Energy Sensitive Cluster Level Security Selection Scheme for MANET

  • R. Mohandas
  • K. Krishnamoorthi
  • V. SudhaEmail author


Most of the current Mobile Ad hoc Network (MANET) nodes are battery powered devices with different processing and data handling capacities. The ratio of sensitive data is increasing rapidly day-by-day. Providing Security with moderate power utilization is one of the vital tasks in MANET architecture. In this paper an energy sensitive security selection schema that operates in the cluster level is introduced. A new clustering procedure that classifies MANET nodes into several virtual-energy-clusters and they bonded with the conventional routing clusters. Several multi-security and multi-weight cryptography procedures are integrated in the virtual-energy-clusters. Routing Cluster Table takes care of the fundamental communication where as the additional Virtual-energy-cluster table constantly monitoring nodes’ energy levels to maintain the mobility and life time of the entire network. For stable network communication, a correlation between Routing Clusters and Virtual-energy-clusters is maintained in this proposed method. By selecting correlated cryptography procedure in swift and dynamic mode, this dual cluster based network model takes care of providing higher security communication with moderate power consumption.


Network security Energy aware network Network clustering Dual clustering Virtual clustering Multi-weight cryptography 



  1. 1.
    Qiu, T., Chen, N., Li, K., Qiao, D., & Fu, Z. (2016). Heterogeneous ad hoc networks: Architectures, advances and challenge. Ad Hoc Networks, 55, 143–152.CrossRefGoogle Scholar
  2. 2.
    Biswas, S., Nag, T., & Neogy, S. (2014). Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In Applications and innovations in mobile computing (AIMoC). IEEE.Google Scholar
  3. 3.
    Nieto, A., & Lopez, J. (2013). Analysis and taxonomy of security/QoStradeoff solutions for the future internet. Security and Communication Networks, 7, 2778–2803.CrossRefGoogle Scholar
  4. 4.
    Khudayer, B. H., & Kadhum, M. M. (2014). Reliability of dynamic source routing in heterogeneous scalable mobile ad hoc networks. In IEEE international conference on communication, networks and satellite (COMNETSAT). IEEE.Google Scholar
  5. 5.
    Ranjan, R., Singh, N. K., & Singh, A. (2015). Security issues of black hole attacks in MANET. In: International conference on computing, communication & automation (ICCCA). IEEE.Google Scholar
  6. 6.
    Noureldien, N. A. (2015). A novel taxonomy of MANET attacks. In International conference on electrical and information technologies (ICEIT). IEEE Publisher, ISBN: 978-1-4799-7480-1.Google Scholar
  7. 7.
    Pathan, A.-S. K. (2011). Security of self-organizing networks MANET, WSN, WMN, VANET. Auerbach Publications (AP). ISBN: 978-1-4398-1920-3.Google Scholar
  8. 8.
    Halder, T. K., Chowdhury, C., & Neogy, S. (2014). Power aware AODV routing protocol for MANET. In Advances in computing and communications (ICACC). IEEE Publisher. ISBN: 978-1-4799-4362-3.Google Scholar
  9. 9.
    Kim, J.-M., & Jang, J.-W. (2005). A performance evaluate of improved AODV-based power-aware routing protocol in MANET. In Enterprise networking and computing in healthcare industry. IEEE Publisher. ISBN: 0-7803-8940-9.Google Scholar
  10. 10.
    Stojmenovic, I., & Lin, X. Power-aware localized routing in wireless networks. Computer Science (CS). SITE, University of Ottawa, Ottawa, Ontario K1 N 6N5, Canada.Google Scholar
  11. 11.
    Goyal, D., & Tripathy, M. R. (2012). Routing protocols in wireless sensor networks: A survey. In Advanced computing & communication technologies (ACCT), 2012. IEEE Publisher. ISBN: 978-1-4673-0471-9.Google Scholar
  12. 12.
    Marquardt, R. R., Paczkowski, L. W., & Rajagopal, A. (2016). Border gateway protocol (BGP) communications over trusted network function virtualization (NFV) hardware. Google Publisher—Google Patents: US20160301668 A1.Google Scholar
  13. 13.
    Varga, A., & Hornig, R. (2008). An overview of the OMNeT++ simulation environment. Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST), Brussels, Belgium. ISBN: 978-963-9799-20-2.Google Scholar
  14. 14.
    Weingartner, E., vom Lehn, H., & Wehrle, K. A performance comparison of recent network simulators. In IEEE international conference (ICC). IEEE Publisher. ISBN: 978-1-4244-3435-0.Google Scholar
  15. 15.
    C and C++ with Visual Studio,
  16. 16.
    Hasson, S. T. (2013). Designing a new MANET’s environment using computer simulation. International Journal of Computer Science and Electronics Engineering (IJCSEE) 1(3). ISSN 2320-401X; EISSN 2320-4028.Google Scholar
  17. 17.
    Talib, M. S., & Talib, Z. S. Simulate and model MANETs environment with AOMDV routing protocol. Oriental Journal of Computer Science and Technology (OJCST). ISSN: 0974-6471.Google Scholar
  18. 18.
    de Oliveira, H. A. B. F., Nakamura, E. F., Loureiro, A. A. F., & Boukerche, A. (2007). Localization in time and space for sensor networks. In Advanced information networking and applications (AINA). IEEE Publishers. ISBN: 0-7695-2846-5.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Anna UniversityChennaiIndia
  2. 2.Department of Electrical EngineeringSona College of TechnologySalemIndia
  3. 3.Department of Electronics and Communication EngineeringNational Institute of TechnologyTiruchirappalliIndia

Personalised recommendations