An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc Networks

被引:16
作者
Tripathy, Bata Krishna [1 ]
Jena, Swagat Kumar [1 ]
Bera, Padmalochan [2 ]
Das, Satyabrata [3 ]
机构
[1] Indian Inst Technol Bhubaneswar, Sch Elect Sci, Bhubaneswar, India
[2] Indian Inst Technol Bhubaneswar, Bhubaneswar, India
[3] Veer Surendra Sai Univ Technol, Informat Technol, Burla, India
关键词
Adaptive; Context; Mobile ad hoc network (MANET); Mobility; Routing protocol; Trust; ENERGY-EFFICIENT; POWER; LOCATION; PERFORMANCE; TOPOLOGY;
D O I
10.1007/s11277-020-07423-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapidly emerging wireless service requirements and deployment demands over last few decades necessitates the application of Mobile Ad hoc Networks in many areas. These application areas vary from social networks to safety-critical domains such as environmental monitoring, disaster rescue operations, military communications, etc. The potency of the ad hoc network deployment in a specific context is significantly affected by the underlying routing protocol. Hence, developing an efficient and secure routing protocol for MANETs is an important task in order to achieve the service level requirements and to satisfy the deployment demands effectively. However, development of such routing protocol is a challenging problem due to the inherent characteristics of ad hoc networks: frequent topology changes, open wireless medium, and limited resource constraints, etc. In addition, the stringent requirements: mobility, performance, security, trust and timing constraints, etc. add complexity to this problem. In this paper, we present an adaptive routing protocol for MANETs, which dynamically configures the routing function with respect to the metrics: (1) the varying requirement parameters and (2) the contextual features as per the desired application context. The requirement models include various performance, security, and functional parameters. On the other hand, the contextual features include mobility of nodes/groups of nodes, nodes' trust values, resource constraints of nodes, geographical context, roles of individual nodes etc. Our routing protocol is evaluated with extensive simulation test cases and the efficacy of the protocol is reported.
引用
收藏
页码:1339 / 1370
页数:32
相关论文
共 112 条
[1]  
Ade S.A., 2010, INT J INF TECH KNOWL, V2, P545
[2]  
[Anonymous], 2003, Research Report 5145
[3]  
[Anonymous], 1999, P 11 CAN C COMP GEOM
[4]  
[Anonymous], P 8 ANN ACM INT C MO
[5]  
[Anonymous], P ACWR 2011
[6]  
[Anonymous], P 22 IR C ART INT CO
[7]  
[Anonymous], 2002, P 1 ACM WORKSH WIR S
[8]  
Arefin M., 2012, INT C INF VIS IEEE, P535
[9]  
Basagni S., 1998, MobiCom'98. Proceedings of Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, P76, DOI 10.1145/288235.288254
[10]  
Belding-Royer E., 2003, 3561 RFC