Evaluating Energy Eciency of Secure Routing Schemes for Mobile Ad-Hoc Networks
##plugins.themes.academic_pro.article.main##
Abstract
One of the primary concerns during the design of a secure routing protocol in Mobile Ad-hoc Networks (MANETs) is the balance between security and energy efficiency. Routing decisions play a vital role in secure data transmission and in balancing power consumption at the network layer in order to achieve Quality-of-Service (QoS) requirements in the network. This paper aims at evaluating the energy efficiency of different secure routing schemes addressing packet forwarding misbehavior in MANETs. The approaches are evaluated in NS-2 under distinct types of adversaries and under varying network conditions.
##plugins.themes.academic_pro.article.details##
How to Cite
Rutvij H. Jhaveri, & Narendra M Patel. (2016). Evaluating Energy Eciency of Secure Routing Schemes for Mobile Ad-Hoc Networks. International Journal of Next-Generation Computing, 7(2), 130–143. https://doi.org/10.47164/ijngc.v7i2.114
References
- Alnumay, W. S.,Chatterjee, P., and Ghosh, U. 2014. Energy aware secure routing for wireless ad hoc networks. IETE Journal of Research 60, 1 (2014), 50-59.
- Biswas, S., Nag, T. and Neogy, S. 2014. Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In Proceedings of the Applications and Innovations in Mobile Computing (AIMoC), (2014). 157-164.
- Dhurandher, S.K., Woungang, I., Gupta, A., and Bhargava, B.K. 2012. : E2siw: An energy efficient scheme immune to wormhole attacks in wireless ad hoc networks. In Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA),(2012). 472-477.
- Jhaveri, R.H., and Patel, N.M. 2015a. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks 21, 8 (2015a), 2781-2798.
- Jhaveri, R.H., and Patel, N.M. 2015b. Mobile ad-hoc networking with aodv: A review. International Journal of Next-Generation Computing 6, 3 (2015b), 165-191.
- Jhaveri, R.H., and Patel, N.M. 2016. Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. International Journal of Communication Systems (2016).
- Kukreja, D., Dhurandher, S.K., and , Reddy, B.V. 2015. Enhancing the security of dynamic source routing protocol using energy aware and distributed trust mechanism in manets. Intelligent Distributed Computing (2015), 83-94.
- Liu, W., Zhang, C., Yao, G.,and Fang, Y. 2011. DELAR: a device-energy-load aware relaying framework for heterogeneous mobile ad hoc networks. IEEE Journal on Selected Areas in Communications 29, 8 (2011), 1572-1584.
- Mahfoudh, S., and Minet, P. 2010. : Energy-aware routing in wireless ad hoc and sensor networks. In Proceedings of the 6th International Wireless Communications and Mobile Computing Conference,(2010). 1126-1130.
- Miglani, M., Kukreja, D., Dhurandher, S.K., and Reddy, B.V. 2014. Power aware and secure dynamic source routing protocol in mobile ad hoc networks. Security in Computing and Communications (2014), 45-56.
- Patel, A.D., and Chawda, K. 2015. Dual security against grayhole attack in manets. Intelligent computing, communication and devices(2015), 33-37.
- Raj, P.N., and Swadas, P.B. 2009. Dpraodv:A dyanamic learning system against blackhole attack in aodv based manet. International Journal of Computer Science Issues 2 (2009), 54-59.
- Sarkar, S., and Datta, R. 2016. A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Networks 37 (2016), 209-227.
- Shafer, G. 1976. A mathematical theory of evidence (Vol 1). Princeton: Princeton university press (1976). Subramaniyan, S., Johnson, W., and Subramaniyan, K. 2014. A distributed framework for detecting selfish nodes in MANET using Record-and Trust-Based Detection (RTBD) technique. EURASIP Journal on Wireless Communications and Networking 2014, 1 (2014), 1-10.
- van der Moolen, W. 1998. IEEE 802.11 WaveLAN PC Card User0 s Guide. Lucent Technologies (1998).
- Vasserman, E.Y., and Hopper, N. 2013. Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE Transactions on Mobile Computing 12, 2 (2013), 318-332.
- Walikar, G.A., and Biradar, R.C. 2015. : Energy aware multicast routing in mobile ad-hoc networks using NS-2. In Proceedings of the IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT),(2015). 1-7.
- Lee, Y.C.B., and Youn, H.Y. 1996. Power management in mobile computing. Technical report, University of Pennsylvania (1996).