logo
Ponte Academic Journal
Nov 2016, Volume 72, Issue 11

SECURE ENERGY EFFICIENT ROUTING IN MANETS BY CONSIDERING PACKET DROPPING REASONS

Author(s): Arshad Ahmad Khan Mohammad ,Ali Mirza Mahmood, Srikanth Vemuru

J. Ponte - Nov 2016 - Volume 72 - Issue 11
doi: 10.21506/j.ponte.2016.11.7



Abstract:
A mobile ad hoc networks is a wireless infrastructure less, heterogeneous, distributed & multi hop network. When compared to infrastructure based networks, MANETs have characteristics such as absence of central coordinator, dynamic network topology and constrained resources. In MANETs communication is possible through wireless radio communication medium and it does not have any physical protection & vulnerable to security solutions. Moreover, peer-to-peer network characteristic makes fundamental weak point to security attacks. Therefore, it needs a security solution to address various types of attacks on MANETs. Another challenge of MANETs is that nodes are equipped with constrained energy & it is highly difficult to recharge/replace the batteries of nodes during the mission. The major requirement in distributed environment, is providing energy efficiency along with security, for MANETs various energy efficient protocols & security protocols are developed but these mechanisms are not well suited for MANETs critical applications. Thus a single method is needed to address both the (energy & security) requirements in a single process. However, finding the secure efficient routing path between source to destination is most challenging task in this network characteristics such as lack of infrastructure, peer to peer network & resource constrain environment. In this work we are demonstrating the importance of energy efficiency along with secure routing in MANETs & review the recent relevant work. While developing a mechanism on this issue, one should need to overcome two problems i.e. Packet dropping bottleneck intermediate node & trusted third party security solutions. Therefore we proposed a secure energy efficient routing protocol to mitigate malicious activities accurately in routing layer by considering the packet loss reasons. Our proposed approach provides the authentication by chaotic maps, which has faster computation speed compare to RSA & ECC and could not be possible to solve in polynomial time by adversary
Download full text:
Check if you have access through your login credentials or your institution