Secure cross-layer routing protocol with authentication key management scheme for manets

被引:0
|
作者
Rama Devi G.R. [1 ]
Swamy Das M. [2 ]
Ramana Murthy M.V. [3 ]
机构
[1] Department of Computer Science and Engineering, Osmania University, Telangana, Hyderabad
[2] Department of Computer Science and Engineering, CBIT, Gandipet, Telangana, Hyderabad
[3] Department of Mathematics, Osmania University, Telangana, Hyderabad
来源
Measurement: Sensors | 2023年 / 29卷
关键词
Diffie-Hellman key; ECC; Energy consumption; MANET; PSO; Relay node selection; Secure routing;
D O I
10.1016/j.measen.2023.100869
中图分类号
学科分类号
摘要
MANET (Mobile ad-hoc networks) is typically a no-infrastructure multi-hop network where every node interacts with other network nodes either indirectly or directly via intermediate nodes. A lot of research is being undertaken to save the energy of mobile nodes at different levels. Power-relevant issues can have an effect on every layer of the stack, making the traditional layered approach ineffective. In this work, cross layered routing protocol based on PSO (Particle swarm optimization) with adapted contention window technique is proposed. To form consistent and energy efficient routing paths, PSO algorithm uses Traffic index, Average energy load, data success rate & trust value parameters that are computed from network layer. After establishing routing paths, network's contentions are measured MAC layers for communications and contention with measured contentions and average energy loads. The trust of nodes is computed using the following constraints: group trust-provided by neighbour nodes & quality trust-computed by node QoS. Dual authentications with EnDA (enhanced dual authentication) using key management strategies for enhanced data security and integrity. ECC (Elliptical curve cryptography) and Diffie-Hellman key exchanges with bilinear maps improve security of communications. The suggested protocol when measured in terms of energy usage and secure key agreements during network's transmissions, showed satisfactory performances. © 2023
引用
收藏
相关论文
共 50 条
  • [31] Secure Routing Protocol Using Cross-Layer Design and Energy Harvesting in Wireless Sensor Networks
    Alrajeh, Nabil Ali
    Khan, Shafiullah
    Lloret, Jaime
    Loo, Jonathan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [32] Cross-layer self organized routing protocol for MANET
    Kumar, Awadhesh
    Tyagi, Neeraj
    COMPUTER COMMUNICATION AND MANAGEMENT, 2011, 5 : 653 - 657
  • [33] An Efficient QoS Routing Protocol in Cognitive Radio MANETs: Cross-Layer Design Meets Deep Reinforcement Learning
    Nguyen, Toan-Van
    Tran, Thong-Nhat
    Huynh-The, Thien
    An, Beongku
    2021 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2021,
  • [34] AUTHENTICATION AND DYNAMIC KEY MANAGEMENT PROTOCOL BASED ON CERTIFIED TOKENS FOR MANETS
    Ammayappan, Kavitha
    Sastry, V. N.
    Negi, Atul
    2009 GLOBAL MOBILE CONGRESS, 2009, : 28 - +
  • [35] A Trust Based Secure Routing Scheme for MANETS
    Bhargavi, V. Sesha
    Seetha, M.
    Viswanadharaju, S.
    2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016, : 565 - 570
  • [36] A new connectionless routing algorithm using cross-layer design approach in MANETs
    Bojd, Elahe Ataee
    Moghim, Neda
    AUTOMATIKA, 2016, 57 (02) : 514 - 524
  • [37] A Scalable, Distributed and Secure Routing Protocol for MANETs
    Qabajeh, Liana Khamis
    Kiah, Laiha Mat
    Qabajeh, Mohammad Moustafa
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 51 - 56
  • [38] Cross-Layer Interception Caching for MANETs
    Gonzalez-Canete, F. J.
    Casilari, E.
    Trivino-Cabrera, A.
    AD HOC NETWORKS, (ADHOCNETS 2012), 2013, 111 : 196 - 211
  • [39] Cross-Layer Design Gains in MANETs
    Alhosainy, Ammar
    Kunz, Thomas
    Li, Li
    Vigneron, Philip J.
    2014 13TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET), 2014,
  • [40] A Secure Authentication Scheme for Integration of Cellular Networks and MANETs
    Wang, Kun
    Wu, Meng
    Xia, Pengrui
    Xie, Shendong
    Lu, Weifeng
    Shen, Subin
    2008 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS AND SIGNAL PROCESSING, VOLS 1 AND 2, 2007, : 315 - 319