Advertisement

Secure Congestion Adaptive Routing Using Group Signature Scheme

  • Laxmi Shrivastava
  • Sarita S. Bhadauraia
  • Geetam Singh Tomar
  • Brijesh Kumar Chaurasia
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7420)

Abstract

In this paper security concerns in load balanced congestion adaptive routing (LBCAR) algorithm in mobile ad hoc network has been taken care of by using new concept of group signature for secure communication in the network. The performance of network using secure packets in the network has not degraded and has provided security. The proposed algorithm determines congestion status and weakest node of the route with low traffic load density and maximum life time is selected for packet transmission. The results show that it is promising to apply group formation strategy in MANET. The performance of LBCAR algorithm has been analyzed and compared with AODV and DSR and has resulted in reduced packet loss with increased throughput and packet delivery ratio.

Keywords

MANET LBCAR Group formation load balancing congestion adaptive 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gao, Z., Wang, L., Yang, M., Yang, X.: CNPGSDP: An efficient group-based service discovery protocol for MANETs. Computer Networks by Elsevier 50, 3165–3182 (2006)zbMATHCrossRefGoogle Scholar
  2. 2.
    Basile, C., Killijian, M.O., Powell, D.:: A survey of dependability issues in mobile wireless networks, Technical report, LAAS CNRS, France (2003)Google Scholar
  3. 3.
    Chaurasia, B.-K., Verma, S., Bhasker, S.-M.: Message broadcast in VANETs using Group Signature. In: Fourth International Conference on Wireless Communication and Sensor Networks, India, pp. 131–136 (2008)Google Scholar
  4. 4.
    Powell, D.: Group communication. In: CACM, vol. 39(4), pp. 84–87 (1996)Google Scholar
  5. 5.
    Chockler, G., Keidar, I., Vitenberg, R.: Group communication specifications: A comprehensive study. ACM Computing Surveys 33(4), 1–43 (2001)CrossRefGoogle Scholar
  6. 6.
    Bin, Z., Xian-Sheng, X., Qian, C., Geng, W.: A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks. Journal of Convergence Information Technology 5(5), 81–85 (2010)CrossRefGoogle Scholar
  7. 7.
    Korshunov, P., Liming, L., James, N.H.: Conserving Power in Mobile Ad Hoc Networks, http://www.projapps.com/CS5229.doc (access at 2010)
  8. 8.
    Chatterjee, M., Das, D., Turgut, S.K.: WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing 5(2), 193–204 (2002)CrossRefGoogle Scholar
  9. 9.
    Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)Google Scholar
  10. 10.
    Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)Google Scholar
  11. 11.
  12. 12.
    Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications. IEEE Transactions on Vehicular Technology 56(6), 3442–3456 (2007)CrossRefGoogle Scholar
  13. 13.
    Shrivastava, L., Tomar, G.S., Bhadauria, S.S.: Performance Evaluation of Reactive Routing in Mobile Grid Environment. IJGHPC 3(3), 45–53 (2011)Google Scholar
  14. 14.
    Chaurasia, B.K., Verma, S.: Conditional Privacy through Ring Signature in Vehicular Ad-hoc Networks. In: Gavrilova, M.L., Tan, C.J.K. (eds.) Transactions on Computational Science XIII. LNCS, vol. 6750, pp. 147–156. Springer, Heidelberg (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Laxmi Shrivastava
    • 1
  • Sarita S. Bhadauraia
    • 1
  • Geetam Singh Tomar
    • 3
  • Brijesh Kumar Chaurasia
    • 2
  1. 1.Madhav Institute of Technology & ScienceGwaliorIndia
  2. 2.ITM UniversityGwaliorIndia
  3. 3.MIR LabsGwaliorIndia

Personalised recommendations