Skip to main content
Log in

Secure location aware routing protocol with authentication for data integrity

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Similar to mobile ad hoc network (MANET), cloud computing also has properties including wireless communication within predesigned network and also limitations such as network privacy and performance. With regards to MANET security is a prime concern where the security is compromised through several attackers. Attacks can be of two types—active and passive. These attacks are prone to network devices and the network is made unavailable. It is hard to identify the location of unknown nodes and attacks when there is a mobility period. Prior studies show that schemes are introduced by authors to protect location of nodes that are genuine from attackers. The MANETs make use of a security routing scheme for the purpose of establishing a secure route along with a secure transmission of data. The main threat to security in case of the MANET is its integrity, privacy and non-repudiation. In order to combat with such threats to security there are several protocols to routing that have been designed for the reduction of the threats in security in the MANET. The need for such protocols that are scalable and energy efficient with the small, low power as well as inexpensive positioning instruments has resulted in the introduction of various routing protocols that are location-based with a promising choice in terms of MANETs. In this study, to strike a balance between location authentication and node identity secure location aware routing protocol (SCLARP) is developed. In the first module of the proposed study, introduction of network and attack model take place, which can follow the rules of secure authentication; whereas, in the second part of the protocol, along with location integrity, secure multicast tree is formed. The main focus of this module is the development of secure multicast groups. In the final module, deployment of public key encryption and decryption scheme take place which deploys in protecting the node from the attackers. As soon as the plain text from the side of the decryption is got the source nod or the parent node will broadcast all data packets to its destination. From the results of the study, it is shown that SCLARP performs better with regards to location and packet integrity, node authentication ratio, end-to-end delay and packet delivery ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Narsimha, G.: Trust based certificate revocation for secure routing in MANET. Procedia Comput. Sci. 92, 431–441 (2016)

    Article  Google Scholar 

  2. Soma Sekhar, G., Sreenivas Reddy, E.: ENES: exploratory node eminence state for secure routing in mobile ad hoc networks. Int. J. Appl. Eng. Res. 11(8), 5863–5868 (2016)

    Google Scholar 

  3. Patel, V.H., Zaveri, M.A., Rath, H.K.: Trust based routing in mobile ad-hoc networks. Lect. Notes Softw. Eng. 3(4), 318–324 (2015)

    Article  Google Scholar 

  4. Singh, P., Singh, G.: Security issues and link expiration in secure routing protocols in MANET: a review. Int. J. Adv. Res. Comput. Commun. Eng. 3(7), 7559–7565 (2014)

    Google Scholar 

  5. Shyamala, C.K., Ashok, N., Narayanan, B.: Trust-based multi-path security scheme for ad-hoc networks. Int. Sci. Press 8(15), 1735–1742 (2015)

    Google Scholar 

  6. Jayalakshmi, V., Abdul Razak, T.: Trust based power aware secure source routing protocol using fuzzy logic for mobile adhoc networks. Int. J. Comput. Sci. 43(1), 1–10 (2016)

    Google Scholar 

  7. Maxa, J.A., Mahmoud, M.S.B., Larrieu, N.: Secure routing protocol design for UAV ad hoc networks. In: IEEE/AIAA 34th Digital Avionics Systems Conference, pp. 1–15 (2015)

  8. Yuezhongyi, S.: Reliable and secure routing ad-hoc algorithm based on collaborative monitor nodes in VANETS. Int. J. Secur. Appl. 9(6), 89–100 (2015)

    Google Scholar 

  9. Gandhi, J.R., Jhaveri, R.H.: Packet forwarding misbehaviour isolation using fuzzy trust-based secure routing in MANET. Int. J. Comput. Appl. 122(3), 30–35 (2015)

    Google Scholar 

  10. Sethulekshmi, C., Kumar, M.: Energy efficient secure routing in MANETs based on multipath erasure coding. Int. J. Eng. Comput. Sci. 4(10), 14717–14724 (2015)

    Google Scholar 

  11. Robinson, H., Rajaram, M.: Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks. Sci. World J. (2015). https://doi.org/10.1155/2015/284276

    Article  Google Scholar 

  12. Khedkar, K.: Secure and optimizing routing technique for MANETs. Int. J. Innov. Res. Comput. Commun. Eng. 3(6), 6183–6189 (2015)

    Google Scholar 

  13. Sridhar, S., Baskaran, R.: Ant based trustworthy routing in mobile ad hoc networks spotlighting quality of service. Am. J. Comput. Sci. Inf. Technol. 3(1), 64–73 (2015)

    Google Scholar 

  14. Shyma, M., Nishanth, N.: Secure routing in mobile ad-hoc networks using evidence theory. Int. J. Adv. Trends Comput. Sci. Eng. 4(4), 16–21 (2015)

    Google Scholar 

  15. Pal, S., Sethi, S.: A secure on-demand routing protocol in cognitive radio ad hoc network. Int. J. Emerg. Technol. Comput. Appl. Sci. 14(2), 103–109 (2015)

    Google Scholar 

  16. Shah, R., Subramaniam, S., Dasarathan, D.B.L.: Mitigating malicious attacks using trust based secure-BEFORE routing strategy in mobile ad hoc networks, CIT. J. Comput. Inf. Technol. 24(3), 237–252 (2016)

    Article  Google Scholar 

  17. Kumuda, U., Venkatraman, P.: An approach for energy based secure routing protocol. Int. J. Comput. Math. Sci. 4(12), 11–14 (2015)

    Google Scholar 

  18. Bobade, N.P., Mhala, N.N.: Performance evaluation of ad hoc on demand distance vector in MANETs with varying network size using NS-2 simulation. Int. J. Comput. Sci. Eng. 2(08), 2731–2735 (2010)

    Google Scholar 

  19. Chaudhary, M.S., Singh, V.: Simulation and study of AODV routing protocol under CBR and TCP traffic source. Int. J. Future Comput. Commun. 3(2), 84 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Gopinath.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gopinath, S., Vinoth Kumar, K. & Jaya Sankar, T. Secure location aware routing protocol with authentication for data integrity. Cluster Comput 22 (Suppl 6), 13609–13618 (2019). https://doi.org/10.1007/s10586-018-2020-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2020-7

Keywords

Navigation