Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2017, Article ID 4657831, 10 pages
https://doi.org/10.1155/2017/4657831
Research Article

Energy Efficient Partial Permutation Encryption on Network Coded MANETs

1School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China
2Department of Computer Science, National University of Modern Languages, Islamabad, Pakistan

Correspondence should be addressed to Qifu Tyler Sun; nc.ude.btsu@nusfq

Received 15 January 2017; Accepted 20 March 2017; Published 6 April 2017

Academic Editor: Xiong Li

Copyright © 2017 Ali Khan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Gruenwald, M. Javed, and M. Gu, “Energy—efficient data broadcasting in mobile ad hoc networks,” in Proceedings of the International Database Engineering and Applications Symposium (IDEAS '02), July 2002.
  2. L. Junhai, X. Liu, and Y. Danxia, “Research on multicast routing protocols for mobile ad-hoc networks,” Computer Networks, vol. 52, no. 5, pp. 988–997, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  3. S. Giordano and W. W. Lu, “Challenges in mobile ad hoc networking,” IEEE Communications Magazine, vol. 39, no. 6, p. 129, 2001. View at Publisher · View at Google Scholar · View at Scopus
  4. I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Loo, J. Lloret, and J. H. Ortiz, “Mobile Ad Hoc Networks: Current Status and Future Trends,” 2011.
  6. R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204–1216, 2000. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. S. R. Li, R. W. Yeung, and N. Cai, “Linear network coding,” IEEE Transactions on Information Theory, vol. 49, no. 2, pp. 371–381, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. R. Koetter and F. R. Kschischang, “Coding for errors and erasures in random network coding,” IEEE Transactions on Information Theory, vol. 54, no. 8, pp. 3579–3591, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. L. Chen, T. Ho, M. Chiang, S. H. Low, and J. C. Doyle, “Congestion control for multicast flows with network coding,” IEEE Transactions on Information Theory, vol. 58, no. 9, pp. 5908–5921, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. D. Annapurna, N. Tejas, K. B. Raja, K. R. Venugopal, and L. M. Patnaik, “An energy efficient multicast algorithm for an Adhoc network using network coding and MAC scheduling,” in Proceedings of the International Conference on Signal Processing and Communication (ICSC '13), pp. 62–67, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. E. Altman, L. Sassatelli, and F. De Pellegrini, “Dynamic control of coding for progressive packet arrivals in DTNs,” IEEE Transactions on Wireless Communications, vol. 12, no. 2, pp. 725–735, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. A. M. Sheikh, A. Fiandrotti, and E. Magli, “Distributed scheduling for scalable P2P video streaming with network coding,” in Proceedings of the 32nd IEEE Conference on Computer Communications (IEEE INFOCOM '13), pp. 11–12, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. R. R. Rout and S. K. Ghosh, “Enhancement of lifetime using duty cycle and network coding in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 2, pp. 656–667, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. Q. Yan, M. Li, Z. Yang, W. Lou, and H. Zhai, “Throughput analysis of cooperative mobile content distribution in vehicular network using symbol level network coding,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 484–492, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. P. Zhang, C. Lin, Y. Jiang, Y. Fan, and X. Shen, “A lightweight encryption scheme for network-coded mobile Ad Hoc networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 9, pp. 2211–2221, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Wu, P. A. Chou, and S.-Y. Kung, “Minimum-energy multicast in mobile ad hoc networks using network coding,” IEEE Transactions on Communications, vol. 53, no. 11, pp. 1906–1918, 2005. View at Publisher · View at Google Scholar · View at Scopus
  17. M. Čagalj, J.-P. Hubaux, and C. Enz, “Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues,” in Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 172–182, September 2002. View at Scopus
  18. C. Fragouli, J. Widmer, and J.-Y. Le Boudec, “A network coding approach to energy efficient broadcasting: from theory to practice,” in Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), pp. 1–11, April 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. L. Li, R. Ramjee, M. Buddhikot, and S. Miller, “Network coding-based broadcast in mobile ad hoc networks,” in Proceedings of the 26th IEEE International Conference on Computer Communications (IEEE INFOCOM '07), pp. 1739–1747, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  20. K. Bhattad and K. R. Narayanan, “Weakly secure network coding,” in Proceedings of the Workshop on Network Coding, Theory, and Applications (NetCod '05), Riva del Garda, Italy, 2005.
  21. L. Lima, M. Medard, and J. Barros, “Random linear network coding: a free cipher?” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), pp. 546–550, Nice, France, June 2007. View at Publisher · View at Google Scholar
  22. J. Wang, J. Wang, K. Lu, B. Xiao, and N. Gu, “Optimal linear network coding design for secure unicast with multiple streams,” in Proceedings of the IEEE INFOCOM, pp. 1–9, IEEE, San Diego, Calif, USA, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, “An efficient signature-based scheme for securing network coding against pollution attacks,” in Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08), pp. 2083–2091, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  24. J. P. Vilela, L. Lima, and J. Barros, “Lightweight security for network coding,” in Proceedings of the IEEE International Conference on Communications (ICC '08), pp. 1750–1754, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. Y. Fan, Y. Jiang, H. Zhu, and X. Shen, “An efficient privacy-preserving scheme against traffic analysis attacks in network coding,” in Proceedings of the 28th Conference on Computer Communications (IEEE INFOCOM '09), pp. 2213–2221, Rio de Janeiro, Brazil, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Benaloh, “Dense probabilistic encryption,” in Proceedings of the Workshop on Selected Areas in Cryptography, pp. 120–128, August 1994.
  27. Y. Wei, Z. Yu, and Y. Guan, “Efficient weakly-secure network coding schemes against wiretapping attacks,” in Proceedings of the IEEE International Symposium on Network Coding (NetCod '10), pp. 1–6, IEEE, Ontario, Canada, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  28. P. Dutta and D. Culler, “Practical asynchronous neighbor discovery and rendezvous for mobile sensing applications,” in Proceedings of the 6th ACM Conference on Embedded Networked Sensor Systems (SenSys '08), pp. 71–83, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  29. S. Tan, X. Li, and Q. Dong, “Trust based routing mechanism for securing OSLR-based MANET,” Ad Hoc Networks, vol. 30, pp. 84–98, 2015. View at Publisher · View at Google Scholar · View at Scopus
  30. U. Venkanna, J. K. Agarwal, and R. L. Velusamy, “A cooperative routing for MANET based on distributed trust and energy management,” Wireless Personal Communications, vol. 81, no. 3, pp. 961–979, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. M. Takeuchi, E. Kohno, T. Ohta, and Y. Kakuda, “Improving assurance of a sustainable route-split MANET routing by adapting node battery exhaustion,” Telecommunication Systems, vol. 54, no. 1, pp. 35–45, 2013. View at Publisher · View at Google Scholar · View at Scopus
  32. G. De Meulenaer, F. Gosset, F.-X. Standaert, and O. Pereira, “On the energy cost of communication and cryptography in wireless sensor networks,” in Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communication (WiMob '08), pp. 580–585, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  33. D. S. Abdul Elminaam, H. M. Abdul Kader, and M. M. Hadhoud, “Performance evaluation of symmetric encryption algorithms,” Communications of the IBIMA, vol. 8, pp. 54–64, 2009. View at Google Scholar