Title | Design of Data Confidential and Reliable Bee Clustering Routing Protocol in MANET |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Sajyth, RB, Sujatha, G |
Conference Name | 2018 International Conference on Computer Communication and Informatics (ICCCI) |
Keywords | Bee Ad Hoc Clustering, bee clustering approach, Bee-Ad Hoc-C, Black hole attack, clustered based approach, compositionality, data confidential, data privacy, data reliability, ECC, Elliptic curve cryptography, Elliptical Curve Cryptography, Energy efficiency, ensures data confidentiality, forwarded packets, IndexTerms-Mobile Ad Hoc Networks, legion intelligence, MANET, manet privacy, Metrics, mobile ad hoc network, mobile ad hoc networks, multihop routing, overhearing, packet forwarding ratio, packet forwarding statistics, pattern clustering, pubcrawl, public key cryptography, received packets, reliable Bee clustering routing protocol, reliable data transmission, resilience, Resiliency, Routing, Routing protocols, secure data delivery system, Sensors, telecommunication security, Wireless sensor networks |
Abstract | Mobile ad hoc network (MANET) requires extraneous energy effectualness and legion intelligence for which a best clustered based approach is pertained called the "Bee-Ad Hoc-C". In MANET the mechanism of multi-hop routing is imperative but may leads to a challenging issue like lack of data privacy during communication. ECC (Elliptical Curve Cryptography) is integrated with the Bee clustering approach to provide an energy efficient and secure data delivery system. Even though it ensures data confidentiality, data reliability is still disputable such as data dropping attack, Black hole attack (Attacker router drops the data without forwarding to destination). In such cases the technique of overhearing is utilized by the neighbor routers and the packet forwarding statistics are measured based on the ratio between the received and forwarded packets. The presence of attack is detected if the packet forwarding ratio is poor in the network which paves a way to the alternate path identification for a reliable data transmission. The proposed work is an integration of SC-AODV along with ECC in Bee clustering approach with an extra added overhearing technique which n on the whole ensures data confidentiality, data reliability and energy efficiency. |
DOI | 10.1109/ICCCI.2018.8441217 |
Citation Key | sajyth_design_2018 |