E2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT
Integration of mobile ad hoc networks (MANETs) and internet of things (IoT) becomes an emerging paradigm to enable opportunistic communication in IoT. However, the lack of infrastructure in MANET increases involvement of adversaries in IoT environment. Thus security provisioning against severe adver...
        Saved in:
      
    
          | Published in | IET communications Vol. 13; no. 19; pp. 3207 - 3216 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
            The Institution of Engineering and Technology
    
        03.12.2019
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1751-8628 1751-8636  | 
| DOI | 10.1049/iet-com.2019.0039 | 
Cover
| Abstract | Integration of mobile ad hoc networks (MANETs) and internet of things (IoT) becomes an emerging paradigm to enable opportunistic communication in IoT. However, the lack of infrastructure in MANET increases involvement of adversaries in IoT environment. Thus security provisioning against severe adversaries is still challenging in MANET-IoT. In this paper, we propose an energy efficient secure routing (E2-SR) scheme to ensure data security and integrity in MANET-IoT. We adapt Certificate based authentication in Hash Chain based Certificate Authentication (HCCA) scheme. Cluster formation is involved with secure verification of IoT devices by elliptic curve group law formulations. For cluster formation, secure dual head clustering with elliptic curve verification (SDHC-EC) algorithm is proposed. Secure routing is enabled by a new Worst Case Particle Swarm Optimization (WC-PSO) algorithm. The WC-PSO algorithm is supported by dual state markov chain model (DS-MCM) for security enhancement. Data security is ensured with data integrity using novel dual XOR-Rivest Cipher6 Encryption with Fuzzy Evaluation (DXOR-RC6 with FE) algorithm. The proposed MANET-IoT network is modeled and tested in ns-3.26 environment. The evaluation shows that E2-SR achieves better results in packet delivery ratio, throughput, residual energy, and routing overhead. | 
    
|---|---|
| AbstractList | Integration of mobile ad hoc networks (MANETs) and internet of things (IoT) becomes an emerging paradigm to enable opportunistic communication in IoT. However, the lack of infrastructure in MANET increases involvement of adversaries in IoT environment. Thus security provisioning against severe adversaries is still challenging in MANET‐IoT. In this paper, we propose an energy efficient secure routing (E2‐SR) scheme to ensure data security and integrity in MANET‐IoT. We adapt Certificate based authentication in Hash Chain based Certificate Authentication (HCCA) scheme. Cluster formation is involved with secure verification of IoT devices by elliptic curve group law formulations. For cluster formation, secure dual head clustering with elliptic curve verification (SDHC‐EC) algorithm is proposed. Secure routing is enabled by a new Worst Case Particle Swarm Optimization (WC‐PSO) algorithm. The WC‐PSO algorithm is supported by dual state markov chain model (DS‐MCM) for security enhancement. Data security is ensured with data integrity using novel dual XOR‐Rivest Cipher6 Encryption with Fuzzy Evaluation (DXOR‐RC6 with FE) algorithm. The proposed MANET‐IoT network is modeled and tested in ns‐3.26 environment. The evaluation shows that E2‐SR achieves better results in packet delivery ratio, throughput, residual energy, and routing overhead. | 
    
| Author | Rao, Sreenivasa Ponguwala, Maitreyi  | 
    
| Author_xml | – sequence: 1 givenname: Maitreyi surname: Ponguwala fullname: Ponguwala, Maitreyi email: maithriponguwala@gmail.com organization: 1JNTUH, MGIT, Hyderabad, India – sequence: 2 givenname: Sreenivasa surname: Rao fullname: Rao, Sreenivasa organization: 2Department of CSE, JNTUH, Hyderabad, India  | 
    
| BookMark | eNp1kM1OAjEUhRuDiYA-gLu-QLF_05myQwKKAU10XDelc4tDoCUzA4a3dyYYd67uWdzv5OQboF6IARC6Z3TEqNQPJTTExf2IU6ZHlAp9hfosTRjJlFC9v8yzGzSo6y2lSaKk7KOXGScf72NscYgn2GEIUG3OBLwvXQmhwTW4YwW4isemDBtcuy_YA24iPlSxAdfg1eR1lpNFzG_Rtbe7Gu5-7xDl81k-fSbLt6fFdLIkZaYTklqlCq8l11nqvE655jzziUgLZgVkmq25FdRnKeeqKApHpaDWMykVrLVLCjFE40vtd7mDszlU5d5WZ8Oo6USYVoRpRZhOhOlEmOnqkz_OaduXtDC5wN3bNh6r0C79nxU_Sgdkrw | 
    
| ContentType | Journal Article | 
    
| Copyright | The Institution of Engineering and Technology 2021 The Institution of Engineering and Technology  | 
    
| Copyright_xml | – notice: The Institution of Engineering and Technology – notice: 2021 The Institution of Engineering and Technology  | 
    
| DOI | 10.1049/iet-com.2019.0039 | 
    
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISSN | 1751-8636 | 
    
| EndPage | 3216 | 
    
| ExternalDocumentID | CMU2BF02265 10_1049_iet_com_2019_0039  | 
    
| Genre | article | 
    
| GroupedDBID | 0R 24P 29I 4IJ 5GY 6IK 8VB AAJGR ABPTK ACGFS ACIWK AENEX ALMA_UNASSIGNED_HOLDINGS BFFAM CS3 DU5 ESX HZ IFIPE IPLJI JAVBF LAI LOTEE LXI M43 MS NADUK NXXTH O9- OCL QWB RIE RNS RUI U5U UNMZH ZL0 ZZ .DC 0R~ 0ZK 1OC 2QL 4.4 6OB 8FE 8FG 96U AAHHS AAHJG ABJCF ABQXS ACCFJ ACCMX ACESK ACGFO ACXQS ADEYR AEEZP AEGXH AEQDE AFAZI AFKRA AIAGR AIWBW AJBDE ALUQN ARAPS AVUZU BENPR BGLVJ CCPQU EBS EJD F8P GOZPB GROUPED_DOAJ GRPMH HCIFZ HZ~ IAO ITC K1G L6V M7S MCNEO MS~ OK1 P62 PTHSS ROL S0W ~ZZ  | 
    
| ID | FETCH-LOGICAL-i895-7a66df942987cf9729228f537d1a3e891b2a30f87226dddc0430af1446eb9c5d3 | 
    
| IEDL.DBID | IDLOA | 
    
| ISSN | 1751-8628 | 
    
| IngestDate | Wed Jan 22 16:32:16 EST 2025 Tue Jan 05 21:44:21 EST 2021  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 19 | 
    
| Keywords | telecommunication security opportunistic communication WC-PSO algorithm particle swarm optimisation HCCA scheme sensitivity analysis pattern discovery method packet delivery ratio IoT environment fuzzy evaluation public key cryptography DXOR-RC6 with FE algorithm mobile ad hoc networks worst case particle swarm optimisation elliptic curve verification algorithm trusted routing scheme residual energy telecommunication power management data security dual state Markov chain model TRS-PD method cryptography Secure Dual Head Clustering data integrity IoT devices energy-efficient secure routing scheme secure verification Internet of Things routing overhead attack pattern analysis dual XOR-Rivest Cipher6 Encryption telecommunication network routing Markov processes energy conservation security enhancement hash chain based certificate authentication ns-3.26 environment E2-SR MANET-IoT network attack detection ability  | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i895-7a66df942987cf9729228f537d1a3e891b2a30f87226dddc0430af1446eb9c5d3 | 
    
| PageCount | 10 | 
    
| ParticipantIDs | wiley_primary_10_1049_iet_com_2019_0039_CMU2BF02265 iet_journals_10_1049_iet_com_2019_0039  | 
    
| ProviderPackageCode | RUI | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 20191203 | 
    
| PublicationDateYYYYMMDD | 2019-12-03 | 
    
| PublicationDate_xml | – month: 12 year: 2019 text: 20191203 day: 3  | 
    
| PublicationDecade | 2010 | 
    
| PublicationTitle | IET communications | 
    
| PublicationYear | 2019 | 
    
| Publisher | The Institution of Engineering and Technology | 
    
| Publisher_xml | – name: The Institution of Engineering and Technology | 
    
| References | Schweitzer, N.; Stulman, A.; Shabtai, A. (C29) 2017; 16 Swaroop, G.V.; Murugaboopathi, G. (C20) 2017 Sakthivel, T.; Chandrasekaran, R.M. (C30) 2018; 101 Ye, Q.; Zhuang, W. (C11) 2017; 4 Liu, G.; Yan, Z.; Pedrycz, W. (C9) 2018; 105 Chintalapalli, R.M.; Ananthula, V.R. (C35) 2018; 12 Al-Fuqaha, A.; Guizani, M.; Mohammadi, M. (C1) 2015; 17 Vamsi, P.R.; Kant, K. (C24) 2017; 97 Jamaesha, S.S.; Bhavani, S. (C21) 2018 Jhaveri, R.H.; Patel, N.M.; Zhong, Y. (C36) 2018; 6 Devi, V.S.; Hegde, N.P. (C25) 2018; 100 Ray, P.P. (C2) 2018; 30 Brindha, V.; Karthikeyan, T.; Manimegalai, P. (C16) 2018 Mukherjee, S.; Biswas, G.P. (C10) 2018; 19 Kecskemeti, G.; Casale, G.; Jha, D.N. (C13) 2017; 4 Cai, R.J.; Li, X.J.; Chong, P.H.J. (C27) 2019; 18 Xia, H.; Li, Z.; Zheng, Y. (C22) 2018 Muthurajkumar, S.; Ganapathy, S.; Vijayalakshmi, M. (C26) 2017; 96 Alshehri, M.D.; Hussain, F.K. (C31) 2018; 101 Lin, J.; Yu, W.; Zhang, N. (C3) 2017; 4 Muthusenthil, B.; Murugavalli, S. (C17) 2017; 23 Nia, A.M.; Jha, N.K. (C5) 2017; 5 Sridevi, N.; Nagarajan, V. (C28) 2018 Sethuraman, P.; Kannan, N. (C18) 2017; 23 Tai, W.-L.; Chang, Y.-F.; Li, W.-H. (C33) 2017; 34 Reshmi, T.R; Murugan, K. (C19) 2017; 14 Yang, Y.; Wu, L.; Yin, G. (C4) 2017; 4 2017; 5 2018; 19 2018; 6 2017; 97 2018; 100 2017; 96 2015; 17 2017; 4 2018; 105 2017; 14 2017; 16 2018; 101 2017; 23 2017; 34 2018 2017 2019; 18 2018; 30 2016 2018; 12  | 
    
| References_xml | – volume: 96 start-page: 1753 issue: 2 year: 2017 end-page: 1769 ident: C26 article-title: An intelligent secured and energy efficient routing algorithm for MANETs publication-title: Wirel. Pers. Commun. – start-page: 1 year: 2018 end-page: 9 ident: C16 article-title: Fuzzy enhanced secure multicast routing for improving authentication in MANET publication-title: Cluster Comput. – year: 2018 ident: C22 article-title: A novel light-weight subjective trust inference framework in MANETs publication-title: IEEE Trans. Sustain. Comput. – volume: 16 start-page: 2174 issue: 8 year: 2017 end-page: 2183 ident: C29 article-title: Contradiction based gray-hole attack minimization for ad-hoc networks publication-title: IEEE Trans. Mob. Comput. – volume: 101 start-page: 791 issue: 7 year: 2018 end-page: 818 ident: C31 article-title: A fuzzy security protocol for trust management in the internet of things (fuzzy-IoT) publication-title: Computing – volume: 34 start-page: 133 issue: 2 year: 2017 end-page: 141 ident: C33 article-title: An IoT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous wireless sensor networks publication-title: J. Inf. Secur. Appl. – volume: 6 start-page: 20085 year: 2018 end-page: 20103 ident: C36 article-title: Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT publication-title: IEEE Access – volume: 4 start-page: 1125 issue: 5 year: 2017 end-page: 1142 ident: C3 article-title: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications publication-title: IEEE Internet Things J. – volume: 4 start-page: 446 issue: 2 year: 2017 end-page: 460 ident: C11 article-title: Distributed and adaptive medium access control for internet-of-things-enabled mobile networks publication-title: IEEE Internet Things J. – volume: 4 start-page: 1250 issue: 5 year: 2017 end-page: 1258 ident: C4 article-title: A survey on security and privacy issues in Internet-of-Things publication-title: IEEE Internet Things J. – start-page: 1 year: 2017 end-page: 13 ident: C20 article-title: Secure and reliable communication scheme for MANET using ECMS cluster head-based certificate revocation publication-title: Cluster Comput. – volume: 105 start-page: 105 year: 2018 end-page: 122 ident: C9 article-title: Data collection for attack detection and security measurement in mobile adhoc networks: a survey publication-title: J. Netw. Comput. Appl. – volume: 30 start-page: 291 year: 2018 end-page: 319 ident: C2 article-title: A survey on Internet of Things architectures publication-title: J. King Saud Univ.-Comput. Inf. Sci. – volume: 18 start-page: 42 issue: 1 year: 2019 end-page: 55 ident: C27 article-title: An evolutionary self-cooperative trust scheme against routing disruptions in MANETs publication-title: IEEE Trans. Mob. Comput. – volume: 4 start-page: 62 issue: 1 year: 2017 end-page: 69 ident: C13 article-title: Modelling and simulation challenges in internet of things publication-title: IEEE Cloud Comput. – volume: 23 start-page: 79 issue: 1 year: 2017 end-page: 87 ident: C17 article-title: Privacy preservation and protection for cluster based geographic routing protocol in MANET publication-title: Wirel. Netw. – volume: 12 start-page: 1406 issue: 12 year: 2018 end-page: 1415 ident: C35 article-title: M-Lion Whale: multi-objective optimization model for secure routing in mobile ad-hoc network publication-title: IET Commun. – start-page: 1 year: 2018 end-page: 9 ident: C28 article-title: A curve based cryptography for wireless security in MANET publication-title: Cluster Comput. – volume: 19 start-page: 107 issue: 2 year: 2018 end-page: 127 ident: C10 article-title: Networking for IoT and applications using existing communication technology publication-title: Egypt. Inform. J. – volume: 23 start-page: 2227 issue: 7 year: 2017 end-page: 2237 ident: C18 article-title: Refined trust energy- on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET publication-title: Wirel. Netw. – volume: 100 start-page: 923 issue: 3 year: 2018 end-page: 940 ident: C25 article-title: Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer publication-title: Wirel. Pers. Commun. – start-page: 1 year: 2018 end-page: 8 ident: C21 article-title: A secure and efficient cluster based location aware routing protocol in MANET publication-title: Cluster Comput. – volume: 5 start-page: 586 issue: 4 year: 2017 end-page: 602 ident: C5 article-title: A comprehensive study of security of internet-of-things publication-title: IEEE Trans. Emerg. Top. Comput. – volume: 97 start-page: 4385 issue: 3 year: 2017 end-page: 4412 ident: C24 article-title: Generalized trust model for cooperative routing in MANETs publication-title: Wirel. Pers. Commun. – volume: 17 start-page: 2347 issue: 4 year: 2015 end-page: 2376 ident: C1 article-title: Internet of things: a survey on enabling technologies, protocols, and applications publication-title: IEEE Commun. Surv. Tutor. – volume: 14 start-page: 114 issue: 9 year: 2017 end-page: 126 ident: C19 article-title: Light weight cryptographic address generation (LW-CGA) using system state entropy gathering for IPv6 based MANETs publication-title: China Commun. – volume: 101 start-page: 1581 issue: 3 year: 2018 end-page: 1618 ident: C30 article-title: A dummy packet-based hybrid security framework for mitigating routing misbehavior in multi-hop wireless networks publication-title: Wirel. Pers. Commun. – volume: 12 start-page: 1406 issue: 12 year: 2018 end-page: 1415 article-title: M‐Lion Whale: multi‐objective optimization model for secure routing in mobile ad‐hoc network publication-title: IET Commun. – volume: 18 start-page: 42 issue: 1 year: 2019 end-page: 55 article-title: An evolutionary self‐cooperative trust scheme against routing disruptions in MANETs publication-title: IEEE Trans. Mob. Comput. – volume: 101 start-page: 791 issue: 7 year: 2018 end-page: 818 article-title: A fuzzy security protocol for trust management in the internet of things (fuzzy‐IoT) publication-title: Computing – start-page: 419 year: 2017 end-page: 436 – volume: 101 start-page: 1581 issue: 3 year: 2018 end-page: 1618 article-title: A dummy packet‐based hybrid security framework for mitigating routing misbehavior in multi‐hop wireless networks publication-title: Wirel. Pers. Commun. – volume: 16 start-page: 2174 issue: 8 year: 2017 end-page: 2183 article-title: Contradiction based gray‐hole attack minimization for ad‐hoc networks publication-title: IEEE Trans. Mob. Comput. – volume: 97 start-page: 4385 issue: 3 year: 2017 end-page: 4412 article-title: Generalized trust model for cooperative routing in MANETs publication-title: Wirel. Pers. Commun. – start-page: 1 year: 2018 end-page: 9 article-title: A curve based cryptography for wireless security in MANET publication-title: Cluster Comput. – start-page: 1 year: 2017 end-page: 13 article-title: Secure and reliable communication scheme for MANET using ECMS cluster head‐based certificate revocation publication-title: Cluster Comput. – volume: 17 start-page: 2347 issue: 4 year: 2015 end-page: 2376 article-title: Internet of things: a survey on enabling technologies, protocols, and applications publication-title: IEEE Commun. Surv. Tutor. – volume: 4 start-page: 1250 issue: 5 year: 2017 end-page: 1258 article-title: A survey on security and privacy issues in Internet‐of‐Things publication-title: IEEE Internet Things J. – volume: 23 start-page: 79 issue: 1 year: 2017 end-page: 87 article-title: Privacy preservation and protection for cluster based geographic routing protocol in MANET publication-title: Wirel. Netw. – volume: 14 start-page: 114 issue: 9 year: 2017 end-page: 126 article-title: Light weight cryptographic address generation (LW‐CGA) using system state entropy gathering for IPv6 based MANETs publication-title: China Commun. – year: 2018 article-title: A novel light‐weight subjective trust inference framework in MANETs publication-title: IEEE Trans. Sustain. Comput. – year: 2016 – year: 2018 – volume: 96 start-page: 1753 issue: 2 year: 2017 end-page: 1769 article-title: An intelligent secured and energy efficient routing algorithm for MANETs publication-title: Wirel. Pers. Commun. – volume: 4 start-page: 62 issue: 1 year: 2017 end-page: 69 article-title: Modelling and simulation challenges in internet of things publication-title: IEEE Cloud Comput. – start-page: 347 year: 2018 end-page: 355 – volume: 34 start-page: 133 issue: 2 year: 2017 end-page: 141 article-title: An IoT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks publication-title: J. Inf. Secur. Appl. – volume: 23 start-page: 2227 issue: 7 year: 2017 end-page: 2237 article-title: Refined trust energy‐ad hoc on demand distance vector (ReTE‐AODV) routing algorithm for secured routing in MANET publication-title: Wirel. Netw. – start-page: 1 year: 2018 end-page: 8 article-title: A secure and efficient cluster based location aware routing protocol in MANET publication-title: Cluster Comput. – start-page: 81 year: 2017 end-page: 92 – volume: 19 start-page: 107 issue: 2 year: 2018 end-page: 127 article-title: Networking for IoT and applications using existing communication technology publication-title: Egypt. Inform. J. – start-page: 135 year: 2018 end-page: 151 – volume: 30 start-page: 291 year: 2018 end-page: 319 article-title: A survey on Internet of Things architectures publication-title: J. King Saud Univ.‐Comput. Inf. Sci. – volume: 4 start-page: 1125 issue: 5 year: 2017 end-page: 1142 article-title: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications publication-title: IEEE Internet Things J. – volume: 100 start-page: 923 issue: 3 year: 2018 end-page: 940 article-title: Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer publication-title: Wirel. Pers. Commun. – volume: 5 start-page: 586 issue: 4 year: 2017 end-page: 602 article-title: A comprehensive study of security of internet‐of‐things publication-title: IEEE Trans. Emerg. Top. Comput. – volume: 105 start-page: 105 year: 2018 end-page: 122 article-title: Data collection for attack detection and security measurement in mobile adhoc networks: a survey publication-title: J. Netw. Comput. Appl. – volume: 4 start-page: 446 issue: 2 year: 2017 end-page: 460 article-title: Distributed and adaptive medium access control for internet‐of‐things‐enabled mobile networks publication-title: IEEE Internet Things J. – year: 2017 – start-page: 175 year: 2018 end-page: 786 – start-page: 1 year: 2018 end-page: 9 article-title: Fuzzy enhanced secure multicast routing for improving authentication in MANET publication-title: Cluster Comput. – volume: 6 start-page: 20085 year: 2018 end-page: 20103 article-title: Sensitivity analysis of an attack‐pattern discovery based trusted routing scheme for mobile ad‐hoc networks in industrial IoT publication-title: IEEE Access – start-page: 535 year: 2016 end-page: 546  | 
    
| SSID | ssj0055644 | 
    
| Score | 2.2036843 | 
    
| Snippet | Integration of mobile ad hoc networks (MANETs) and internet of things (IoT) becomes an emerging paradigm to enable opportunistic communication in IoT. However,... | 
    
| SourceID | wiley iet  | 
    
| SourceType | Publisher | 
    
| StartPage | 3207 | 
    
| SubjectTerms | attack detection ability attack pattern analysis cryptography data integrity data security dual state Markov chain model dual XOR‐Rivest Cipher6 Encryption DXOR‐RC6 with FE algorithm E2‐SR elliptic curve verification algorithm energy conservation energy‐efficient secure routing scheme fuzzy evaluation hash chain based certificate authentication HCCA scheme Internet of Things IoT devices IoT environment MANET‐IoT network Markov processes mobile ad hoc networks ns‐3.26 environment opportunistic communication packet delivery ratio particle swarm optimisation pattern discovery method public key cryptography Research Article residual energy routing overhead Secure Dual Head Clustering secure verification security enhancement sensitivity analysis telecommunication network routing telecommunication power management telecommunication security TRS‐PD method trusted routing scheme WC‐PSO algorithm worst case particle swarm optimisation  | 
    
| SummonAdditionalLinks | – databaseName: Wiley Online Library Open Access dbid: 24P link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZKWWBAPEV5yQNis0jiOLHZStUKkFpVkErdIju5SJUgQX0w8xP4jfwSzk5bgRAL68n2cOe7-2yfvyPkknsZFBALJjRkLMyKjEmuc-YBGOOB4LGwn5P7g-huFD6MxbhBOqu_MDU_xPrCzXqGi9fWwbWpu5AgqEUjTmDObMEHZjBLOcnVBtn0Ec_YbR6Ew1U4FiJyHV0xTfoM4btcP22q619LYIJB2U-c6hJNb5fsLBEibdcm3SMNKPfJ9jfewAMy7Aaf7x9PjzdU07J6g2cK7gsfCsFRQmAmoTN7kw50Wi1sZTPFUyy8AJ1XdEnNQPvtQTfBKfdVckiSXjfp3LFlawQ2kUqwWEdRXijMJTLOCoUAOQhkgYrNfc1BKt8EmnuFjBFc5XmeWWIvXdijHxiViZwfkWZZlXBMqM5wrQJdWUYRBk1jJFrV840PJoxF6LfIFaokXe7sWeoerUOVWiHqLrW6swSjqkW401r6WtNk_D0y7fRHwW0P0UMkTv4165RsWbkrK-FnpDmfLuAcwcHcXDjjfwFeGrT3 priority: 102 providerName: Wiley-Blackwell  | 
    
| Title | E2-SR: a novel energy-efficient secure routing scheme to protect MANET-IoT | 
    
| URI | http://digital-library.theiet.org/content/journals/10.1049/iet-com.2019.0039 https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-com.2019.0039  | 
    
| Volume | 13 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVBHI databaseName: IET Digital Library Open Access customDbUrl: eissn: 1751-8636 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0055644 issn: 1751-8628 databaseCode: IDLOA dateStart: 20130104 isFulltext: true titleUrlDefault: https://digital-library.theiet.org/content/collections providerName: Institution of Engineering and Technology – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1751-8636 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0055644 issn: 1751-8628 databaseCode: 24P dateStart: 20130101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwEA9ue9EH8RPnx8iD-BbWNk2b-jbnxjbcEO1gbyVJrzLQVebm3--l7fwABd9KCAf9heR-l9z9jpBL7hjIIBRMKDDMN5lhkquUOQBaOyB4KGxx8ngSDKb-aCZmX-XR6fzJ9spgmxs3e1sOZeWBTd3Gc7hdYVw2JEF-28YJzGZ-oCuz2pM8qpGGh9G5VyeN4e2dDbHKk1mIoGjuih7TZcjk5ecr5y9G0Nfg2E_KWvic_h7Zrcgi7ZSru0-2YHFAdr5JCB6SUc9jjw_XVNFF_g7PFIpaPgaFMgT-CH2zF-pAl_naJjhTDGbhBegqp5VCAx13Jr2YDfP4iMT9XtwdsKo_ApvLSLBQBUGaRehQZGiyCFmy58kM0U1dxUFGrvYUdzIZIsNK09RYdS-V2fgPdGREyo9JfZEv4IRQZdBWhvtZBgGenFpLXFrH1S5oPxS-2yRXCEaygT4pXq79KLGDiFpiUbMqo1GT8AKv5LXUyvh7ZtIdT72bPlKIQJz-1_wZ2bbfRToJPyf11XINF0gKVrpFap5_36pW_APPebJg | 
    
| linkProvider | Institution of Engineering and Technology | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagDMCAeIry9IDYLJI4dmw2Hq1aIFUFQWKL4uQiVYIGtYWZn8Bv5JdwdloEQiysJ9vD2ef77nz3mZAj7uVQQiSYyCBnYV7mTPGsYB6AMR4IHgnbnBz3ZOc-vHoQD3PkctYLU_NDfCXcrGW4-9oauE1I1wFnaEkyBzBhtuIDXZjlnOR6niyE0pc2BAvC_uw-FkK6L13RT_oM8bv6etvUJ7-WQA-Dsp9A1Xma9ipZmUJEelbv6RqZg-E6Wf5GHLhB-q3g4-397vaUZnRYvcIjBdfDh0JwnBDoSujYptKBjqoXW9pMMYyFJ6CTik65GWh81mslOKVbJZskabeSiw6b_o3ABkoLFmVSFqVGZ6KivNSIkINAlajZws84KO2bIONeqSJEV0VR5JbZKytt7AdG56LgW6QxrIawTWiW41ol2rKSEm9NYxRuq-cbH0wYidBvkmNUSTo92uPUvVqHOrVC1F1qdWcZRnWTcKe19Lnmyfh7ZHoR3wfnbYQPUuz8a9YhWewk8U160-1d75IlO8bVmPA90piMXmAfkcLEHLiD8Ak3trhj | 
    
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA5aQfQgPrE-cxBvwd3NZjfxVmuLVVuKruBt2exOoKDd0odnf4K_0V_iJF1FES9ehySHSSbfN0nmCyEn3MvBQCyYyCBnYW5yJnlWMA9Aaw8Ej4UtTu72oquH8PpRPC6Qy89amLk-xNeBm40Mt1_bAIdRYeYJZ2hFMgcwZfbFB0KY1ZzkapEshQIR0eo7h_3P_ViIyH3pijjpM-Tv8utuU539GgIRBm0_iapDmvY6WasoIm3M53SDLMBwk6x-Ew7cIv1W8P76dn93TjM6LF_giYKr4UMjOE0IhBI6sUfpQMflzD5tppjGwjPQaUkrbQbabfRaCXbplMk2SdqtpHnFqr8R2EAqweIsigqjEExknBuFDDkIpEHPFn7GQSpfBxn3jIyRXRVFkVtlr8zY3A-0ykXBd0htWA5hl9Asx7EMxrKMItw1tZY4rZ6vfdBhLEK_Tk7RJWm1tCepu7UOVWqN6LvU-s4qjKo64c5r6Wiuk_F3y7TZfQgu2kgfIrH3r17HZLl_2U5vO72bfbJim7gnJvyA1KbjGRwiUZjqI7cOPgBLjLfy | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=E2-SR%3A+a+novel+energy-efficient+secure+routing+scheme+to+protect+MANET-IoT&rft.jtitle=IET+communications&rft.au=Ponguwala%2C+Maitreyi&rft.au=Rao%2C+Sreenivasa&rft.date=2019-12-03&rft.pub=The+Institution+of+Engineering+and+Technology&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=13&rft.issue=19&rft.spage=3207&rft.epage=3216&rft_id=info:doi/10.1049%2Fiet-com.2019.0039&rft.externalDocID=10_1049_iet_com_2019_0039 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon |