International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249 – 8958, Volume-8, Issue-2S2, January 2019
43
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number: B10100182S219/19©BEIESP
Abstract - (MANETs) are being very trendy these days and used
in a number of applications where security is challange like
military operations or other sensitive projects, whereby if the
network is compromised then the outcomes can be terrible. It
would not be easy task to apply energy efficient and reliable
routing in MANETs, because it will not be possible to recharge /
replace a battery of mobile node. To take full benefit of the lifetime
of nodes, traffic should be routed in a way that energy usage also
should be minimized. A lot of security proposal have came which
address different protocol stack but no scheme is fully integrated
with respect of energy and security. The proposed integrated
approach based on Identity cryptography which belongs to the
class of pair wise cryptography, addresses all the concerns like
secure routing and key management as well as energy.It is a
general method for providing routing security and can be applied
to any routing protocols.
Keywords: Cryptography, MANET, communication, routing
1. INTRODUCTION
Security during routing becomes very important in
sensitive application .Designing of a routing protocol that can
ensure the security and efficient quality of service in general
is a great challenge .Various proposals for securing the
process of routing in MANETs came into account but none of
them includes the dependency cycle. Although cryptographic
techniques have been widely used in routing to shield routing
information from adversary, such an approach may not be
practical for real MANETs due to deep computational
overhead and lack of capability of spotting attacking nodes
given the high mobility of MANETs where nodes can join or
leave the networks [1].Energy management is a genuine issue
at communication time and idle time in most of the
applications of MANETs such as WSN,UAANETand IoT
etc.In the proposed ID based scheme the sender can use the
receiver’s identity of public key to encrypt message, and the
receiver can decrypt the cipher text by his own private key
obtained from the public key generation according to his
identity.The paper also consider the energy efficiency factor
by reducing the power consumed in communication as well
as in computation.
The whole paper is arranged as: Section 2 presents related
work in key management for secure routing in
MANETs.Section 3 explains the motivation behind the
work,Section 4 describes the proposed identity based security
Revised Manuscript Received on December 22, 2018.
Renu, Rajiv Gandhi Technological University, Bhopal, India
(e-mail: renutrivedi@rediffmail.com)
Sanjeev Sharma, Rajiv Gandhi Technological University, Bhopal,
India
method including various phases and Section 5 is kept for
Performance evaluation with basic security services.Last
section concludes the work with future aspects in this area.
2. LITERATURE SURVEY
various mechanisms and protocols have been proposed for
preserving energy and securing MANETs, but no solutions
can directly be applied for this environment. In general, a
routing protocol which does not require large tables to be
downloaded or greater number of calculations is preferable,
the amount of data compression before transmission
decreases the power consumed for communication although
the number of computation tasks increases.Power-aware
Multiple Access Protocol PAMAS [4] uses model to make
the use of nodes running low on battery power by making the
nodes off when they are not in use. Other power-aware
routing protocol [5] Online Max-Min (OMM) by Li et al
given by maximizing the minimal residual power, to reduce
the rate of overloaded nodes. . Basic cryptographyworks
with Public Key Infrastructure (PKI)and suffers with the
security of a central control Authority (CA) for issuing
digital certificates .PKI also have overhead storage of public
key certificates. In 1984, Shamir [9] suggested the solution as
identity-based cryptography to avoid these situation .Boneh
etc proposed the first model of ID based security scheme
based on bilinear maps on an elliptic curve.Previous
proposed methods are not suitable for mobile networks
lacking with centralized key management agent because they
assumed that all nodes in the network are helpful and truthful
during the routing process. Constrained devices with battery
power, storage capacity and processing capacity are not
compatible withtraditional cryptographic algorithms those
are executed with high processing, storage and power
consumption.
3. MOTIVATION
As we found from previous papers,all routing messages
have two type of fields one is static and can not be changed
,another is modifiable by intermediate nodes. No one has
differentiate these static fields and changeable fields . The
receiver not be able to detect misbehavior because no history
is available . Digital signature can work as authentication
mechanism to ensure that the changeable fields are not
illegally modified. Digital signatures from all to the
intermediate node are appended and verified by the next hope
Renu, Sanjeev Sharma
An Energy Efficient Integrated Framework For
Secure Routing And Key Management In Mobile
Ad-Hoc Networks