E 2 -SCRP: An Energy Efficient Secure Cluster-based Routing Protocol for 3D Underwater Acoustic MANET (UWMANET)
Arun Kumar Yadav1, Ashwani Kush2
1Arun Kumar Yadav, research scholar in Department Of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana, India.
2Ashwani Kush, Associate Professor and Head in Department in Computer Science, IIHS, Kurukshetra University, Kurukshetra.
Manuscript received on 25 August 2019. | Revised Manuscript received on 08 September 2019. | Manuscript published on 30 September 2019. | PP: 2430-2442 | Volume-8 Issue-11, September 2019. | Retrieval Number: K13910981119/2019©BEIESP | DOI: 10.35940/ijitee.K1391.0981119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In the current years, Underwater Mobile Ad hoc Network (UWMANET) has emerged as an enthusiastic field for supporting disaster prevention applications (Climate and Weather Observation, Earthquakes in Ocean (Tsunamis), underwater level navigation and tracking). In UWMANET, conventional data transmission methods have certain drawbacks such as high energy consumption, packet loss rate and end-toend delay. Nowadays, mobile node i.e. Autonomous Underwater Vehicle (AUV) is widely used for data collection from underwater sensors, which act as a relay between sensor node and surface sink. Security is a significant issue in UWMANET, which is required for secure communications. In this paper, Energy Efficient Secure Cluster based Routing Protocol called E2 -SCRP is presented in 3D UWMANET environment. The qu-Vanstone based Elliptic Curve Cryptography (qV-ECC) based short-term public key generation scheme is proposed for sensor node authentication. To reduce energy consumption, layer based clustering algorithm is proposed using Type-2 Fuzzy Logic System (T2fls) where Trust value, Distance between neighbors, Relative mobility and Node buffer size for cluster head (CH) election are considered. Next step is to execute two different security schemes based on Event Management. For event occurred clusters, Ciphertext Stealing Technique (CST) is used to resolve the ciphertext expansion problem. For normal data transmission, Lightweight Digital Watermarking (LDW) with Firefly algorithm is proposed. Optimal route for data transmission is executed by Pigeons Swarm Optimization (PiSO) and the forward to sink node via Adjacent AUV. Experiments conducted using NS3 (3.26) and the performance is evaluated for several metrics include packet delivery ratio, energy consumption, end-to-end delay, security strength, and throughput.
Keywords: Three-Dimensional Underwater Mobile Ad Hoc Networks, Energy Efficient Secure Routing, Autonomous Underwater Vehicle, Pigeons Swarm Optimization, Event based Security Schemes, Qu-Vanstone based Elliptic Curve Cryptography.
Scope of the Article: Wireless ad hoc & Sensor Networks