Skip to main content
Log in

A Three Layered Peer-to-Peer Energy Efficient Protocol for Reliable and Secure Data Transmission in EAACK MANETs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In a wireless adhoc network packets may be dropped due to the high node mobility. This network behavior undermines the network credibility to successfully route messages. Packet dropping may also be due to the presence of malicious nodes. Also, maintaining a viable route for the packets to travel is a greater challenge as it involves discovering a route and maintaining it for the entire session. It is very important to resolve these issues in order to maintain the performance of an EAACK MANET (Enhanced Adaptive Acknowledgement). The performance of a MANET rests heavily on its successful transmission rate. In order to have a high success rate all of these three issues need to be addressed. We have proposed a protocol (FDCRP) that would incorporate an efficient three layered framework into an EAACK MANET to ensure a high transmission rate. In order to include this framework into EAACK MANETs, the network would be divided into clusters. To manage the high mobility of the nodes and to form clusters faster, we use the node information efficiently. This technique involves the use of fuzzy logic and helps form clusters dynamically. We also incorporate a three tier filtering scheme to isolate the trusted nodes in forming a cluster, as there is a heavy possibility that the cluster nodes or even the cluster head turning malicious in the course of a transmission. The third level of our framework would address the issue of discovering better routes for the packets to reach their destination. This scheme would use the subset of intermediate clusters along the route to deliver the packet successfully to its intended destination. The proposed protocol would be capable of addressing multiple issues in EAACK MANETs thus maximizing the overall performance of the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communication, 30(14/15), 2826–2841.

    Article  Google Scholar 

  2. Tselikis, C., Mitropoulos, S., Komninos, N., & Douligeris, C. (2012). Degree-based clustering algorithms for wireless Ad Hoc networks under attack. IEEE Communications Letters, 16(5), 619–621.

    Article  Google Scholar 

  3. Zeng, Y., Cao, J., Guo, S., Yang, K., & Xie, L. (2009). SWCA: A secure weighted clustering algorithm in wireless ad hoc networks. In IEEE wireless communications and networking conference WCNC.

  4. Nishimura, I., Nagase, T., Takehana, Y., & Yoshioka, Y. (2011). Secure clustering for building certificate management nodes in ad-hoc network. In International conference on network-based information systems (pp. 685–689).

  5. Rifà-Pous, H., & Herrera-Joancomartí, J. (2011). A fair and secure cluster formation process for ad hoc networks. Journal Wireless Personal Communications: An International Journal archive, 56(3), 625–636.

    Article  Google Scholar 

  6. Sivaranjani, V., & Rajalakshmi, D. (2012). Secure cluster head election for intrusion detection in MANET. Journal of Computer Applications, 5(EICA2012-4), 10.

    Google Scholar 

  7. Adams, W. J., & Davis, N. J. (2005). Toward a decentralized trust based access control system for dynamic collaboration. In Proceedings of the 6th annual IEEE system, man and cybernetics information assurance workshop (SMC’05) (pp. 317–324).

  8. Boukerche, A. & Ren, Y. (2008). A security management scheme using a novel computational reputation model for wireless and mobile Ad Hoc networks. In Proceedings of the 5th ACM international symposium on performance evaluation of wireless ad-hoc, sensor, and ubiquitous networks (PE-WASUN’08) (pp. 88–95).

  9. Li, R., Li, J., Liu, P., & Chen, H. (2007). An objective trust management framework for mobile Ad Hoc networks. In Proceedings of the IEEE 65th vehicular technology conference (VTC’07) (pp. 56– 60).

  10. Theodorakopoulos, G., & Baras, J. S. (2004). Trust evaluation in adhoc networks. In Proceedings of the ACM workshop on wireless security (WiSe’04) (pp. 1–10).

  11. Jiang, T., & Baras, J. S. (2004). Ant-based adaptive trust evidence distribution in MANET. In Proceedings of the 24th international conference on distributed computing systems workshops (pp. 588–593).

  12. Yan, Z., Zhang, P., & Virtan, T. (2003). Trust evaluation based security solution in Ad Hoc networks. In Proceedings of 7th nordic workshop on secure IT systems.

  13. Pirzada, A. A., & McDonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian conference on computer science (ACSC’04) (vol. 26, pp. 47–54).

  14. Ghosh, T., Pissinou, N., & Makki, K. (2004). Collaborative trust based secure routing in multihop ad hoc networks. In Proceedings of the 3rd international IFIP-TC6 networking conference on NETWORKING 2004. Networking technologies, services, and protocols; performance of computer and communication networks; mobile and wireless communications, Athens, Greece, May 9–14, 2004, Lecture Notes in Computer Science (vol. 3042, pp. 1446–1451).

  15. Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Applications, 10(6), 985–995.

    Article  Google Scholar 

  16. Milan, F., Jaramillo, J. J., & Srikant, R. (2006). Achieving cooperation in multihop wireless networks of selfish nodes. In Proceedings of the workshop on game theory for communications and networks (GameNets’06).

  17. Safa, H., Artail, H., & Tabet, D. (2010). A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Networks, 16(4), 969–984.

    Article  Google Scholar 

  18. Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Journal of Cluster Computing, 5(2), 193–204.

    Article  Google Scholar 

  19. Bechler, M., Hof, H., Kraft, D., Pahlke, F., & Wolf, L. (2004). A cluster-based security architecture for ad hoc networks. In Proceedings of the 23rd annual joint conference of the IEEE computer and communications societies (INFOCOM’04) (vol. 4, pp. 2393–2403).

  20. Chatterjee, P., Sengupta, I., & Ghosh, S. K. (2012). STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. Cluster Computing, 15, 303–320.

    Article  Google Scholar 

  21. Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2017). STFDR: Architecture of competent protocol for efficient route discovery and reliable transmission in CEAACK MANETs. Wireless Personal Communications, 97(4), 5817–5839.

    Article  Google Scholar 

  22. Sathiamoorthy, J., & Ramakrishnan, B. (2017). A reliable data transmission in EAACK MANETs using hybrid three-tier competent fuzzy cluster algorithm. Springer Journal of Wireless Personal Communication, 97(4), 5897–5916.

    Article  Google Scholar 

  23. Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.

    Article  Google Scholar 

  24. Nayak, C. K., Abani Kumar, G. K., Parida, K., & Das, S. (2011). Detection of routing misbehavior in MANET with 2ACK scheme. International Journal of Advanced Computer Science and Applications. https://doi.org/10.14569/IJACSA.2011.020119.

    Google Scholar 

  25. Balakrishna, R., Reddy, M. M., Rao, U. R., & Ramachanndra, G. A. (2009). Detection of routing minbehavior in MANET using 2ACK. In IEEE international advance computing conference (IACC 2009), Patiala, India, 6–7 March.

  26. Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). A reliable and secure data transmission in CEAACK MANETs using distinct dynamic key with classified digital signature cryptographic algorithm. In IEEE international conference on computing and communications technologies (ICCCT).

  27. Sathiamoorthy, J., & Ramakrishnan, B. (2016). CEAACK—A reduced acknowledgment for better data transmission for MANETs. International Journal of Computer Network and Information Security, 2, 64–71.

    Article  Google Scholar 

  28. Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144–151.

    Google Scholar 

  29. Taheri, H., Neamatollahi, P., Younis, O. M., Naghibzadeh, S., & Yaghmaee, M. H. (2012). An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic. Journal of Ad Hoc Networks, 10(7), 1469–1481.

    Article  Google Scholar 

  30. Bagci, H., & Yazici, A. (2010). An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. Applied Soft Computing, 13(4), 1741–1749.

    Article  Google Scholar 

  31. Sathiamoorthy, J., & Ramakrishnan, B. (2017). A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs. Springer Soft Computing, 11 July 2017 (Online).

  32. Sathiamoorthy, J., & Ramakrishnan, B. (2016). Energy and delay efficient dynamic cluster formation using improved ant colony optimization algorithm in EAACK MANETs. Springer Journal of Wireless Personal Communication, 1–122.

  33. Sathiamoorthy, J., & Ramakrishnan, B. (2015). Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK. Springer Journal of Wireless Networks, 1–15.

  34. Lee, J. S., & Cheng, W. L. (2012). Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication. IEEE Sensors Journal, 12(9), 2891–2897.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sathiamoorthy Jayaraman.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jayaraman, S., Bhagavathiperumal, R. & Mohanakrishnan, U. A Three Layered Peer-to-Peer Energy Efficient Protocol for Reliable and Secure Data Transmission in EAACK MANETs. Wireless Pers Commun 102, 201–227 (2018). https://doi.org/10.1007/s11277-018-5835-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5835-x

Keywords

Navigation