secured routing
Recently Published Documents


TOTAL DOCUMENTS

76
(FIVE YEARS 22)

H-INDEX

5
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Michael Ryan Sahai

Message security in multi-hop infrastructure-less networks such as Mobile Ad Hoc Net- works has proven to be a challenging task. A number of trust-based secure routing protocols has recently been introduced comprising of the traditional route discovery phase and a data transmission phase. In the latter, the action of relaying the data from one mobile node to another relies on the peculiarity of the wireless transmission medium as well as the capability of the source nodes to keep their energy level at an acceptable and reasonable level, posing another concern which is that of energy efficiency. This thesis proposes an Energy-Aware Trust Based Multi-path secured routing scheme (E-TBM) for MANETs, based on the dynamic source routing protocol (DSR). Results show that the E-TBM scheme outperforms the Trust Based Multi-path (TBM) secured routing scheme [1], chosen as a benchmark, in terms of energy consumption of the selected routing paths, number of dead nodes, trust compromise and route selection time, chosen as performance metrics.


2021 ◽  
Author(s):  
Michael Ryan Sahai

Message security in multi-hop infrastructure-less networks such as Mobile Ad Hoc Net- works has proven to be a challenging task. A number of trust-based secure routing protocols has recently been introduced comprising of the traditional route discovery phase and a data transmission phase. In the latter, the action of relaying the data from one mobile node to another relies on the peculiarity of the wireless transmission medium as well as the capability of the source nodes to keep their energy level at an acceptable and reasonable level, posing another concern which is that of energy efficiency. This thesis proposes an Energy-Aware Trust Based Multi-path secured routing scheme (E-TBM) for MANETs, based on the dynamic source routing protocol (DSR). Results show that the E-TBM scheme outperforms the Trust Based Multi-path (TBM) secured routing scheme [1], chosen as a benchmark, in terms of energy consumption of the selected routing paths, number of dead nodes, trust compromise and route selection time, chosen as performance metrics.


2021 ◽  
Author(s):  
Vincent Koo

Due to recent advances in wireless communication technologies, mobile ad hoc networks (MANETs) have become the networks of choice for use in various applications. Unfortunately, this advantage comes with serious security concerns, particularly from a wireless channel prospective, where MANETs may be vulnerable to collaborative wormhole attacks, in particular, packet dropping and message tampering attacks. Recently, two secured routing protocols against these types of attacks (the so-called Highly Secured Approach Method or HSAM and the so-called Securing AODV against Wormhole Attacks in emergency MANET Multimedia Communications or AODV-WADR-AES) were proposed. These schemes are investigated in-depth to identify their weaknesses and a novel secured routing scheme (so-called Timed and Secure Monitoring Implementation against Wormhole Attacks in MANETs or TSMI) is proposed, with the goal to mitigate collaborative wormhole attacks in MANETs while maintaining the performance levels of both the HSAM and AODVWADR- AES schemes. Simulation results are presented to validate the stated goal using various performance metrics.


2021 ◽  
Author(s):  
Vincent Koo

Due to recent advances in wireless communication technologies, mobile ad hoc networks (MANETs) have become the networks of choice for use in various applications. Unfortunately, this advantage comes with serious security concerns, particularly from a wireless channel prospective, where MANETs may be vulnerable to collaborative wormhole attacks, in particular, packet dropping and message tampering attacks. Recently, two secured routing protocols against these types of attacks (the so-called Highly Secured Approach Method or HSAM and the so-called Securing AODV against Wormhole Attacks in emergency MANET Multimedia Communications or AODV-WADR-AES) were proposed. These schemes are investigated in-depth to identify their weaknesses and a novel secured routing scheme (so-called Timed and Secure Monitoring Implementation against Wormhole Attacks in MANETs or TSMI) is proposed, with the goal to mitigate collaborative wormhole attacks in MANETs while maintaining the performance levels of both the HSAM and AODVWADR- AES schemes. Simulation results are presented to validate the stated goal using various performance metrics.


2021 ◽  
Author(s):  
Anitha R ◽  
Tapas Bapu B R ◽  
Kuppusamy P G ◽  
Partheeban N ◽  
Sasikumar A N

Abstract Energy efficiency is playing major role in the design of a sensor network for improving the network lifetime and the trust is also important for providing the security to the data communication process. Delay is also major challenge today due to the enormous volume of network users. For overcoming all these issues, many researchers have been developed energy efficient security mechanisms for fulfilling the requirements. Even though, they are not able to satisfy the current requirements and users in terms of energy consumption, delay and security. For this purpose, this paper propose a new algorithm called Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm (FEBSRA) which is able to provide the effective delay constrained secured routing algorithm which uses the fuzzy logic is a form of many-valued logic in which the truth values of variables may be any real number between 0 and 1 both inclusive for making final decision over sensor nodes with the consideration of number of hops between the source and destination nodes, energy level of the nodes and the trust scores. Moreover, a new trust model is also introduced new formulae for calculating the trust scores with the consideration of energy level of the communication delay which is calculated by using number of hops used for the specific communication. The experimental results of the proposed secured routing algorithm demonstrated that the performance in terms of energy consumption, less delay and high throughput with security is better when compared to the existing systems.


2020 ◽  
Vol 13 (5) ◽  
pp. 942-956
Author(s):  
Putra Suma ◽  
Mohammed Ali Hussain

Background: Nodes in the mobile Ad-hoc network (MANET) have the dynamic nature due to their vast separation distance. The dynamic nature of the MANET nodes changes the routing path established for the communication. The dynamic secured routing (DSR) has gained popularity since they provide the routing path based on the demand provided by the source and destination nodes. Various literature works have discussed the DSR strategy for routing path establishment, but faces challenges since it consumes high energy during the route discovery phase. Objective: To overcome the challenges in the existing works, a DSR strategy based on the Fractional Whale optimization algorithm (FWOA) is introduced in this work. Methods: The proposed algorithm uses the C 2 TE based selection criteria which depend on the connectivity, congestion, trust, and energy for selecting the suitable nodes for the communication. The proposed FractWhale-DSR algorithm finds the secured routing path in three phases. Results: The parameters, such as throughput, delay, Packet Delivery Ratio (PDR), and the energy define the performance of the proposed model. From the simulation results, the proposed FractWhale- DSR algorithm has an overall better performance with the values of 0.57265, 0.005118, 0.786325, and 75.88636% for throughput, delay, PDR, and energy respectively at the round of 25 for the MANET with 100 nodes. Conclusion: The proposed DSR strategy has the advantage of adaptability and scalability. Also, the router selects the alternate paths, when there is a link failure in the current network.


Sign in / Sign up

Export Citation Format

Share Document