International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

RMBSRA: Routing Manager Based Secure Route Analysis Mechanism for Achieving Secure Routing Protocol in IOT MANET

Author NameAuthor Details

P.T. Kasthuri Bai

P.T. Kasthuri Bai[1]

[1]Department of Computer Science, Thiruthangal Nadar college, Chennai, Tamil Nadu, India

Abstract

In recent years, the Internet of Things (IoT) has become the most innovative and efficient technology globally. IoT uses physical devices for establishing a real-time interconnection between heterogeneous networks. MANET plays an essential role in IoT-based systems for multi-hop data transmission, rapid setup, dynamic topology, etc. Generally, MANET is structureless and does not require any base station to achieve data transmission. In MANET, routing plays an important role, and modern IoT devices' evolution supports routing efficiency. MANET with IoT is applicable for various applications like emergency operations, disaster management, and environmental monitoring. Several mechanisms evolved to achieve secure routing on MANET with IoT. But still, achieving enhanced MANET performance with satisfying all QoS parameters is a challenge. Most of the existing systems lack a secured routing system, and there is no proper predefined mechanism for handling the packet losses. However, few approaches support multipath routing but fail to obtain the optimal power consumption. We use the routing manager-based secure rate analysis (RMBSRA) mechanism to address these issues. The proposed system is a centralized mechanism built with three major components: routing manager, neighboring table, and routing table. These components are responsible for effective packet transmission in the shortest path without data losses. The proposed system improves the multicast routing system by balancing the bandwidth allocation and eventually traffic on the network. The proposed RMBSRA performance is evaluated in the simulation environment NS-2. The observation obtained from RMBSRA is compared with the existing Trust-Based Secure Multipath Routing Protocol (TBSMR) and real-time secure route analysis (RSRA). The proposed RMBSRA achieves enhanced routing performance compared to the existing mechanisms.

Index Terms

IoT

MANET

Routing Protocol

Security

Load Balancing

Traffic

Multipath Routing

Reference

  1. 1.
    B. Salah Eddine, S. Omar, B. Meftah, M. Rabbah, and B. Cousin, "An efficient energy-aware link stable multipath routing protocol for mobile ad hoc networks in urban areas," Telford Journal, vol. 12, pp. 2–7, 01 2020.
  2. 2.
    S. K. Singh and J. Prakash, “Energy efficiency and load balancing in manet: A survey,” in 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), 2020, pp. 832–837.
  3. 3.
    A. Parveen and Y. V. S. Sai Pragathi, “A study of routing protocols for energy conservation in manets,” in Advances in Decision sciences, Image Processing, Security and Computer Vision, S. C. Satapathy, K. S. Raju, K. Shyamala, D. R. Krishna, and M. N. Favorskaya, Eds. Cham: Springer International Publishing, 2020, pp. 641–647.
  4. 4.
    Z. Chen, W. Zhou, S. Wu, and L. Cheng, “An adaptive on-demand multipath routing protocol with QoS support for high-speed manet," IEEE Access, vol. 8, pp. 44 760–44 773, 2020.
  5. 5.
    M. Anand and T. Sasikala, “Efficient energy optimization in mobile ad hoc network (manet) using better-quality aodv protocol,” Cluster Computing, vol. 22, 09 2019.
  6. 6.
    L. Atzori, A. Iera, and G. Morabito, ?The internet of things: A survey,? Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010.
  7. 7.
    P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, ?Convergence of MANET and WSN in IoT urban scenarios,? IEEE Sens. J., vol. 13, no. 10,pp. 3558–3567, Oct. 2013.
  8. 8.
    Mohit K. and Rashmi Mishra. An Overview of MANET: History, Challenges and Applications. International Journal of Engineering Research and Technology. (2012). vol. 3, no.1.
  9. 9.
    Pravin Ghosekar. 2010. Mobile Ad Hoc Networking: Imperatives and Challenges. In proceedings of IJCA, Special issues on “Mobile Ad-hoc Networks” (MANET).
  10. 10.
    N. Sah, N. R. Prakash, and D. Bagai “QoS Analysis in Mobile AdHoc Networks Using Bandwidth Utilization Technique”, Dec 2014.
  11. 11.
    Karlsson, Jonny, Laurence S. Dooley, and Goran P. Pulkkis. "Secure Routing for MANET Connected Internet of Things Systems." (2018).
  12. 12.
    Alameri, I. A. "MANETS and internet of things: the development of a data routing algorithm." Engineering, Technology & Applied Science Research 8, no. 1 (2018): 2604-2608.
  13. 13.
    Mohammed Shabaz Hussain and Khaleel Ur Rahman Khan, "Network-based Anomaly Intrusion Detection System in MANETS," Proceedings of the Fourth International Conference on Inventive Systems and Control (ICISC 2020, IEEE Xplore Part Number: CFP20J06-ART; ISBN: 978-1-7281-2813-9
  14. 14.
    Hui Lin, Jia Hu, Xiaoding Wang, Mohammed F. Alhamid and Md. Jalil Piran "Towards Secure Data Fusion in Industrial IoT using Transfer Learning", IEEE Transactions on Industrial Informatics 2020, DOI 10.1109/TII.2020.3038780, IEEE
  15. 15.
    SIVASHANKARI RAJADURAI, MAMOUN ALAZAB, NEERAJ KUMAR AND THIPPA REDDY GADEKALLU, "Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata", IEEE Acess July 2020, Digital Object Identifier 10.1109/ACCESS.2020.3013013
  16. 16.
    Mohammad Sirajuddin, Ch. Rupa , Celestine Iwendi and Cresantus Bamba, "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network",Hindawi Security and Communication Networks Volume 2021, Article ID 5521713, 9 pages https://doi.org/10.1155/2021/5521713
  17. 17.
    P. Sathyaraj and D. Rukmani Devi, "Designing the routing protocol with secured IoT devices and QoS over Manet using trust?based performance evaluation method", Springer-Verlag GmbH Germany, part of Springer Nature 2020, Journal of Ambient Intelligence and Humanized Computing https://doi.org/10.1007/s12652-020-02358-4
  18. 18.
    Swetha MS (2019) A novel approach to secure mysterious location based routing for Manet. IJITEE 8(7):2587–2591
  19. 19.
    Belgaum MM (2019) Secured approach towards reactive routing protocols using triple factor in mobile ad hoc networks. AETiC 3(2):32–40
  20. 20.
    Guaya-Delgado L (2019) A novel dynamic reputation-based source routing protocol for mobile ad hoc networks, vol 77. Springer, New York
  21. 21.
    Mukhedkar MM (2019) Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. Comput J 62(10):1528–1545
  22. 22.
    Veeraiah N, Krishna BT (2020) An approach for optimal-secure multipath routing and intrusion detection in MANET. Evolutionary intelligence. Springer, New York
  23. 23.
    Singh, K., & Gupta, R. (2021). SO-AODV: A Secure and Optimized Ad-Hoc On-Demand Distance Vector Routing Protocol Over AODV With Quality Assurance Metrics for Disaster Response Applications. Journal of Information Technology Research (JITR), 14(3), 87-103. http://doi.org/10.4018/JITR.202107010
  24. 24.
    H. Kathiriya, A. Pandya, V. Dubay, and A. Bavaria, "State of art: energy-efficient protocols for self-powered wireless sensor network in IIoT to support industry 4.0,” in Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 1311–1314, Noida, India, June 2020.
  25. 25.
    V. V. Sarbhukan and L. Ragha, “establishing secure routing path using trust to enhance security in MANET,” Wireless Personal Communications, vol. 110, no. 1, pp. 245–255, 2020
  26. 26.
    M. S. Hussain and K. U. R. Khan, “Network-based anomaly intrusion detection system in MANETS,” in Proceedings of the ICISC, pp. 881–886, Coimbatore, India, December 2020.
  27. 27.
    H. Lin, J. Hu, W. Xiaoding, M. F. Alhamid, and M. J. Piran, “Towards secure data fusion in industrial IoT using transfer learning,” Institute of Electrical and Electronics Engineers Transactions on Industrial Informatics, vol. 20201 page, 2020.
  28. 28.
    H. Lin, J. Hu, W. Xiaoding, M. F. Alhamid, and M. J. Piran, “Towards secure data fusion in industrial IoT using transfer learning,” Institute of Electrical and Electronics Engineers Transactions on Industrial Informatics, vol. 20201 page, 2020.
  29. 29.
    D. Vasan, M. Alazab, S. Wassan, H. Naeem, B. Safaei, and Q. Zheng, “IMCFN: image-based malware classification using fine-tuned convolutional neural network architecture,” Computer Networks, vol. 171, Article ID 107138, 2020.
  30. 30.
    S. Rajadurai, M. Alazab, N. Kumar, and T. R. Gadekallu, “Latency evaluation of SDFGs on heterogeneous processors using timed automata,” Institute of Electrical and Electronics Engineers Access, vol. 8, pp. 140171–140180, 2020.
  31. 31.
    C. Iwendi, S. Khan, J. H. Anajemba, M. Mittal, M. Alenezi, and M. Alazab, “)e use of ensemble models for multiple class and binary class classification for improving intrusion detection systems,” Sensors, vol. 20, no. 9, Article ID 2559, 2020
  32. 32.
    M. Mittal, C. Iwendi, S. Khan, and J. A. Rehman, “Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system,” Transactions on Emerging Telecommunications Technologies, 32.6, e3997, 2021.
SCOPUS
SCImago Journal & Country Rank