An Intelligent Secured and Energy Efficient Routing Algorithm for MANETs

被引:0
作者
S. Muthurajkumar
S. Ganapathy
M. Vijayalakshmi
A. Kannan
机构
[1] Anna University,Department of Information Science and Technology, College of Engineering Guindy
[2] VIT University-Chennai Campus,School of Computing Science and Engineering
来源
Wireless Personal Communications | 2017年 / 96卷
关键词
Intrusion detection; Mobile Ad Hoc networks; Trust score; Energy efficiency; Secure routing; Malicious nodes;
D O I
暂无
中图分类号
学科分类号
摘要
Energy consumption and security are two important aspects of Mobile Ad Hoc Networks (MANETs). In MANET, application security can be provided using trust management, key management, firewalls and intrusion detection. Moreover, it is often necessary to communicate secret information in military applications where urgent and reliable communication is more important. However, most of the existing routing algorithms do not focus on the energy and security aspects while routing. Since energy and security are important criteria for reliable communication in MANET, it is essential to consider the energy and security aspects in routing algorithms. The prevention of security attacks on routing protocols and cluster based routing automatically reduces the energy consumption. Hence, we propose a new secured routing protocol called Cluster based Energy Efficient Secure Routing Algorithm (CEESRA) in this paper which is energy efficient and uses cluster based routing in which the trust scores on nodes are used to detect the intruders effectively. This routing algorithm reduces the Denial of Service attacks more efficiently by using intelligent agents for effective decision making in routing. From the experiments conducted with this trust based secured routing algorithm, it has been observed that this proposed routing algorithm not only enhances the security but also reduces the energy consumption and routing delay.
引用
收藏
页码:1753 / 1769
页数:16
相关论文
共 48 条
[1]  
Yan Z(2011)Autonomic trust management for a component-based software system IEEE Transactions on Dependable and Secure Computing 8 810-823
[2]  
Prehofer C(2010)Uncertainty modeling and reduction in MANETs IEEE Transactions on Mobile Computing 9 1035-1048
[3]  
Li F(2017)Energy-efficient and improved eWALL: e2WALL Wireless Personal Communications 92 21-31
[4]  
Wu J(2013)Intelligent feature selection and classification techniques for intrusion detection in networks: A survey EURASIP-Journal of Wireless Communications and Networking 2013 1-16
[5]  
Koren A(2011)Literature survey on power control algorithms for mobile ad-hoc network Wireless Personal Communications 60 679-685
[6]  
Simunic D(2011)Energy efficient wireless networks towards green communications Wireless Personal Communications 59 537-552
[7]  
Prasad R(2013)Energy efficient four level cooperative opportunistic communication for wireless personal area networks (WPAN) Wireless Personal Communications 69 1087-1096
[8]  
Ganapathy S(2017)Bee system based base station cooperation technique for mobile cellular networks Wireless Personal Communications 92 1193-1220
[9]  
Kulothungan K(2005)Connectivity probability of wireless ad hoc networks: definition, evaluation, comparison Wireless Personal Communications 35 135-151
[10]  
Muthurajkumar S(2010)Clustering and cluster-based routing protocol for delay-tolerant mobile networks IEEE Transactions on Wireless Communications 9 1874-1881