Advertisement

Cluster Computing

, Volume 22, Supplement 4, pp 9905–9913 | Cite as

A generalized framework for disruption tolerant secure opportunistic routing during emergency situations using MANETs

  • K. PushpalathaEmail author
  • M. Karthikeyan
Article

Abstract

Mobile ad-hoc networks (MANETs) play a constitutive role in the field of telecommunication. It enables communication between moving nodes by using auto-node configuration and multi hop wireless routing strategies. During disasters, the existing telecommunication structure is either completely destroyed or partially collapsed. Thus, it is very difficult to perform data communications during that period and also it takes more time to restore it to its original structure. The purpose of this research paper is to ensure reliable and secured communication using opportunistic routing between mobile nodes during such emergency situations. The existing methods of the disaster routing protocols do not guarantee reliable delivery of data in a secured manner and it assumes that the nodes are configured with a unique IP address before participating in the communication. This paper presents a novel framework disruption tolerant secure opportunistic routing (DTSOR) method that ensures secure communication between high mobility nodes. Cluster based address auto configuration mechanism and trace analysis are preferred methods used to select the optimal path for forwarding the packets. Selected path further ensures security using puzzle based data anonymization method. Performance analysis and simulation results shows that proposed framework outperforms the state of the art approaches in terms of the packet delivery ratio, network overhead and throughput.

Keywords

Mobile adhoc network Auto address configuration Disruption tolerant network Quality of service 

References

  1. 1.
    Tyagi, A.S.S.: Study of MANET: characteristics, challenges, application and security attacks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 252–257 (2013)Google Scholar
  2. 2.
    Onwuka, E., Folaponmile, A., Ahmed, M.: MANET : a reliable network in disaster areas. JORIND 9(2), 105–113 (2011). ISSN 1596 – 8308Google Scholar
  3. 3.
    Droms, R.: Dynamic host configuration protocol in internet engineering task force (IETF), RFC 2131, March 1997Google Scholar
  4. 4.
    Aboba, B., Cheshire, S., Guttman, E.: Dynamic configuration of ipv4 link-local addresses. In: IETF Internet draft, July 2004, Work in Progress, July 2004. http://files.zeroconf.org/draft-ietf-zeroconfipv4-linklocal.txt
  5. 5.
    Zhou, H., Ni, L.M., Mutka, M.W.: Prophet address allocation for large scale MANETs. Ad Hoc Netw. J. 1(4), 423–434 (2003)CrossRefGoogle Scholar
  6. 6.
    Nesargi, S., Prakash, R.: MANETconf: configuration of hosts in a mobile ad hoc network, In: Proceedings of the 21st Annual Joint Conference of IEEE Computer and Communication Societies (INFOCOM 2002), New York, NY, June 2002Google Scholar
  7. 7.
    Perkins, C., Malinen, J., Wakikawa, R., Belding-Royer, E.M., Sun, Y.: IP address autoconfiguration for ad hoc networks, draft-ietf-manet-autoconf-01.txt, November 2001Google Scholar
  8. 8.
    Cunha, D.O., Duarte, O.C.M.B., Pujolle, G.: A cooperationaware routing scheme for fast varying fading wireless channels. IEEE Commun. Lett. 12(10), 794–796 (2008)CrossRefGoogle Scholar
  9. 9.
    Fernandes, N.C., Moreira, M.D., Duarte, O.C.M.B.: A self-organized mechanism for thwarting malicious access in ad hoc networks, In: Proceedings of the 29th IEEE INFOCOM Miniconf., San Diego, CA, pp. 1–5 April 2010Google Scholar
  10. 10.
    Jiang, J., Han, G., Wang, F., Shu, L., Guizani, M.: An efficient distributed trust model for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(5), 1228–1237 (2015)CrossRefGoogle Scholar
  11. 11.
    Feng, R., Xu, X., Zhou, X., Wan, J.: A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory. Sensors 11, 1345–1360 (2011)CrossRefGoogle Scholar
  12. 12.
    Rivest, R., Shamir, A., Wagner, D.: Time-Lock Puzzles and Timed-Release Crypto, technical report. Massachusetts Institute of Technology (1996)Google Scholar
  13. 13.
    Shaw, R.: Indian Ocean tsunami and aftermath: need for environment-disaster synergy in the reconstruction process. Disaster Prev. Manag. Int. J. 15(1), 5–20 https://doi.org/10.1108/09653560610654202
  14. 14.
    Perkins, C., Royer, E., Elizabeth, M.: Ad hoc on demand distance vector routing protocolGoogle Scholar
  15. 15.
    Johnson, D., Hu, Y., Maltz, D.: The dynamic source routing protocol (DSR) for mobile ad-hoc networks for IPv4. IETF (2007)  https://doi.org/10.17487/RFC4728
  16. 16.
    Park, V., Corson, S.: Temporally-ordered routing algorithm (TORA) functional specification. IETF, (2001)Google Scholar
  17. 17.
    Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR). IETF (2003)Google Scholar
  18. 18.
    Perkins, C.E., Bhagwat, P.: DSDV Routing Over a Multihop Wireless Network of Mobile Computers. Addison-Wesley Longman Publishing Co, Chicago (2001)Google Scholar
  19. 19.
    Boukerche, A., Darehshoorzadeh, A.: Opportunistic routing in wireless networks: models, algorithms, and classifications. ACM Comput. Surv. (CSUR) 47(2), 22 (2014)CrossRefGoogle Scholar
  20. 20.
    Vaidya, N.H.: Weak duplicate address detection in mobile Ad-hoc networks. In: Proceedings of the MOBIHOC’02, Lausanne, Switzerland, pp. 206–216 (2002)Google Scholar
  21. 21.
    Ros, F., Ruiz, P., Perkins, C.E.: Extensible MANET auto-configuration protocol (EMAP), Internet Draft, March 2006. Accessed 25 Nov 2010Google Scholar
  22. 22.
    Yousef, A., Al-Mahdi, H., Kalil, M.A., Mitschele-Thiel, A.: LHA: logical hierarchical addressing protocol for mobile Ad hoc networks. In: Proceedings of the PM2HW2 N ’07, Crete Island, Greece, pp. 96–99 October 2007Google Scholar
  23. 23.
    Weniger, K.: PACMAN: passive auto configuration for mobile Ad hoc networks. IEEE J. Sel. Area Commun. 23(3), 507–519 (2005)CrossRefGoogle Scholar
  24. 24.
    Ghosh, U., Datta, R.: A secure addressing scheme for large scale managed MANETs. IEEE Trans. Netw. Serv. Manag. 12(3), 483–495 (2015)CrossRefGoogle Scholar
  25. 25.
    Rohit, R., Singh, D.: A study of various address allocation schemes for mobile Ad Hoc networks. Int. J. Emerg. Trends Technol. 3(1), 100–115 (2014)Google Scholar
  26. 26.
    Cavalli, A., Orset, J.: Secure hosts auto-configuration in mobile ad hoc networks. Ad Hoc Netw. 3(5), 656–667 (2005)CrossRefGoogle Scholar
  27. 27.
    L’Ecuyer, P.: Tables of linear congruential generators of different sizes and good lattice structure. Math. Comput 68(225), 249–260 (1999).  https://doi.org/10.1090/S0025-5718-99-009965
  28. 28.
    Proaño, A., Lazos, L.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secure Comput. 9(1), 101–114 (2012)CrossRefGoogle Scholar
  29. 29.
    Juels, A., Brainard, J.: Client puzzles: a cryptographic countermeasure against connection depletion attacks. In: Proceedings of the Network and Distributed System Security Symposiyum (NDSS), pp. 151–165 (1999)Google Scholar
  30. 30.
    The Network Simulator ns-2, Information Sciences Institute, USA Viterbi School of Engineering, Sept 2004. Available: http://www.isi.edu/nsnam/ns/
  31. 31.
    Yang, X., Yin, J., Yuan, S.: Location-Aided opportunistic routing for Mobile Adhoc networks. In: Wireless Communications, Networking and Mobile Computing.  https://doi.org/10.1109/WICOM.2009.5301914

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.CSE DepartmentCoimbatore Institute of Engineering and TechnologyCoimbatoreIndia
  2. 2.Tamilnadu College of EngineeringCoimbatoreIndia

Personalised recommendations