Security aware dual authentication-based routing scheme using fuzzy logic with secure data dissemination for mobile ad-hoc networks

被引:4
作者
Borkar, Gautam M. [1 ]
Mahajan, A. R. [2 ]
机构
[1] Rajiv Gandhi Inst Technol, Dept Comp Engn, Bombay 400053, Maharashtra, India
[2] Govt Polytech Coll, Dept Informat Technol, Bombay 440001, Maharashtra, India
关键词
mobile ad-hoc networks; MANETs; highly efficient dual authenticated routing; HEDAR; fuzzy logic control; FLC; game theory; cipher text policy-attribute-based encryption; CP-ABE;
D O I
10.1504/IJCNDS.2018.10014501
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of mobile ad-hoc networks (MANETs) has been getting a great deal of consideration in the field of wireless networking because MANETs are vulnerable to malicious attacks. Secure transmission without node failure in MANETs is a testing issue because of the nonappearance of centralised administration, and openness in the network topology. In order to upgrade the security of network and shield the nodes from vulnerabilities, this paper proposes a highly efficient dual authentication routing scheme which utilises fuzzy logic prediction rules to select the most reliable path and the proposed scheme coordinates with cipher text policy-attribute-based encryption (CP-ABE) for secure data dispersal among the source to destination with game theory-based jammer attack detection model. The performance of the proposed scheme is assessed with respect to different evaluation metrics in different node density levels. The results obtained clearly describes the proposed scheme provides a flexible and feasible decision to select the route that meets the security requirement of data packets transmission in MANETs environment.
引用
收藏
页码:157 / 186
页数:30
相关论文
共 29 条
[1]   Dynamic packet beaconing for GPSR mobile ad hoc position-based routing protocol using fuzzy logic [J].
Alsaqour, Raed ;
Abdelhaq, Maha ;
Saeed, Rashid ;
Uddin, Mueen ;
Alsukour, Ola ;
Al-Hubaishi, Mohammed ;
Alandal, Tariq .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 47 :32-46
[2]   Mobility and QoS aware anycast routing in Mobile ad hoc Networks [J].
Basarkod, P. I. ;
Manvi, S. S. .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 48 :86-99
[3]   Performance Estimation and Power Minimizing Scheme for a Mobile Ad hoc Networking Node [J].
Ben Abderrazak, Jihane ;
Nishida, Yukikuni ;
Nishikawa, Hiroaki .
2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING (COMNET 2009), 2009, :1-6
[4]   Capacity scaling in free-space-optical mobile ad hoc networks [J].
Bilgi, Mehmet ;
Yuksel, Murat .
AD HOC NETWORKS, 2014, 12 :150-164
[5]   On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks [J].
Boppana, Rajendra V. ;
Su, Xu .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (08) :1162-1174
[6]   ANFIS and agent based bandwidth and delay aware anycast routing in mobile ad hoc networks [J].
Budyal, V. R. ;
Manvi, S. S. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 39 :140-151
[7]   Mobile Ad Hoc Networking: Milestones, Challenges, and New Research Directions [J].
Conti, Marco ;
Giordano, Silvia .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (01) :85-96
[8]   Dir-DREAM: Geographical Routing Protocol for FSO MANET [J].
Devi, Savitri ;
Sarje, Anil .
INTELLIGENT DISTRIBUTED COMPUTING, 2015, 321 :95-106
[9]   Trust-Based Routing Mechanism in MANET: Design and Implementation [J].
Eissa, Tameem ;
Razak, Shukor Abdul ;
Khokhar, Rashid Hafeez ;
Samian, Normalia .
MOBILE NETWORKS & APPLICATIONS, 2013, 18 (05) :666-677
[10]   A Secure Addressing Scheme for Large-Scale Managed MANETs [J].
Ghosh, Uttam ;
Datta, Raja .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2015, 12 (03) :483-495