Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 865071, 13 pages
http://dx.doi.org/10.1155/2014/865071
Research Article

A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

1Anna University Regional Centre, Madurai, Tamil Nadu 625007, India
2K.L.N. College of Engineering, Sivagangai, Tamil Nadu 630611, India

Received 10 March 2014; Accepted 21 June 2014; Published 17 July 2014

Academic Editor: Jingjing Zhou

Copyright © 2014 Ramesh Sekaran and Ganesh Kumar Parasuraman. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Ghosh, H. Q. Ngo, and C. Qiao, “Mobility profile based routing within intermittently connected mobile ad hoc networks (ICMAN),” in Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC '06), pp. 551–556, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  2. A. Vahdat and D. Becker, “Epidemic routing for partially connected Ad hoc networks,” Tech. Rep. CS-2000-06, Duke University, Durham, NC, USA, 2000. View at Google Scholar
  3. J. Ghosh, C. Westphal, H. Ngo, and C. Qiao, “Bridging intermittently connected mobile Ad Hoc networks (ICMAN) with sociological orbits”.
  4. S. Bose, S. Bharathimurugan, and A. Kannan, “Multi-layer integrated anomaly intrusion detection system for mobile adhoc networks,” in Proceedings of the International Conference on Signal Processing, Communications and Networking (ICSCN '07), pp. 360–365, February 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. E. Kuiper and S. Nadjm-Tehrani, “Geographical routing with location service in intermittently connected MANETs,” IEEE Transactions on Vehicular Technology, vol. 60, no. 2, pp. 592–604, 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. R. R. Choudhury, “Brownian gossip: exploiting node mobility to diffuse information in ad hoc networks,” in Proceedings of the International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 1–5, December 2005. View at Scopus
  7. M. Musolesi, S. Hailes, and C. Mascolo, “Adaptive routing for intermittently connected mobile ad hoc networks,” in Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM '05), pp. 183–189, 2005. View at Publisher · View at Google Scholar
  8. M. Heissenbüttel, T. Braun, T. Bernoulli, and M. Wälchi, “BLR: Beaconless Routing Algorithm for Mobile Ad Hoc Networks,” Computer Communications, vol. 27, no. 11, pp. 1076–1088, 2004. View at Google Scholar
  9. Z. Zhang, “Routing in intermittently connected mobile Ad Hoc networks and delay tolerant networks: overview and challenges,” IEEE Communications Surveys and Tutorials, vol. 8, no. 4, pp. 24–37, 2006. View at Google Scholar
  10. S. Jain, K. Fall, and R. Patra, “Routing in a delay tolerant network,” in Proceedings of the ACM Conference on Computer Communications (SIGCOMM '04), pp. 145–157, September 2004. View at Publisher · View at Google Scholar · View at Scopus
  11. T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Spray and wait: an efficient routing scheme for intermittently connected mobile networks,” in Proceedings of the ACM SIGCOMM Workshop on Delay-tolerant Networking (WDTN '05), pp. 252–259, August 2005. View at Scopus
  12. K. E. Shi, “Semi-probabilistic routing in intermittently connected mobile ad hoc networks,” Journal of Information Science and Engineering, vol. 26, no. 5, pp. 1677–1693, 2010. View at Google Scholar · View at Scopus
  13. F. Yin, X. Feng, Y. Han, L. He, and H. Wang, “An improved intrusion detection method in mobile AdHoc network,” in Proceedings of the 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC '09), pp. 527–532, Chengdu, China, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. L. P. Rajeswari, R. A. X. Annie, and A. Kannan, “Enhanced intrusion detection techniques for mobile ad hoc networks,” in Proceeding of the IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES '07), pp. 1008–1013, Tamil Nadu, India, December 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. I. Stamouli, P. G. Argyroudis, and H. Tewari, “Real-time intrusion detection for ad hoc networks,” in Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM '05), pp. 374–380, 2005.
  16. K. Samad, E. Ahmed, W. Mahmood, K. Sharif, and A. A. Chaudhry, “Efficient clustering approach for intrusion detection in ad hoc networks,” in Proceedings of the Student Conference on Engineering Sciences and Technology (SCONEST '05), pp. 1–6, Karachi, Pakistan, August 2005. View at Publisher · View at Google Scholar · View at Scopus
  17. A. F. Farhan, D. Zulkhairi, and M. T. Hatim, “Mobile agent intrusion detection system for mobile ad hoc networks: a non-overlapping zone approach,” in Proceedings of the 4th IEEE/IFIP International Conference in Central Asia on Internet (ICI '08), September 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. H. Otrok, M. Debbabi, C. Assi, and P. Bhattacharya, “A cooperative approach for analyzing intrusions in mobile ad hoc networks,” in Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCSW '07), June 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. D. Çokuslu and K. Erciyeş, “A flooding based routing algorithm for mobile ad hoc networks,” in Proceedings of the IEEE 16th Signal Processing, Communication and Applications Conference (SIU '8), pp. 1–5, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. Z. Li and H. Shen, “A direction based geographic routing scheme for intermittently connected mobile networks,” in Proceedings of the 5th International Conference on Embedded and Ubiquitous Computing (EUC '08), pp. 359–365, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  21. T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Efficient routing in intermittently connected mobile networks: the single-copy case,” IEEE/ACM Transactions on Networking, vol. 16, no. 1, pp. 63–76, 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Efficient routing in intermittently connected mobile networks: the multiple-copy case,” IEEE/ACM Transactions on Networking, vol. 16, no. 1, pp. 77–90, 2008. View at Publisher · View at Google Scholar · View at Scopus
  23. E. J. JebaJothi, V. Kavitha, and T. Kavitha, “Contention based routing in mobile ad hoc networks with multiple copies,” International Journal of Engineering and Technology, vol. 2, no. 2, pp. 93–96, 2010. View at Google Scholar · View at Scopus
  24. W. K. Lai, W. K. Chung, J. B. Tsai, and C. S. Shieh, “Spray and hop: efficient utility-mobility routing for intermittently connected mobile networks,” in Proceeding of the 4th International Conference on Communications and Networking in China (CHINACOM '09), pp. 1–5, Xian, China, August 2009. View at Publisher · View at Google Scholar · View at Scopus
  25. L.-P. Wong, M. Y. H. Low, and C. S. Chong, “Bee colony optimization with local search for traveling salesman problem,” in 6th IEEE International Conference on Industrial Informatics (INDIN '08), pp. 1019–1025, Daejeon, Republic of korea, July 2008. View at Publisher · View at Google Scholar · View at Scopus
  26. L. P. Wong, M. Y. Hean Low, and C. S. Chong, “An efficient bee colony optimization algorithm for traveling salesman problem using frequency-based pruning,” in Proceedings of the 7th IEEE International Conference on Industrial Informatics (INDIN '09), pp. 775–782, IEEE, Wales, UK, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  27. M. H. Saffari and M. J. Mahjoob, “Bee colony algorithm for real-time optimal path planning of mobile robots,” in Proceedings of the 5th International Conference on Soft Computing, Computing with Words and Perceptions in System Analysis, Decision and Control (ICSCCW '09), pp. 1–4, IEEE, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  28. L. Wong, M. Y. H. Low, and C. S. Chong, “A bee colony optimization algorithm for traveling salesman problem,” in Proceedings of the 2nd Asia International Conference on Modelling and Simulation (AMS '08), pp. 818–823, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  29. I. Stamouli, Real-time intrusion detection for ad-hoc networks [M.S. dissertation], University of Dublin, 2003.
  30. I. M. Hegazy, T. Al-Arif, Z. T. Fayed, and H. M. Faheem, “A multi-agent based system for intrusion detection,” IEEE Potentials, vol. 22, no. 4, pp. 28–31, 2003. View at Publisher · View at Google Scholar · View at Scopus
  31. K. Ioannis, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proceedings of the 13th European Wireless Conference, Paris, France, April 1997.
  32. O. Kachirski, R. Guba, D. Schwartz, S. Stoecklin, and E. Yilmaz, “Casebased agents for packet-level intrusion detection in Ad-hoc networks,” in Proceedings of the 17th International Symposium on Computer and Information Sciences, pp. 315–320, CRC Press, October 2002.
  33. S. Ramesh, R. Indira, R. Praveen, and P. Ganesh Kumar, “Agent technology for secure routing in intermittently connected MANETs,” in Proceedings of the National Conference on Recent Advances in Computer Vision and Information Technology (NCVIT '13), 2013.
  34. L. Besson and P. Leleu, “A distributed intrusion detection system for ad-hoc wireless sensor networks: the AWISSENET distributed intrusion detection system,” in Proceedings of the 16th International Conference on Systems, Signals and Image Processing (IWSSIP '09), IEEE, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  35. W. Stallings, Cryptography and Network Security, Principles and Practices, Pearson Education, Upper Saddle River, NJ, USA, 4th edition, 2005.
  36. A. Keranen, J. Ott, and T. Karkkainen, “The one simulator for DTN protocol evaluation,” in Proceedings of the 2nd International Conference on Simulation Tools and Techniques (ICST '10), ACM, May 2010.
  37. A. Keranen, T. Karkkainen, and J. Ott, “Simulating mobility and DTNs with the ONE,” Journal of Communication, vol. 5, no. 2, pp. 92–105, 2010. View at Publisher · View at Google Scholar
  38. A. Keranen, “Opportunistic network environment simulator,” Special Assignment Report, Department of Communications and Networking, Helsinki University of Technology, 2008. View at Google Scholar
  39. TKK/COMNET, “Project page of the ONE simulator,” 2009, http://www.netlab.tkk.fi/tutkimus/dtn/theone/.