An Improved Zone Routing Protocol For Secure And Efficient Energy Management

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2021 by IJETT Journal
Volume-69 Issue-1
Year of Publication : 2021
Authors : Kollu Spurthi, T.N.Shankar
DOI :  10.14445/22315381/IJETT-V69I1P205

Citation 

MLA Style: Kollu Spurthi, T.N.Shankar  "An Improved Zone Routing Protocol For Secure And Efficient Energy Management" International Journal of Engineering Trends and Technology 69.1(2021):29-34. 

APA Style:Kollu Spurthi, T.N.Shankar. An Improved Zone Routing Protocol For Secure And Efficient Energy Management  International Journal of Engineering Trends and Technology, 69(1), 29-34.

Abstract
Many researchers, despite their contribution towards technology reflecting ad hoc networks like MANETS, left a few stones unturned, thereby giving scope for enhancement and research in this area. MANET is dynamic without the aid of wired infrastructure, ought to rely on its core operation Routing. Routing protocols are inevitable for the transmission of data between nodes. The characteristics of MANET`s fabricate their design as a challenge. The Legacy studies on Literature resulted in innumerable protocols categorized as Proactive, Reactive, and Hybrid. This paper put forth’s an enhanced Zone Routing Protocol that hinges on security, clustering, and Energy efficiency that is more stable and shows effective performance than traditional ZRP. Our proposed model depends on the clustering algorithm, attribute-based encryption, and fuzzy classification to reduce energy consumption, routing overhead, and increase security. Results of NS3.2 simulation illustrates that enhanced ZRP shows high-performance indexes in various QoS parameters like throughput, End to end delay, Load balancing, Energy consumption, and Delivery ratio concerning existing ZRP.

Reference
[1] Moudni, H., Er-rouidi, M., Mouncif, H., & Hadadi, B. E. (2016). Secure routing protocols for mobile ad hoc networks.International Conference on Information Technology for Organizations Development(IT4OD). DOI:10.1109/it4od.2016.747929,(1-6)(2016). IEEE. https://ieeexplore.ieee.org/document/7479295.
[2] A. Subramaniam, Power management in zone routing protocol (ZRP), University of Central England, Birmingham,(2003).
[3] Sharma, S., Jain, A., & Gupta, N. Modified ZRP to Identify Cooperative Attacks. 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT). (2016),DOI:10.1109/cict.2016.66,(302-307)IEEE. https://ieeexplore.ieee.org/document/7546620/
[4] Mehta, D., Kashyap, I., & Zafar, S. Random cluster head selection based routing approach for energy enrichment in MANET. 2017 International Conference on Recent Innovations in Signal Processing and Embedded Systems (RISE). DOI:10.1109/rise.2017.8378137,IEEE, (2017).
[5] Barolli, L., Honma, Y., Koyama, A., Durresi, A., & Arai, J. (2004). A selective border-casting zone routing protocol for ad-hoc networks. Proceedings. 15th International Workshop on Database and Expert SystemsApplications,(2004). DOI:10.1109/dexa.2004.1333494 (pp 326-330) IEEE. https://ieeexplore.ieee.org/document/1333494/.
[6] Pham Thi Minh, T., Nguyen, T. T., & Kim, D.-S. (2015). Location Aided Zone Routing Protocol in Mobile Ad Hoc Networks. IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA).(2015).DOI:10.1109/etfa.2015.7301615 https://ieeexplore.ieee.org/document/7301615.
[7] Chellathurai, A. S., & Darma Prakash Raj, E. G. (2013). EZRP: Evolutionary Zone Routing Protocol. 2013 International Conference on Advanced Computing and Communication Systems. DOI:10.1109/icaccs.2013.6938740,(1-5)IEEE. https://ieeexplore.ieee.org/document/6938740
[8] Malwe, S. R., Rohilla, S., & Biswas, G. P. Location and selective-border cast based enhancement of the zone routing protocol. 2016 3rd International Conference on Recent Advances in Information Technology (RAIT). DOI:10.1109/rait.2016.7507880 (2016) 8388.IEEE.https://ieeexplore.ieee.org/document/7507880.
[9] Osama A. Awad, Mariam Rushd, An Efficient Energy-Aware ZRP-Fuzzy Clustering Protocol for WSN, International Journal of Scientific & Engineering Research, 7(3)(2016) 1060-63, ISSN 2229-5518.doi:10.13140/RG.2.1.3738.9205. https://www.researchgate.net/publication/301224008_An_Efficient_Energy_Aware_ZRP-Fuzzy_Clustering_Protocol_for_WSN.
[10] Varun Kumar Sharma, Lal Pratap Verma, and Mahesh Kumar, A Fuzzy-based Adaptive Energy Efficient Load Distribution Scheme in Ad-hoc Networks, I.J. Intelligent Systems, and Applications,2(2018) 72-84, DOI:10.5815/ijisa.2018.02.07 https://www.researchgate.net/publication/322909008_A_Fuzzy-based_Adaptive_Energy_Efficient_Load_Distribution_Scheme_in_Ad-hoc_Networks .
[11] Hossain, S., Hussain, M. S., Ema, R. R., Dutta, S., Sarkar, S., & Islam, T. (2019). Detecting Blackhole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET. (2019),10th International Conference on Computing, Communication, and Networking Technologies(ICCCNT). DOI: 10.1109/ICCCNT45670.2019.8944395. https://ieeexplore.ieee.org/abstract/document/8944395.
[12] K.Spurthi, T.N.Shankar, A Research on Wormhole Attack in Mobile Adhoc Networks, International Journal Of Recent Technology and Engineering,8(14) (2019) 1125-1130. https://www.ijrte.org/wp-content/uploads/papers/v8i1s4/A12130681S419.pdf.
[13] K.Spurthi, T.N.shankar, Intrusion Detection in Manets with Elgamal Digital Signature, Far East Journal of Electronics and communications,16(3)(2016) 511-525. https://www.researchgate.net/publication/308271411_Intrusion_detection_system_in_manets_with_elgamal_digital_signature.
[14] K.Spurthi, T.N.shankar, An Efficient Cluster Computing Mechanism for Wormhole Attack Detection in MANET, International Journal of Advanced Science and Technology 29(7)(2020) 3320-3333. http://sersc.org/journals/index.php/IJAST/article/view/18963.
[15] Rajinder Singh, Parvinder Singh, and Manoj Duhan, An Effective Implementation Of Security-Based Algorithmic Approach In Mobile Adhoc Networks, Human-Centric Computing And Information Sciences, Springerjournal.4(1),1-14,(2014). https://link.springer.com/article/10.1186/s13673-014-0007-9.
[16] Prakash, S., & Swaroop, A., A brief survey of black hole detection and avoidance for ZRP protocol in MANETs. 2016 International Conference on Computing, Communication, and Automation (ICCCA).(2016) DOI:10.1109/ccaa.2016.7813802 ,cross reference(https://ieeexplore.ieee.org/document/7813802)
[17] Sethi, K., Pradhan, A., Punith, R., & Bera, P. A Scalable Attribute-Based Encryption for Secure Data Storage and Access in Cloud. 2019 International Conference on Cyber Security and Protection of Digital Services(CyberSecurity). (2019).DOI:10.1109/cybersecpods.2019.8884981( https://ieeexplore.ieee.org/document/8884981).
[18] Nan Li. Research on Diffie-Hellman key exchange protocol. 2010 2nd International Conference on Computer Engineering and Technology. (2010). DOI:10.1109/iccet.2010.5485276 (https://ieeexplore.ieee.org/document/5485276).
[19] Alinci, M., Spaho, E., Lala, A., & Kolici, V., Clustering Algorithms in MANETs: A Review. 2015 Ninth International Conference on Complex, Intelligent, and Software Intensive Systems. (2015) .DOI:10.1109/cisis.2015.47( https://ieeexplore.ieee.org/document/7185207).
[20] Mehta, S., Sharma, P., & Kotecha, K., A survey on various cluster head election algorithms for MANET. 2011 Nirma University International Conference on Engineering. (2011).DOI:10.1109/nuicone.2011.6153248 (https://ieeexplore.ieee.org/document/6153248).
[21] XueqinYanga, QiangweiChen, bChaoboChen, bJianhuaZhaob, Improved ZRP Routing Protocol Based on Clustering procedia computer science, 131,992-1000, (2018).https://doi.org/10.1016/j.procs.2018.04.242 .
[22] Rajput, S. S., & Trivedi, M. C., Securing Zone Routing Protocol in MANET Using Authentication Technique. 2014 International Conference on Computational Intelligence and Communication Networks.(2014),DOI:10.1109/cicn.2014.184 (https://ieeexplore.ieee.org/abstract/document/7065604).

Keywords
MANET; Network security, ZRP, ABE, QoS Parameters.