603
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

Energy Aware Secure Routing for Wireless Ad Hoc Networks

, &
 

ABSTRACT

In this paper, we present a clustering-based energy aware secure routing protocol that computes trustworthy and energy efficient secure routes for wireless ad hoc networks (WANETs). Clustering in ad hoc networking paradigm is very useful for achieving scalability and robustness as it helps to save the bandwidth, to take simpler routing decisions, thus results in decreased energy dissipation of the network. WANETs are often deployed in such places where recharge or replace of energy sources is difficult. Further, unpredicted mobility and quasi-static nature of nodes and dynamic network topology yield a serious need for battery awareness during routing. In light of this, we first provide a definition of network lifetime based on application-specific criteria. Also a mathematical model for calculating residual battery power has been framed to propose an energy aware routing protocol. Trust-based scheme is used to assure secure end-to-end delivery of packets in the network. Extensive simulation has been carried out to show the efficacy of the proposed protocol to prolong the network lifetime.

Additional information

Notes on contributors

Waleed S. Alnumay

Waleed S. Alnumay received his bachelor degree in computer science from King Saudi University, Riyadh, Saudi Arabia in the year 1993. He did his master degree in Computer Science from University of Atlanta, Atlanta, Georgia, USA in the year 1996. He completed his PhD in computer science from Oklahoma University, Norman, Oklahoma, US in the year 2004. Dr. Alnumay is currently working as an Assistant Professor of Mobile Networking and vice dean of eLearning deanship in Computer Science Department, King Saud University. He has published research papers in reputed international conferences and journals. His main research interest is Computer Networks and Distributed Computing that includes but not limited to Mobile Ad-hoc and Sensor Networks, Information-Centric Networking and Software-Defined Networking.

E-mail: [email protected]

Pushpita Chatterjee

Pushpita Chatterjee has received her MSc and MTech degrees in computer science and engineering from the University of Calcutta in 2002 and 2004 respectively. She completed her PhD in School of Information Technology from Indian Institute of Technology Kharagpur, India in 2012. Dr. Chatterjee is currently working as a research lead at SRM-RI, Bangalore. She has over 15 publications to her credit in international journals and conferences. Her research interests are mobile computing, distributed and trust computing, wireless ad hoc and sensor networks, information-centric networking and software-defined networking.

E-mail: [email protected]

Uttam Ghosh

Uttam Ghosh received his BTech. in information technology from Govt. College of Engineering and Textile Technology, Serampore, WB, India in 2005. He completed his MS (by Research) and PhD both from the Department of Electronics and Electrical Engineering, Indian Institute of Technology Kharagpur, India in 2009 and 2013 respectively. Dr. Ghosh has a number of publications in International Journals (including Elsevier Ad Hoc Networks, Wiley NEM, IETE Journal of Research, IET Networks) and Conferences (including IEEE N2S, WCNC, IPDPS and ICDCN). His main research interests include Computer Networks, Security and Cryptography, Distributed and Trust Computing, Wireless Networks, Mobile Ad-hoc Networks, Information-Centric Networking and Software-Defined Networking.

E-mail: [email protected]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.