E2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT

Integration of mobile ad hoc networks (MANETs) and internet of things (IoT) becomes an emerging paradigm to enable opportunistic communication in IoT. However, the lack of infrastructure in MANET increases involvement of adversaries in IoT environment. Thus security provisioning against severe adver...

Full description

Saved in:
Bibliographic Details
Published inIET communications Vol. 13; no. 19; pp. 3207 - 3216
Main Authors Ponguwala, Maitreyi, Rao, Sreenivasa
Format Journal Article
LanguageEnglish
Published The Institution of Engineering and Technology 03.12.2019
Subjects
Online AccessGet full text
ISSN1751-8628
1751-8636
DOI10.1049/iet-com.2019.0039

Cover

Abstract Integration of mobile ad hoc networks (MANETs) and internet of things (IoT) becomes an emerging paradigm to enable opportunistic communication in IoT. However, the lack of infrastructure in MANET increases involvement of adversaries in IoT environment. Thus security provisioning against severe adversaries is still challenging in MANET-IoT. In this paper, we propose an energy efficient secure routing (E2-SR) scheme to ensure data security and integrity in MANET-IoT. We adapt Certificate based authentication in Hash Chain based Certificate Authentication (HCCA) scheme. Cluster formation is involved with secure verification of IoT devices by elliptic curve group law formulations. For cluster formation, secure dual head clustering with elliptic curve verification (SDHC-EC) algorithm is proposed. Secure routing is enabled by a new Worst Case Particle Swarm Optimization (WC-PSO) algorithm. The WC-PSO algorithm is supported by dual state markov chain model (DS-MCM) for security enhancement. Data security is ensured with data integrity using novel dual XOR-Rivest Cipher6 Encryption with Fuzzy Evaluation (DXOR-RC6 with FE) algorithm. The proposed MANET-IoT network is modeled and tested in ns-3.26 environment. The evaluation shows that E2-SR achieves better results in packet delivery ratio, throughput, residual energy, and routing overhead.
AbstractList Integration of mobile ad hoc networks (MANETs) and internet of things (IoT) becomes an emerging paradigm to enable opportunistic communication in IoT. However, the lack of infrastructure in MANET increases involvement of adversaries in IoT environment. Thus security provisioning against severe adversaries is still challenging in MANET‐IoT. In this paper, we propose an energy efficient secure routing (E2‐SR) scheme to ensure data security and integrity in MANET‐IoT. We adapt Certificate based authentication in Hash Chain based Certificate Authentication (HCCA) scheme. Cluster formation is involved with secure verification of IoT devices by elliptic curve group law formulations. For cluster formation, secure dual head clustering with elliptic curve verification (SDHC‐EC) algorithm is proposed. Secure routing is enabled by a new Worst Case Particle Swarm Optimization (WC‐PSO) algorithm. The WC‐PSO algorithm is supported by dual state markov chain model (DS‐MCM) for security enhancement. Data security is ensured with data integrity using novel dual XOR‐Rivest Cipher6 Encryption with Fuzzy Evaluation (DXOR‐RC6 with FE) algorithm. The proposed MANET‐IoT network is modeled and tested in ns‐3.26 environment. The evaluation shows that E2‐SR achieves better results in packet delivery ratio, throughput, residual energy, and routing overhead.
Author Rao, Sreenivasa
Ponguwala, Maitreyi
Author_xml – sequence: 1
  givenname: Maitreyi
  surname: Ponguwala
  fullname: Ponguwala, Maitreyi
  email: maithriponguwala@gmail.com
  organization: 1JNTUH, MGIT, Hyderabad, India
– sequence: 2
  givenname: Sreenivasa
  surname: Rao
  fullname: Rao, Sreenivasa
  organization: 2Department of CSE, JNTUH, Hyderabad, India
BookMark eNp1kM1OAjEUhRuDiYA-gLu-QLF_05myQwKKAU10XDelc4tDoCUzA4a3dyYYd67uWdzv5OQboF6IARC6Z3TEqNQPJTTExf2IU6ZHlAp9hfosTRjJlFC9v8yzGzSo6y2lSaKk7KOXGScf72NscYgn2GEIUG3OBLwvXQmhwTW4YwW4isemDBtcuy_YA24iPlSxAdfg1eR1lpNFzG_Rtbe7Gu5-7xDl81k-fSbLt6fFdLIkZaYTklqlCq8l11nqvE655jzziUgLZgVkmq25FdRnKeeqKApHpaDWMykVrLVLCjFE40vtd7mDszlU5d5WZ8Oo6USYVoRpRZhOhOlEmOnqkz_OaduXtDC5wN3bNh6r0C79nxU_Sgdkrw
ContentType Journal Article
Copyright The Institution of Engineering and Technology
2021 The Institution of Engineering and Technology
Copyright_xml – notice: The Institution of Engineering and Technology
– notice: 2021 The Institution of Engineering and Technology
DOI 10.1049/iet-com.2019.0039
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1751-8636
EndPage 3216
ExternalDocumentID CMU2BF02265
10_1049_iet_com_2019_0039
Genre article
GroupedDBID 0R
24P
29I
4IJ
5GY
6IK
8VB
AAJGR
ABPTK
ACGFS
ACIWK
AENEX
ALMA_UNASSIGNED_HOLDINGS
BFFAM
CS3
DU5
ESX
HZ
IFIPE
IPLJI
JAVBF
LAI
LOTEE
LXI
M43
MS
NADUK
NXXTH
O9-
OCL
QWB
RIE
RNS
RUI
U5U
UNMZH
ZL0
ZZ
.DC
0R~
0ZK
1OC
2QL
4.4
6OB
8FE
8FG
96U
AAHHS
AAHJG
ABJCF
ABQXS
ACCFJ
ACCMX
ACESK
ACGFO
ACXQS
ADEYR
AEEZP
AEGXH
AEQDE
AFAZI
AFKRA
AIAGR
AIWBW
AJBDE
ALUQN
ARAPS
AVUZU
BENPR
BGLVJ
CCPQU
EBS
EJD
F8P
GOZPB
GROUPED_DOAJ
GRPMH
HCIFZ
HZ~
IAO
ITC
K1G
L6V
M7S
MCNEO
MS~
OK1
P62
PTHSS
ROL
S0W
~ZZ
ID FETCH-LOGICAL-i895-7a66df942987cf9729228f537d1a3e891b2a30f87226dddc0430af1446eb9c5d3
IEDL.DBID IDLOA
ISSN 1751-8628
IngestDate Wed Jan 22 16:32:16 EST 2025
Tue Jan 05 21:44:21 EST 2021
IsPeerReviewed true
IsScholarly true
Issue 19
Keywords telecommunication security
opportunistic communication
WC-PSO algorithm
particle swarm optimisation
HCCA scheme
sensitivity analysis
pattern discovery method
packet delivery ratio
IoT environment
fuzzy evaluation
public key cryptography
DXOR-RC6 with FE algorithm
mobile ad hoc networks
worst case particle swarm optimisation
elliptic curve verification algorithm
trusted routing scheme
residual energy
telecommunication power management
data security
dual state Markov chain model
TRS-PD method
cryptography
Secure Dual Head Clustering
data integrity
IoT devices
energy-efficient secure routing scheme
secure verification
Internet of Things
routing overhead
attack pattern analysis
dual XOR-Rivest Cipher6 Encryption
telecommunication network routing
Markov processes
energy conservation
security enhancement
hash chain based certificate authentication
ns-3.26 environment
E2-SR
MANET-IoT network
attack detection ability
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i895-7a66df942987cf9729228f537d1a3e891b2a30f87226dddc0430af1446eb9c5d3
PageCount 10
ParticipantIDs wiley_primary_10_1049_iet_com_2019_0039_CMU2BF02265
iet_journals_10_1049_iet_com_2019_0039
ProviderPackageCode RUI
PublicationCentury 2000
PublicationDate 20191203
PublicationDateYYYYMMDD 2019-12-03
PublicationDate_xml – month: 12
  year: 2019
  text: 20191203
  day: 3
PublicationDecade 2010
PublicationTitle IET communications
PublicationYear 2019
Publisher The Institution of Engineering and Technology
Publisher_xml – name: The Institution of Engineering and Technology
References Schweitzer, N.; Stulman, A.; Shabtai, A. (C29) 2017; 16
Swaroop, G.V.; Murugaboopathi, G. (C20) 2017
Sakthivel, T.; Chandrasekaran, R.M. (C30) 2018; 101
Ye, Q.; Zhuang, W. (C11) 2017; 4
Liu, G.; Yan, Z.; Pedrycz, W. (C9) 2018; 105
Chintalapalli, R.M.; Ananthula, V.R. (C35) 2018; 12
Al-Fuqaha, A.; Guizani, M.; Mohammadi, M. (C1) 2015; 17
Vamsi, P.R.; Kant, K. (C24) 2017; 97
Jamaesha, S.S.; Bhavani, S. (C21) 2018
Jhaveri, R.H.; Patel, N.M.; Zhong, Y. (C36) 2018; 6
Devi, V.S.; Hegde, N.P. (C25) 2018; 100
Ray, P.P. (C2) 2018; 30
Brindha, V.; Karthikeyan, T.; Manimegalai, P. (C16) 2018
Mukherjee, S.; Biswas, G.P. (C10) 2018; 19
Kecskemeti, G.; Casale, G.; Jha, D.N. (C13) 2017; 4
Cai, R.J.; Li, X.J.; Chong, P.H.J. (C27) 2019; 18
Xia, H.; Li, Z.; Zheng, Y. (C22) 2018
Muthurajkumar, S.; Ganapathy, S.; Vijayalakshmi, M. (C26) 2017; 96
Alshehri, M.D.; Hussain, F.K. (C31) 2018; 101
Lin, J.; Yu, W.; Zhang, N. (C3) 2017; 4
Muthusenthil, B.; Murugavalli, S. (C17) 2017; 23
Nia, A.M.; Jha, N.K. (C5) 2017; 5
Sridevi, N.; Nagarajan, V. (C28) 2018
Sethuraman, P.; Kannan, N. (C18) 2017; 23
Tai, W.-L.; Chang, Y.-F.; Li, W.-H. (C33) 2017; 34
Reshmi, T.R; Murugan, K. (C19) 2017; 14
Yang, Y.; Wu, L.; Yin, G. (C4) 2017; 4
2017; 5
2018; 19
2018; 6
2017; 97
2018; 100
2017; 96
2015; 17
2017; 4
2018; 105
2017; 14
2017; 16
2018; 101
2017; 23
2017; 34
2018
2017
2019; 18
2018; 30
2016
2018; 12
References_xml – volume: 96
  start-page: 1753
  issue: 2
  year: 2017
  end-page: 1769
  ident: C26
  article-title: An intelligent secured and energy efficient routing algorithm for MANETs
  publication-title: Wirel. Pers. Commun.
– start-page: 1
  year: 2018
  end-page: 9
  ident: C16
  article-title: Fuzzy enhanced secure multicast routing for improving authentication in MANET
  publication-title: Cluster Comput.
– year: 2018
  ident: C22
  article-title: A novel light-weight subjective trust inference framework in MANETs
  publication-title: IEEE Trans. Sustain. Comput.
– volume: 16
  start-page: 2174
  issue: 8
  year: 2017
  end-page: 2183
  ident: C29
  article-title: Contradiction based gray-hole attack minimization for ad-hoc networks
  publication-title: IEEE Trans. Mob. Comput.
– volume: 101
  start-page: 791
  issue: 7
  year: 2018
  end-page: 818
  ident: C31
  article-title: A fuzzy security protocol for trust management in the internet of things (fuzzy-IoT)
  publication-title: Computing
– volume: 34
  start-page: 133
  issue: 2
  year: 2017
  end-page: 141
  ident: C33
  article-title: An IoT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous wireless sensor networks
  publication-title: J. Inf. Secur. Appl.
– volume: 6
  start-page: 20085
  year: 2018
  end-page: 20103
  ident: C36
  article-title: Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT
  publication-title: IEEE Access
– volume: 4
  start-page: 1125
  issue: 5
  year: 2017
  end-page: 1142
  ident: C3
  article-title: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications
  publication-title: IEEE Internet Things J.
– volume: 4
  start-page: 446
  issue: 2
  year: 2017
  end-page: 460
  ident: C11
  article-title: Distributed and adaptive medium access control for internet-of-things-enabled mobile networks
  publication-title: IEEE Internet Things J.
– volume: 4
  start-page: 1250
  issue: 5
  year: 2017
  end-page: 1258
  ident: C4
  article-title: A survey on security and privacy issues in Internet-of-Things
  publication-title: IEEE Internet Things J.
– start-page: 1
  year: 2017
  end-page: 13
  ident: C20
  article-title: Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation
  publication-title: Cluster Comput.
– volume: 105
  start-page: 105
  year: 2018
  end-page: 122
  ident: C9
  article-title: Data collection for attack detection and security measurement in mobile adhoc networks: a survey
  publication-title: J. Netw. Comput. Appl.
– volume: 30
  start-page: 291
  year: 2018
  end-page: 319
  ident: C2
  article-title: A survey on Internet of Things architectures
  publication-title: J. King Saud Univ.-Comput. Inf. Sci.
– volume: 18
  start-page: 42
  issue: 1
  year: 2019
  end-page: 55
  ident: C27
  article-title: An evolutionary self-cooperative trust scheme against routing disruptions in MANETs
  publication-title: IEEE Trans. Mob. Comput.
– volume: 4
  start-page: 62
  issue: 1
  year: 2017
  end-page: 69
  ident: C13
  article-title: Modelling and simulation challenges in internet of things
  publication-title: IEEE Cloud Comput.
– volume: 23
  start-page: 79
  issue: 1
  year: 2017
  end-page: 87
  ident: C17
  article-title: Privacy preservation and protection for cluster based geographic routing protocol in MANET
  publication-title: Wirel. Netw.
– volume: 12
  start-page: 1406
  issue: 12
  year: 2018
  end-page: 1415
  ident: C35
  article-title: M-Lion Whale: multi-objective optimization model for secure routing in mobile ad-hoc network
  publication-title: IET Commun.
– start-page: 1
  year: 2018
  end-page: 9
  ident: C28
  article-title: A curve based cryptography for wireless security in MANET
  publication-title: Cluster Comput.
– volume: 19
  start-page: 107
  issue: 2
  year: 2018
  end-page: 127
  ident: C10
  article-title: Networking for IoT and applications using existing communication technology
  publication-title: Egypt. Inform. J.
– volume: 23
  start-page: 2227
  issue: 7
  year: 2017
  end-page: 2237
  ident: C18
  article-title: Refined trust energy- on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET
  publication-title: Wirel. Netw.
– volume: 100
  start-page: 923
  issue: 3
  year: 2018
  end-page: 940
  ident: C25
  article-title: Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer
  publication-title: Wirel. Pers. Commun.
– start-page: 1
  year: 2018
  end-page: 8
  ident: C21
  article-title: A secure and efficient cluster based location aware routing protocol in MANET
  publication-title: Cluster Comput.
– volume: 5
  start-page: 586
  issue: 4
  year: 2017
  end-page: 602
  ident: C5
  article-title: A comprehensive study of security of internet-of-things
  publication-title: IEEE Trans. Emerg. Top. Comput.
– volume: 97
  start-page: 4385
  issue: 3
  year: 2017
  end-page: 4412
  ident: C24
  article-title: Generalized trust model for cooperative routing in MANETs
  publication-title: Wirel. Pers. Commun.
– volume: 17
  start-page: 2347
  issue: 4
  year: 2015
  end-page: 2376
  ident: C1
  article-title: Internet of things: a survey on enabling technologies, protocols, and applications
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 14
  start-page: 114
  issue: 9
  year: 2017
  end-page: 126
  ident: C19
  article-title: Light weight cryptographic address generation (LW-CGA) using system state entropy gathering for IPv6 based MANETs
  publication-title: China Commun.
– volume: 101
  start-page: 1581
  issue: 3
  year: 2018
  end-page: 1618
  ident: C30
  article-title: A dummy packet-based hybrid security framework for mitigating routing misbehavior in multi-hop wireless networks
  publication-title: Wirel. Pers. Commun.
– volume: 12
  start-page: 1406
  issue: 12
  year: 2018
  end-page: 1415
  article-title: M‐Lion Whale: multi‐objective optimization model for secure routing in mobile ad‐hoc network
  publication-title: IET Commun.
– volume: 18
  start-page: 42
  issue: 1
  year: 2019
  end-page: 55
  article-title: An evolutionary self‐cooperative trust scheme against routing disruptions in MANETs
  publication-title: IEEE Trans. Mob. Comput.
– volume: 101
  start-page: 791
  issue: 7
  year: 2018
  end-page: 818
  article-title: A fuzzy security protocol for trust management in the internet of things (fuzzy‐IoT)
  publication-title: Computing
– start-page: 419
  year: 2017
  end-page: 436
– volume: 101
  start-page: 1581
  issue: 3
  year: 2018
  end-page: 1618
  article-title: A dummy packet‐based hybrid security framework for mitigating routing misbehavior in multi‐hop wireless networks
  publication-title: Wirel. Pers. Commun.
– volume: 16
  start-page: 2174
  issue: 8
  year: 2017
  end-page: 2183
  article-title: Contradiction based gray‐hole attack minimization for ad‐hoc networks
  publication-title: IEEE Trans. Mob. Comput.
– volume: 97
  start-page: 4385
  issue: 3
  year: 2017
  end-page: 4412
  article-title: Generalized trust model for cooperative routing in MANETs
  publication-title: Wirel. Pers. Commun.
– start-page: 1
  year: 2018
  end-page: 9
  article-title: A curve based cryptography for wireless security in MANET
  publication-title: Cluster Comput.
– start-page: 1
  year: 2017
  end-page: 13
  article-title: Secure and reliable communication scheme for MANET using ECMS cluster head‐based certificate revocation
  publication-title: Cluster Comput.
– volume: 17
  start-page: 2347
  issue: 4
  year: 2015
  end-page: 2376
  article-title: Internet of things: a survey on enabling technologies, protocols, and applications
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 4
  start-page: 1250
  issue: 5
  year: 2017
  end-page: 1258
  article-title: A survey on security and privacy issues in Internet‐of‐Things
  publication-title: IEEE Internet Things J.
– volume: 23
  start-page: 79
  issue: 1
  year: 2017
  end-page: 87
  article-title: Privacy preservation and protection for cluster based geographic routing protocol in MANET
  publication-title: Wirel. Netw.
– volume: 14
  start-page: 114
  issue: 9
  year: 2017
  end-page: 126
  article-title: Light weight cryptographic address generation (LW‐CGA) using system state entropy gathering for IPv6 based MANETs
  publication-title: China Commun.
– year: 2018
  article-title: A novel light‐weight subjective trust inference framework in MANETs
  publication-title: IEEE Trans. Sustain. Comput.
– year: 2016
– year: 2018
– volume: 96
  start-page: 1753
  issue: 2
  year: 2017
  end-page: 1769
  article-title: An intelligent secured and energy efficient routing algorithm for MANETs
  publication-title: Wirel. Pers. Commun.
– volume: 4
  start-page: 62
  issue: 1
  year: 2017
  end-page: 69
  article-title: Modelling and simulation challenges in internet of things
  publication-title: IEEE Cloud Comput.
– start-page: 347
  year: 2018
  end-page: 355
– volume: 34
  start-page: 133
  issue: 2
  year: 2017
  end-page: 141
  article-title: An IoT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks
  publication-title: J. Inf. Secur. Appl.
– volume: 23
  start-page: 2227
  issue: 7
  year: 2017
  end-page: 2237
  article-title: Refined trust energy‐ad hoc on demand distance vector (ReTE‐AODV) routing algorithm for secured routing in MANET
  publication-title: Wirel. Netw.
– start-page: 1
  year: 2018
  end-page: 8
  article-title: A secure and efficient cluster based location aware routing protocol in MANET
  publication-title: Cluster Comput.
– start-page: 81
  year: 2017
  end-page: 92
– volume: 19
  start-page: 107
  issue: 2
  year: 2018
  end-page: 127
  article-title: Networking for IoT and applications using existing communication technology
  publication-title: Egypt. Inform. J.
– start-page: 135
  year: 2018
  end-page: 151
– volume: 30
  start-page: 291
  year: 2018
  end-page: 319
  article-title: A survey on Internet of Things architectures
  publication-title: J. King Saud Univ.‐Comput. Inf. Sci.
– volume: 4
  start-page: 1125
  issue: 5
  year: 2017
  end-page: 1142
  article-title: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications
  publication-title: IEEE Internet Things J.
– volume: 100
  start-page: 923
  issue: 3
  year: 2018
  end-page: 940
  article-title: Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer
  publication-title: Wirel. Pers. Commun.
– volume: 5
  start-page: 586
  issue: 4
  year: 2017
  end-page: 602
  article-title: A comprehensive study of security of internet‐of‐things
  publication-title: IEEE Trans. Emerg. Top. Comput.
– volume: 105
  start-page: 105
  year: 2018
  end-page: 122
  article-title: Data collection for attack detection and security measurement in mobile adhoc networks: a survey
  publication-title: J. Netw. Comput. Appl.
– volume: 4
  start-page: 446
  issue: 2
  year: 2017
  end-page: 460
  article-title: Distributed and adaptive medium access control for internet‐of‐things‐enabled mobile networks
  publication-title: IEEE Internet Things J.
– year: 2017
– start-page: 175
  year: 2018
  end-page: 786
– start-page: 1
  year: 2018
  end-page: 9
  article-title: Fuzzy enhanced secure multicast routing for improving authentication in MANET
  publication-title: Cluster Comput.
– volume: 6
  start-page: 20085
  year: 2018
  end-page: 20103
  article-title: Sensitivity analysis of an attack‐pattern discovery based trusted routing scheme for mobile ad‐hoc networks in industrial IoT
  publication-title: IEEE Access
– start-page: 535
  year: 2016
  end-page: 546
SSID ssj0055644
Score 2.2036843
Snippet Integration of mobile ad hoc networks (MANETs) and internet of things (IoT) becomes an emerging paradigm to enable opportunistic communication in IoT. However,...
SourceID wiley
iet
SourceType Publisher
StartPage 3207
SubjectTerms attack detection ability
attack pattern analysis
cryptography
data integrity
data security
dual state Markov chain model
dual XOR‐Rivest Cipher6 Encryption
DXOR‐RC6 with FE algorithm
E2‐SR
elliptic curve verification algorithm
energy conservation
energy‐efficient secure routing scheme
fuzzy evaluation
hash chain based certificate authentication
HCCA scheme
Internet of Things
IoT devices
IoT environment
MANET‐IoT network
Markov processes
mobile ad hoc networks
ns‐3.26 environment
opportunistic communication
packet delivery ratio
particle swarm optimisation
pattern discovery method
public key cryptography
Research Article
residual energy
routing overhead
Secure Dual Head Clustering
secure verification
security enhancement
sensitivity analysis
telecommunication network routing
telecommunication power management
telecommunication security
TRS‐PD method
trusted routing scheme
WC‐PSO algorithm
worst case particle swarm optimisation
SummonAdditionalLinks – databaseName: Wiley Online Library Open Access
  dbid: 24P
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZKWWBAPEV5yQNis0jiOLHZStUKkFpVkErdIju5SJUgQX0w8xP4jfwSzk5bgRAL68n2cOe7-2yfvyPkknsZFBALJjRkLMyKjEmuc-YBGOOB4LGwn5P7g-huFD6MxbhBOqu_MDU_xPrCzXqGi9fWwbWpu5AgqEUjTmDObMEHZjBLOcnVBtn0Ec_YbR6Ew1U4FiJyHV0xTfoM4btcP22q619LYIJB2U-c6hJNb5fsLBEibdcm3SMNKPfJ9jfewAMy7Aaf7x9PjzdU07J6g2cK7gsfCsFRQmAmoTN7kw50Wi1sZTPFUyy8AJ1XdEnNQPvtQTfBKfdVckiSXjfp3LFlawQ2kUqwWEdRXijMJTLOCoUAOQhkgYrNfc1BKt8EmnuFjBFc5XmeWWIvXdijHxiViZwfkWZZlXBMqM5wrQJdWUYRBk1jJFrV840PJoxF6LfIFaokXe7sWeoerUOVWiHqLrW6swSjqkW401r6WtNk_D0y7fRHwW0P0UMkTv4165RsWbkrK-FnpDmfLuAcwcHcXDjjfwFeGrT3
  priority: 102
  providerName: Wiley-Blackwell
Title E2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT
URI http://digital-library.theiet.org/content/journals/10.1049/iet-com.2019.0039
https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-com.2019.0039
Volume 13
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVBHI
  databaseName: IET Digital Library Open Access
  customDbUrl:
  eissn: 1751-8636
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0055644
  issn: 1751-8628
  databaseCode: IDLOA
  dateStart: 20130104
  isFulltext: true
  titleUrlDefault: https://digital-library.theiet.org/content/collections
  providerName: Institution of Engineering and Technology
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1751-8636
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0055644
  issn: 1751-8628
  databaseCode: 24P
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwEA9ue9EH8RPnx8iD-BbWNk2b-jbnxjbcEO1gbyVJrzLQVebm3--l7fwABd9KCAf9heR-l9z9jpBL7hjIIBRMKDDMN5lhkquUOQBaOyB4KGxx8ngSDKb-aCZmX-XR6fzJ9spgmxs3e1sOZeWBTd3Gc7hdYVw2JEF-28YJzGZ-oCuz2pM8qpGGh9G5VyeN4e2dDbHKk1mIoGjuih7TZcjk5ecr5y9G0Nfg2E_KWvic_h7Zrcgi7ZSru0-2YHFAdr5JCB6SUc9jjw_XVNFF_g7PFIpaPgaFMgT-CH2zF-pAl_naJjhTDGbhBegqp5VCAx13Jr2YDfP4iMT9XtwdsKo_ApvLSLBQBUGaRehQZGiyCFmy58kM0U1dxUFGrvYUdzIZIsNK09RYdS-V2fgPdGREyo9JfZEv4IRQZdBWhvtZBgGenFpLXFrH1S5oPxS-2yRXCEaygT4pXq79KLGDiFpiUbMqo1GT8AKv5LXUyvh7ZtIdT72bPlKIQJz-1_wZ2bbfRToJPyf11XINF0gKVrpFap5_36pW_APPebJg
linkProvider Institution of Engineering and Technology
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagDMCAeIry9IDYLJI4dmw2Hq1aIFUFQWKL4uQiVYIGtYWZn8Bv5JdwdloEQiysJ9vD2ef77nz3mZAj7uVQQiSYyCBnYV7mTPGsYB6AMR4IHgnbnBz3ZOc-vHoQD3PkctYLU_NDfCXcrGW4-9oauE1I1wFnaEkyBzBhtuIDXZjlnOR6niyE0pc2BAvC_uw-FkK6L13RT_oM8bv6etvUJ7-WQA-Dsp9A1Xma9ipZmUJEelbv6RqZg-E6Wf5GHLhB-q3g4-397vaUZnRYvcIjBdfDh0JwnBDoSujYptKBjqoXW9pMMYyFJ6CTik65GWh81mslOKVbJZskabeSiw6b_o3ABkoLFmVSFqVGZ6KivNSIkINAlajZws84KO2bIONeqSJEV0VR5JbZKytt7AdG56LgW6QxrIawTWiW41ol2rKSEm9NYxRuq-cbH0wYidBvkmNUSTo92uPUvVqHOrVC1F1qdWcZRnWTcKe19Lnmyfh7ZHoR3wfnbYQPUuz8a9YhWewk8U160-1d75IlO8bVmPA90piMXmAfkcLEHLiD8Ak3trhj
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA5aQfQgPrE-cxBvwd3NZjfxVmuLVVuKruBt2exOoKDd0odnf4K_0V_iJF1FES9ehySHSSbfN0nmCyEn3MvBQCyYyCBnYW5yJnlWMA9Aaw8Ej4UtTu72oquH8PpRPC6Qy89amLk-xNeBm40Mt1_bAIdRYeYJZ2hFMgcwZfbFB0KY1ZzkapEshQIR0eo7h_3P_ViIyH3pijjpM-Tv8utuU539GgIRBm0_iapDmvY6WasoIm3M53SDLMBwk6x-Ew7cIv1W8P76dn93TjM6LF_giYKr4UMjOE0IhBI6sUfpQMflzD5tppjGwjPQaUkrbQbabfRaCXbplMk2SdqtpHnFqr8R2EAqweIsigqjEExknBuFDDkIpEHPFn7GQSpfBxn3jIyRXRVFkVtlr8zY3A-0ykXBd0htWA5hl9Asx7EMxrKMItw1tZY4rZ6vfdBhLEK_Tk7RJWm1tCepu7UOVWqN6LvU-s4qjKo64c5r6Wiuk_F3y7TZfQgu2kgfIrH3r17HZLl_2U5vO72bfbJim7gnJvyA1KbjGRwiUZjqI7cOPgBLjLfy
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=E2-SR%3A+a+novel+energy-efficient+secure+routing+scheme+to+protect+MANET-IoT&rft.jtitle=IET+communications&rft.au=Ponguwala%2C+Maitreyi&rft.au=Rao%2C+Sreenivasa&rft.date=2019-12-03&rft.pub=The+Institution+of+Engineering+and+Technology&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=13&rft.issue=19&rft.spage=3207&rft.epage=3216&rft_id=info:doi/10.1049%2Fiet-com.2019.0039&rft.externalDocID=10_1049_iet_com_2019_0039
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon