Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2015, Article ID 365863, 10 pages
http://dx.doi.org/10.1155/2015/365863
Research Article

A Study on High Secure and Efficient MANET Routing Scheme

1Computer Center, Hsin Sheng Junior College of Medical Care and Management, No. 418, Zhongfeng Road, Sec. Gaoping, Longtan District, Taoyuan City 325, Taiwan
2Department of Information Management, Shih Hsin University, No. 1, Lane 17, Sec. 1, Muja Road, Wenshan Chiu, Taipei 116, Taiwan

Received 29 November 2014; Accepted 15 February 2015

Academic Editor: Young-Sik Jeong

Copyright © 2015 Wei-Chen Wu and Horng-Twu Liaw. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. E. Perkins, “Ad hoc networking: an introduction,” in Ad hoc Networking, pp. 1–28, 2001. View at Google Scholar
  2. Y. Chung, S. Choi, and D. Won, “Lightweight anonymous authentication scheme with unlinkability in global mobility networks,” Journal of Convergence, vol. 4, pp. 23–29, 2013. View at Google Scholar
  3. S.-W. Park and I.-Y. Lee, “Anonymous authentication scheme based on NTRU for the protection of payment information in NFC Mobile environment,” Journal of Information Processing Systems, vol. 9, no. 3, pp. 461–476, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. J.-S. Oh, C.-U. Park, and S.-B. Lee, “NFC-based mobile payment service adoption and diffusion,” Journal of Convergence, vol. 5, pp. 8–14, 2014. View at Google Scholar
  5. A. Sinha and D. K. Lobiyal, “Performance evaluation of data aggregation for cluster-based wireless sensor network,” Human-Centric Computing and Information Sciences, vol. 3, pp. 1–17, 2013. View at Google Scholar
  6. Z. C. Taysi and A. G. Yavuz, “ETSI compliant GeoNetworking protocol layer implementation for IVC simulations,” Human-centric Computing and Information Sciences, vol. 3, pp. 1–12, 2013. View at Publisher · View at Google Scholar
  7. M. Gohar and S.-J. Koh, “A network-based handover scheme in HIP-based mobile networks,” Journal of Information Processing Systems, vol. 9, no. 4, pp. 651–659, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. B. Sharma and A. K. Singh, “A token based protocol for mutual exclusion in mobile ad hoc networks,” Journal of Information Processing Systems, vol. 10, pp. 36–54, 2014. View at Google Scholar
  9. R. Singh, P. Singh, and M. Duhan, “An effective implementation of security based algorithmic approach in mobile adhoc networks,” Human-Centric Computing and Information Sciences, vol. 4, article 7, 2011. View at Publisher · View at Google Scholar
  10. A. Avižienis, J. C. Laprie, B. Randell, and C. Landwehr, “Basic concepts and taxonomy of dependable and secure computing,” IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11–33, 2004. View at Publisher · View at Google Scholar · View at Scopus
  11. M. N. Lima, A. L. D. Santos, and G. Pujolle, “A survey of survivability in mobile Ad hoc Networks,” IEEE Communications Surveys & Tutorials, vol. 11, no. 1, pp. 66–77, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. L. Buttyán and I. Vajda, “Towards provable security for Ad hoc routing protocols,” in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), pp. 94–105, 2004.
  13. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “SA-OLSR: security aware optimized link state routing for mobile ad hoc networks,” in Proceedings of the IEEE International Conference on Communications (ICC '08), pp. 1464–1468, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. J. Kim and G. Tsudik, “SRDP: secure route discovery for dynamic source routing in MANETs,” Ad Hoc Networks, vol. 7, no. 6, pp. 1097–1109, 2009. View at Publisher · View at Google Scholar · View at Scopus
  15. M. Yoon, Y.-K. Kim, and J.-W. Chang, “An energy-efficient routing protocol using message success rate in wireless sensor networks,” Journal of Convergence, vol. 4, pp. 15–22, 2013. View at Google Scholar
  16. M. Burrows, M. Abadi, and R. M. Needham, “A logic of authentication,” Proceedings of the Royal Society of London Series A: Mathematical and Physical Sciences, vol. 426, pp. 233–271, 1989. View at Google Scholar
  17. C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), pp. 90–100, New Orleans, La, USA, Febuary 1999. View at Publisher · View at Google Scholar
  18. D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” in Mobile Computing, vol. 353 of The Kluwer International Series in Engineering and Computer Science, pp. 153–181, Springer, New York, NY, USA, 1996. View at Publisher · View at Google Scholar
  19. F. Adelstein, S. K. S. Gupta, G. Richard, and L. Schwiebert, Fundamentals of Mobile and Pervasive Computing, McGraw-Hill, 2005.
  20. D. Djenouri, L. Khelladi, and N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Communications Surveys and Tutorials, vol. 7, no. 4, pp. 2–28, 2005. View at Publisher · View at Google Scholar · View at Scopus
  21. P. Papadimitratos and Z. Haas, “Handbook of ad hoc wireless networks,” in Securing Mobile Ad Hoc Networks, CRC Press, 2002. View at Google Scholar
  22. M. G. Reed, P. F. Syverson, and D. M. Goldschlag, “Anonymous connections and onion routing,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 482–493, 1998. View at Publisher · View at Google Scholar · View at Scopus
  23. L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, no. 6, pp. 24–30, 1999. View at Publisher · View at Google Scholar · View at Scopus
  24. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” IEEE Wireless Communications, vol. 11, no. 1, pp. 38–47, 2004. View at Publisher · View at Google Scholar · View at Scopus
  25. P. G. Argyroudis and D. O'Mahony, “Secure routing for mobile ad hoc networks,” IEEE Communications Surveys and Tutorials, vol. 7, no. 3, pp. 2–21, 2005. View at Publisher · View at Google Scholar · View at Scopus
  26. R. B. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh, “Bootstrapping security associations for routing in mobile ad-hoc networks,” in Proceedings of the IEEE Global Telecommunications Conference, pp. 1511–1515, December 2003. View at Scopus
  27. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: a secure on-demand routing protocol for ad hoc networks,” Wireless Networks, vol. 11, no. 1-2, pp. 21–38, 2005. View at Publisher · View at Google Scholar · View at Scopus
  28. B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, “ODSBR: an on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks,” ACM Transactions on Information and System Security, vol. 10, no. 4, article 6, 2008. View at Publisher · View at Google Scholar
  29. M. G. Zapata, “Secure ad hoc on-demand distance vector routing,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 3, pp. 106–107, 2002. View at Publisher · View at Google Scholar
  30. A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  31. A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, “An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks,” Computer Communications, vol. 28, no. 10, pp. 1193–1203, 2005. View at Publisher · View at Google Scholar · View at Scopus
  32. X. Wu, J. Liu, X. Hong, and E. Bertino, “Anonymous geo-forwarding in MANETs through location cloaking,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 10, pp. 1297–1309, 2008. View at Publisher · View at Google Scholar · View at Scopus
  33. B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 243–254, ACM, August 2000. View at Scopus