Abstract
Similar to mobile ad hoc network (MANET), cloud computing also has properties including wireless communication within predesigned network and also limitations such as network privacy and performance. With regards to MANET security is a prime concern where the security is compromised through several attackers. Attacks can be of two types—active and passive. These attacks are prone to network devices and the network is made unavailable. It is hard to identify the location of unknown nodes and attacks when there is a mobility period. Prior studies show that schemes are introduced by authors to protect location of nodes that are genuine from attackers. The MANETs make use of a security routing scheme for the purpose of establishing a secure route along with a secure transmission of data. The main threat to security in case of the MANET is its integrity, privacy and non-repudiation. In order to combat with such threats to security there are several protocols to routing that have been designed for the reduction of the threats in security in the MANET. The need for such protocols that are scalable and energy efficient with the small, low power as well as inexpensive positioning instruments has resulted in the introduction of various routing protocols that are location-based with a promising choice in terms of MANETs. In this study, to strike a balance between location authentication and node identity secure location aware routing protocol (SCLARP) is developed. In the first module of the proposed study, introduction of network and attack model take place, which can follow the rules of secure authentication; whereas, in the second part of the protocol, along with location integrity, secure multicast tree is formed. The main focus of this module is the development of secure multicast groups. In the final module, deployment of public key encryption and decryption scheme take place which deploys in protecting the node from the attackers. As soon as the plain text from the side of the decryption is got the source nod or the parent node will broadcast all data packets to its destination. From the results of the study, it is shown that SCLARP performs better with regards to location and packet integrity, node authentication ratio, end-to-end delay and packet delivery ratio.
Similar content being viewed by others
References
Narsimha, G.: Trust based certificate revocation for secure routing in MANET. Procedia Comput. Sci. 92, 431–441 (2016)
Soma Sekhar, G., Sreenivas Reddy, E.: ENES: exploratory node eminence state for secure routing in mobile ad hoc networks. Int. J. Appl. Eng. Res. 11(8), 5863–5868 (2016)
Patel, V.H., Zaveri, M.A., Rath, H.K.: Trust based routing in mobile ad-hoc networks. Lect. Notes Softw. Eng. 3(4), 318–324 (2015)
Singh, P., Singh, G.: Security issues and link expiration in secure routing protocols in MANET: a review. Int. J. Adv. Res. Comput. Commun. Eng. 3(7), 7559–7565 (2014)
Shyamala, C.K., Ashok, N., Narayanan, B.: Trust-based multi-path security scheme for ad-hoc networks. Int. Sci. Press 8(15), 1735–1742 (2015)
Jayalakshmi, V., Abdul Razak, T.: Trust based power aware secure source routing protocol using fuzzy logic for mobile adhoc networks. Int. J. Comput. Sci. 43(1), 1–10 (2016)
Maxa, J.A., Mahmoud, M.S.B., Larrieu, N.: Secure routing protocol design for UAV ad hoc networks. In: IEEE/AIAA 34th Digital Avionics Systems Conference, pp. 1–15 (2015)
Yuezhongyi, S.: Reliable and secure routing ad-hoc algorithm based on collaborative monitor nodes in VANETS. Int. J. Secur. Appl. 9(6), 89–100 (2015)
Gandhi, J.R., Jhaveri, R.H.: Packet forwarding misbehaviour isolation using fuzzy trust-based secure routing in MANET. Int. J. Comput. Appl. 122(3), 30–35 (2015)
Sethulekshmi, C., Kumar, M.: Energy efficient secure routing in MANETs based on multipath erasure coding. Int. J. Eng. Comput. Sci. 4(10), 14717–14724 (2015)
Robinson, H., Rajaram, M.: Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks. Sci. World J. (2015). https://doi.org/10.1155/2015/284276
Khedkar, K.: Secure and optimizing routing technique for MANETs. Int. J. Innov. Res. Comput. Commun. Eng. 3(6), 6183–6189 (2015)
Sridhar, S., Baskaran, R.: Ant based trustworthy routing in mobile ad hoc networks spotlighting quality of service. Am. J. Comput. Sci. Inf. Technol. 3(1), 64–73 (2015)
Shyma, M., Nishanth, N.: Secure routing in mobile ad-hoc networks using evidence theory. Int. J. Adv. Trends Comput. Sci. Eng. 4(4), 16–21 (2015)
Pal, S., Sethi, S.: A secure on-demand routing protocol in cognitive radio ad hoc network. Int. J. Emerg. Technol. Comput. Appl. Sci. 14(2), 103–109 (2015)
Shah, R., Subramaniam, S., Dasarathan, D.B.L.: Mitigating malicious attacks using trust based secure-BEFORE routing strategy in mobile ad hoc networks, CIT. J. Comput. Inf. Technol. 24(3), 237–252 (2016)
Kumuda, U., Venkatraman, P.: An approach for energy based secure routing protocol. Int. J. Comput. Math. Sci. 4(12), 11–14 (2015)
Bobade, N.P., Mhala, N.N.: Performance evaluation of ad hoc on demand distance vector in MANETs with varying network size using NS-2 simulation. Int. J. Comput. Sci. Eng. 2(08), 2731–2735 (2010)
Chaudhary, M.S., Singh, V.: Simulation and study of AODV routing protocol under CBR and TCP traffic source. Int. J. Future Comput. Commun. 3(2), 84 (2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Gopinath, S., Vinoth Kumar, K. & Jaya Sankar, T. Secure location aware routing protocol with authentication for data integrity. Cluster Comput 22 (Suppl 6), 13609–13618 (2019). https://doi.org/10.1007/s10586-018-2020-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2020-7