Skip to main content
Log in

A secure and efficient cluster based location aware routing protocol in MANET

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Mobile adhoc network (MANET) is a collection of node under a communication with each other nodes in the network. They are mobile nodes which can change its location according to the requirement. So the location based routing is needed for transmission of packet. For the data packet security, the existing algorithm is enhanced as “A secure location aware routing protocol”. In this nodes are arranged by means of a clustering technique. This protocol will predict the future location of node using particle swarm optimization. The link lifetime, speed, distance and position of node is calculated earlier to find the optimized route. The trust value of node is computed from neighbor node which helps in prediction of future location and also to find malicious node in network to reduce packet loss. To prevent data from malicious node, the packets are encrypted using elliptic curve cryptography. Due to trust value, the routing information can be updated for easily and also improve the network throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shanmugapriyan, D., Murugaanandam, S.: Secured and highly reliable data transfer in MANET using position-based opportunistic routing protocol. Int. J. Innov. Sci. Eng. Res. 1(2), 69–74 (2014)

    Google Scholar 

  2. Panda, M.: Study of different routing protocols in wireless sensor networks. Am. J. Eng. Res. 5(10), 19–23 (2016)

    Google Scholar 

  3. Gupta, A.K., Sadawarti, H., Verma, A.K.: Review of various routing protocols for MANETs. Int. J. Inf. Electron. Eng. 1(3), 251–259 (2011)

    Google Scholar 

  4. Kaur, H., Singh, H., Sharma, A.: Geographic routing protocol: a review. Int. J. Grid Distrib. Comput. 9(2), 245–254 (2016)

    Google Scholar 

  5. Sarika, S., Pravin, A., Vijayakumar, A., Selvamani, K.: Security issues in mobile adhoc networks. Procedia Comput. Sci. 92, 329–335 (2016)

    Google Scholar 

  6. Boulaiche, M., Bouallouche-Medjkoune, L.: Hsecgr: highly secure geographic routing. J. Netw. Comput. Appl. 80, 189–199 (2017)

    Google Scholar 

  7. Kaur, M., Kaur, S.: Analyze and implementation of cluster based routing protocol in MANETs. Int. J. Innov. Res. Sci. Eng. Technol. 5(3), 3098–3107 (2016)

    Google Scholar 

  8. Diwaker, C., Mehla: Based route optimization technique to enhance network lifetime. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(7), 205–210 (2016)

  9. Koul, A., Patel, R.B., Bhat, V.K.: Distance and frequency based route stability estimation in mobile adhoc networks. J. Emerg. Technol. Web Intell. 2(2), 89–95 (2010)

    Google Scholar 

  10. Rahman, M., Akhtaruzzaman: An efficient position based power aware routing algorithm in mobile ad-hoc networks. I. J. Comput. Netw. Inf. Secur. 7, 43–49 (2016)

  11. Khalili-Shoja, M.R., Amariucai, G.T., Wei, S., Deng, J.: Secret common randomness from routing metadata in ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 11(8), 1674–1684 (2016)

    Google Scholar 

  12. Ertau, L., Chavan, N.J.: Elliptic curve cryptography based threshold cryptography (ECC-TC) implementation for MANETs. IJCSNS Int. J. Comput. Sci. Netw. Secur. 7(4), 48–61 (2007)

    Google Scholar 

  13. Radhika, N., Thejiya, V.: Trust based solution for mobile ad-hoc networks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(5), 73–82 (2014)

    Google Scholar 

  14. Rajasekar, S., Subramani, A.: Performance analysis of cluster based routing protocol For MANET using RNS algorithm. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(12), 234–239 (2016)

    Google Scholar 

  15. Amine, D., Nassreddine, B., Bouabdellah, K.: Energy efficient and safe weighted clustering algorithm for mobile wireless sensor networks. Procedia Comput. Sci. 34, 63–70 (2014)

    Google Scholar 

  16. Aissa, M., Belghith, A.: A Node quality based clustering algorithm in wireless mobile adhoc networks. Procedia Comput. Sci. 32, 174–181 (2014)

    Google Scholar 

  17. Aissa, M., Belghith, A., Drira, K.: New strategies and extensions in weighted clustering algorithms for mobile ad hoc networks. Procedia Comput. Sci. 19, 297–304 (2013)

    Google Scholar 

  18. Ali, H., Shahzad, W., Khan, F.A.: Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Appl. Soft Comput. 12, 1913–1928 (2012)

    Google Scholar 

  19. Mohammadi, A.O.K.: Particle swarm optimization in intelligent routing of delay-tolerant network routing. J. Wirel. Commun. Netw. 147, 1–8 (2014)

    Google Scholar 

  20. Kumar, S., Mehfuz, S.: Intelligent probabilistic broadcasting in mobile ad-hoc network: a PSO approach. J. Reliab. Intell. Environ. 2, 107–115 (2016)

    Google Scholar 

  21. Abinaya, S., Arulkumaran, G.: Detecting black hole attack using fuzzy trust approach in MANET. Int. J. Innov. Sci. Eng. Res. 4(3), 102–108 (2017)

    Google Scholar 

  22. Sivamurugan, D., Raja, L.: Secure routing in MANET using hybrid cryptography. Int. J. Res. Granthaalayah 5(4), 83–91 (2017)

    Google Scholar 

  23. Balamurugan, E.: Elliptic curve integrated encryption scheme using analysis vehicular ad-hoc network. Int. J. Innov. Sci. Eng. Res. 3(5), 47–50 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Syed Jamaesha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jamaesha, S.S., Bhavani, S. A secure and efficient cluster based location aware routing protocol in MANET. Cluster Comput 22 (Suppl 2), 4179–4186 (2019). https://doi.org/10.1007/s10586-018-1703-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-1703-4

Keywords

Navigation