  5. Wenjing Lou, Wei Liu, Yuguang Fang, "A Simulation Study of Security Performance using Multipath Routing in Ad Hoc Networks", vol. no. , pp. 2142- 2146, 2003.
  6. Perkins C. , "Ad Hoc Networking" Addison-Wesley: 2001; 1-28.
  7. Chang J-H, Tassiulas L,"Energy Conserving Routing in Wireless Ad-hoc Networks," Proc. IEEE International Conf. on Computer Communications (IEEE Infocom) 2000; pp 22-31.
  8. Li Q, Aslam J, Rus D, "Online Power-aware Routing in Wireless Ad-hoc Networks," Proceedings of Int'l Conf. on Mobile Computing and Networking (MobiCom'2001), 2001.
  9. Stojmenovic I, Lin X. "Power-Aware Localized Routing in Wireless Networks," IEEE Trans. Parallel and Distributed Systems 2001; 12(11):1122-1133.
  10. Doshi S, Brown TX, "Minimum Energy Routing Schemes for a Wireless Ad Hoc Network," Proceedings of the Conference on Computer Communications (IEEE Infocom 2002), 2002.
  11. Woo K, Yu C et al. , "Localized Routing Algorithm for Balanced Energy Consumption in Mobile Ad Hoc Networks,"Proc. of Int'l Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems 2001,117-124.
  12. Toh C-K,"Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Adhoc Networks,"IEEE Communications 2001.
  13. Vinay Rishiwal and Shekhar Verma,"QoS-Based Pure Adaptive Routing in MANETs", IEEE International Conference on Emerging Trends in Engineering and Technology (IEEE ICETET 2008), 2008, 228-233.
  14. Vinay Rishiwal, Mano Yadav and Shekhar Verma, "Power Aware Routing to Support Real Time Traffic in Mobile Ad hoc Networks," ICETET '08. First International Conference on Emerging Trends in Engineering and Technology, vol. , no. , pp. 223-227,16-18 July 2008JCS&T Vol. 9 No. 2, pp. 101-109 Oct 2008.
  15. R. Sivakami, Dr. G. M. Kadhar Nawaz, "Secured Communication for MANETS in Military", International Conference on Computer, Communication and Electrical Technology –ICCCET2011, vol. no. , pp. , 146-151, 18th, 19th Mar. 2011.
  16. Rodríguez, Demóstenes Zegarra, Rosa, Renata Lopes, Lima, Pedro Hélio Medeiros de , "New Cache System-Based Power-Aware Algorithm in MANET," Fifth International Conference on Digital Communication (ICDT) , vol. , no. , pp. 86-91, 13-19 June 2010.
  17. Keng Seng NG, Winston K. G. H. SEAH, "Routing Security and Data Confidentiality for Mobile Ad Hoc Networks", vol. pp. , 1821-1825, IEEE-2003.
  18. Ahmed Nabet, Rida Khatoun, Lyes Khoukhi, Juliette Dromard and Dominique Gaïti, "Towards Secure Route Discovery Protocol in MANET," IEEE 2011,2011.
  19. Stephen Dabideen , Bradley R. Smith, J. J. Garcia-Luna-Aceves, "An End-to-End Solution for Secure and Survivable in MANETs", 7th International Workshop on the Design of Reliable Communication Networks, vol. no. , pp. , 183-190,2009.
  20. Vladimir Berman and Biswanath Mukherjee, "Data Security in MANETs using Multipath Routing and Directional Transmission", In Proceedings of IEEE Communications Society Subject matter experts for publication in the IEEE ICC 2006,vol. , no. , pp. 2322-2328, 2006.
  21. Mike Burmester, and Breno de Medeiros, "On the Security of Route Discovery in MANETs",IEEE TRANSACTIONS ON MOBILE COMPUTING, vol. 8, no. 9, pp. , 1180-1188, Sept. 2009.
  22. Hisham Dahshan and James Irvine,"A Trust Based Threshold Cryptography Key Management for Mobile Ad hoc Network", 2009 -IEEE, 2009.
  23. Jahangir khan, Dr. syed Irfan Hyder, Dr. Syed Malek Fakar Duani Syed Mustafa, "Modeling and Simulation Of Dynamic Intermediate Nodes And Performance Analysis in MANETS Reactive Routing protocols," International Journal of Grid and Distributed Computing Vol. 4, pp. 30-56, March 2011.
  24. P. K. Suri, M. K. Soni, Parul Tomar, "QOS Enable Power Aware Routing Protocol (QEPAR)," International Journal of Engineering Science and Technology Vol. 2(9), 2010, 4880-4885,2010.
  25. Seungjin Park, Seong-Moo Yoo, "Routing Table Maintenance in Mobile AD HOC Networks," ICACT2010ISBN 978-89-5519-146-2 issue Feb. 7-10, pp. 1321-1325.
  26. Haojun Huang; Guangmin Hu; Fucai Yu; , "Delay-Sensitive and Power-Aware routing in wireless ad hoc networks," International Conference on Communication Technology (ICCT), 2010 12th IEEE, vol. , no. , pp. 496-499, 11-14 Nov. 2010.
  27. Murali P. , Rakesh K. , Hota C. , Yla-Jaaski A. , "Energy-aware routing in Mobile Ad-Hoc Networks," Wireless Days, 2008. , WD '08. 1st IFIP, vol. , no. , pp. 1-5, 24-27 Nov. 2008.
  28. Kamarularifin Abd Jalil, Zaid Ahmad, Jamalul-Lail Ab Manan, "Securing Routing Table Update in AODV Routing Protocol", 2011 IEEE Conference on Open Systems (ICOS2011), September 25 - 28, 2011, Langkawi, Malaysia,2011.
  29. A. Menaka Pushpa, "Trust Based Secure Routing in AODV Routing Protocol", 2009 IEEE, 2009.
  30. S. Tapaswi , Virendra Singh Kushwah, "Securing Nodes in MANETs Using Node Based Key Management Scheme", 2010 International Conference on Advances in Computer Engineering, vol. , no. , pp. 228-231, 2010.
  31. Xing Zhang, Jingsha He and Qian Wei,"Security Considerations on Node Mobility in Wireless Sensor Networks", Fourth International Conference on Computer Sciences and Convergence Information Technology 2009, vol. , no. , pp. 1143-1146, 2009.
  32. Tirthraj Rai, Ashish Jain, "Secure Routing in Mobile Ad hoc Network", International Journal of Computer Science & Communication, vol. 1, no. 1, January-June 2010, pp. 125-127, 2010.
  33. Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, "Twofish: A 128-Bit Block Cipher", In AES Round 1 Technical Evaluation CD-1: Documentation, NIST, 15th June 1998. See http: //www. nist. gov. aes.
  34. Doug Whiting, John Kelsey, Bruce Schneier, David Wagner, Niels Ferguson, Chris Hall, "Further Observations on the Key Schedule of Twofish", http://www. counterpane. com/twofish. html, Mar. 16, 1999.
  35. Kamal Kumar Chauhan, Shashikala Tapaswi, "A Secure Key Management System in Group Structured Mobile Ad hoc Networks", 2010 IEEE, vol. , no. , pp. 307-311, 2010.
  36. Pil-Joong Kang, Seon-Keun Lee, Hwan-Youg Kim, "Study on the Design of MDS-M2 Twofish Cryptographic Algorithm Adapted to Wireless Communication", vol. , no. , pp. 692-695, Feb, 20-22, 2006 ICACT 2006.
  37. Dr. S. A. M Rizvi , Dr. Syed Zeeshan Hussain, Neeta Wadhwa, "Performance Analysis of AES and TwoFish Encryption Schemes", 2011 International Conference on Communication Systems and Network Technologies, vol. , no. , pp. 76-79,2011.
  38. Doug Whiting, John Kelsey, Bruce Schneier, David Wagner, Niels Ferguson, Chris Hall," Further Observations on the Key Schedule of Two_sh",vol. ,no. ,pp. 1-5, March 16, 1999.
  39. Niels Ferguson, John Kelsey, Bruce Schneier, Doug Whiting, "A Two_sh Retreat: Related-Key Attacks Against Reduced-Round Two_sh", vol. , no. , pp. 1-10, February 14, 2000.
  40. Eitan Altman and Tania Jimenez, Lecture Notes on,"NS Simulator for Beginners", December 03, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Ad-Hoc networks Power Aware Routing Secure Power Aware Routing Protocol and Ad-Hoc on Demand Distance Vector Protocol Mobile Ad-Hoc Network AODV MANET and Two-fish