Abstract
With the evolution of numerous secure routing protocols in mobile adhoc network, there is a tradeoff between the security effectiveness against wormhole attack and energy required to support execution of such security protocols using cryptographic approaches. This paper discusses about a novel routing protocol that offers higher degree of energy conservation when exchanging routing information and at the same time offers a joint usage of unicast, multicast and broadcasting services for faster routing update as well as faster communication establishment required from security viewpoint. The presented solution enhances multicast routing and develops a novel control message. It also rectifies the problems of an intermittent links owing to dynamic topology using graph-based approach. Compared with existing routing protocol, the proposed system offers better conservation of energy and satisfactory communication performance in mobile ad-hoc network.
Similar content being viewed by others
References
Al-Omari, S. A. K., & Sumari, P. (2010). An overview of mobile adhoc networks for the existing protocols and applications. International Journal on Applications of Graph Theory in Wireless Adhoc Networks and Sensor Networks, 2(1), 87–110.
Goyal, P., Parmar, V., & Rishi, R. (2011). MANET: Vulnerabilities, challenges, attacks, application. International Journal of Computational Engineering & Management, 11, 32–37.
Mueller, S., Tsang, R. P., & Ghosal, D. (2004). Multipath routing in mobile ad hoc networks: Issues and challenges. In Springer-Lecture Notes in Computer Science (pp. 209–234).
Upadhayaya, S., & Gandhi, C. (2009). Quality Of service routing in mobile ad hoc networks using location and energy parameters. International Journal of Wireless & Mobile Networks (IJWMN), 1(2), 138–147.
Ali, M. A., Sarwar, Y. (2011). Security Issues regarding MANET (Mobile Ad Hoc Networks): Challenges and Solutions. Master Thesis Computer Science of Blekinge Institute of Technology (pp. 1–65) Sweden.
Balachandran, N. (2012). Surveying solutions to securing on-demand routing protocols in MANETs.International Journal of Advanced Research in Computer and Communication Engineering, 4(1), 1486–1491.
Guirguis, S. K., & Saaid, O. S. (2012). Evaluating the performance of secure routing protocols in mobile ad-hoc networks. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 710–716.
Kukreja, D., Singh, U., & Reddy, B. V. R. (2013). A survey of trust based routing protocols in MANETs. Journal of Advances in Computer Networks, 1(4), 280–285.
Geetha, S. B., & Patil, V. C.(2015). Evaluating the research trends and techniques for addressing wormhole attack in MANET. International Journal of Computer Applications, 110(6), 1–11.
Li, Z., Pu, D., Wang, W., & Wyglinski, A. (2011). Forced collision: Detecting wormhole attacks with physical layer network coding. IEEE-Tsinghua Science And Technology, 6(5), 505–519.
Upadhyay, S., & Bajpai, A. (2012). Avoiding wormhole attack in MANET using statistical analysis approach. International Journal on Cryptography and Information Security, 2(1), 15–23.
Yi, J., & Clausen, T. (2014). Collection tree extension of reactive routing protocol for low-power and lossy networks. Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, 10, 1–12.
Wang, F., Wang, F., Huang, B., & Yang, L. T. (2010). COSR: A reputation—based secure route protocol in MANET. EURASIP Journal on Wireless Communications and Networking, 7, 890–893.
Kim, D., Kim, H., Kim, G., & Kim, S. (2013). A counterattack-detection scheme in transmission time-based wormhole detection methods. Hindawi Publishing Corporation-International Journal of Distributed Sensor Networks, 9, 184931.
Stoleru, R., Wu, H., & Chenji, H. (2012). Secure neighbor discovery and wormhole localization in mobile ad hoc networks. Elsevier-Adhoc Networks, 10, 1179–1190.
Dwivedi, S., & Tripathi, P. (2014). An efficient approach for detection of wormhole attack in mobile ad-hoc network. International Journal of Computer Applications, 104(7), 18–23.
Matam, R., & Tripathy, S. (2013). WRSR: wormhole-resistant secure routing for wireless mesh networks. EURASIP Journal onWireless Communications and Networking, 180, 1–12.
Roy, D. B., Chaki, R., & Chaki, N. (2009). A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks. International Journal of Network Security & Its Applications (IJNSA), 1(1), 44–52.
Nivedha, S., & Narayanan, S. S. (2015). Detection and prevention of wormhole attack in MANET using new fresh algorithm. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 4(5), 2321–2326.
Vandana, C.P., & Devaraj, A. F. S. (2013). MLDW—A multilayered detection mechanism for wormhole attack in AODV based MANET. International Journal of Security, Privacy and Trust Management (IJSPTM), 2(3), 29–41.
Vu, H., Kulkarni, A., Sarac, K., & Mittal, N. (2008). WORMEROS: A new framework for defending against wormhole attacks on wireless ad hoc networks. International Conference on Wireless Algorithms, Systems, and Applications (WASA), 5258, 491–502.
Vijayalakshmi, S., & Rabara, S. A. (2011). Weeding wormhole attack in MANET multicast routing using two novel techniques—LP3 and NAWA2. International Journal of Computer Applications, 16(7), 26–33.
Qabajeh, L. K.., & Kiah, L. M. (2011). Secure unicast position-based routing protocols for ad-hoc networks. Report of Acta Polytechnica Hungarica, 8(6), 191–214.
Yu, P. H., & Pooch, U. W. (2011).Security and dynamic encryption system in mobile ad-hoc network. IntechOpen, 23, 470–490.
Hu, Y.-C., Johnson, D. B., & Perrig, A. (2002). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (pp. 175–192).
Lai, W.-S., Lin, C.-H., & Liu, J.-C. (2008). I-SEAD: A secure routing protocol for mobile ad hoc networks. International Journal of Multimedia Ubiquitous Engineering, 3(4), 1–13.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Geetha, S.B., Patil, V.C. Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network. Wireless Pers Commun 97, 859–880 (2017). https://doi.org/10.1007/s11277-017-4541-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4541-4