{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:26:24Z","timestamp":1767007584021,"version":"build-2065373602"},"reference-count":30,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T00:00:00Z","timestamp":1497657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV\u2019s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.<\/jats:p>","DOI":"10.3390\/s17061421","type":"journal-article","created":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T10:29:26Z","timestamp":1497868166000},"page":"1421","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET"],"prefix":"10.3390","volume":"17","author":[{"given":"Weidong","family":"Fang","sequence":"first","affiliation":[{"name":"Key Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Micro-system and Information Technology, Chinese Academy of Sciences, Shanghai 201800, China"},{"name":"Shanghai Research Center for Wireless Communication, Shanghai 201210, China"}]},{"given":"Wuxiong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Micro-system and Information Technology, Chinese Academy of Sciences, Shanghai 201800, China"},{"name":"Shanghai Research Center for Wireless Communication, Shanghai 201210, China"}]},{"given":"Jinchao","family":"Xiao","sequence":"additional","affiliation":[{"name":"Guangzhou Shenyang Institute of Automation, Chinese Academy of Sciences, Guangzhou 511458, China"}]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Micro-system and Information Technology, Chinese Academy of Sciences, Shanghai 201800, China"},{"name":"Shanghai Research Center for Wireless Communication, Shanghai 201210, China"}]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221116, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,6,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/s11036-016-0683-y","article-title":"Complex IoT Control System Modeling from Perspectives of Environment Perception and Information Security","volume":"21","author":"Ahmed","year":"2016","journal-title":"Mob. Netw. Appl."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2211","DOI":"10.1109\/TPDS.2013.161","article-title":"A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks","volume":"25","author":"Zhang","year":"2014","journal-title":"IEEE Trans. Parallel Distrib."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"040305","DOI":"10.1007\/s11432-016-9028-0","article-title":"A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution","volume":"60","author":"Fang","year":"2017","journal-title":"Sci. China Inf. Sci."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s11036-015-0642-z","article-title":"Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks","volume":"21","author":"Raja","year":"2016","journal-title":"Mob. Netw. Appl."},{"key":"ref_5","first-page":"905","article-title":"A Low Complexity Secure Network Coding in Wireless Sensor Network","volume":"17","author":"Fang","year":"2016","journal-title":"J. Internet Technol."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., and Royer, E.M. (1999, January 25\u201326). Ad-Hoc On-Demand Distance Vector Routing. Proceedings of the 2nd Workshop on Mobile Computing Systems and Applications (WMCSA), Washington, DC, USA.","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ranjan, R., Singh, N.K., and Singh, A. (2015, January 15\u201316). Security Issues of Black Hole Attacks in MANET. Proceedings of the 2015 International Conference on Computing, Communication & Automation (ICCCA), Greater Noida, India.","DOI":"10.1109\/CCAA.2015.7148419"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.procs.2015.03.109","article-title":"Implementing and improving the performance of AODV by receive reply method and securing it from Black hole attack","volume":"45","author":"Choudhurya","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Choudhary, N., and Tharani, L. (2015, January 2\u20133). Preventing Black Hole Attack in AODV Using Timer-Based Detection Scheme. Proceedings of the 2015 International Conference on Signal Processing and Communication Engineering Systems (SPACES), Guntur, India.","DOI":"10.1109\/SPACES.2015.7058198"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bhandare, A.S., and Patil, S.B. (2015, January 26\u201327). Securing MANET Against Co-Operative Black Hole Attack and Its Performance Analysis\u2014A Case Study. Proceedings of the 2015 International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India.","DOI":"10.1109\/ICCUBEA.2015.63"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Siddiqua, A., Sridevi, K., and Mohammed, A.A.K. (2015, January 2\u20133). Preventing Black Hole Attacks in MANET Using Secure Knowledge Algorithm. Proceedings of the 2015 International Conference on Signal Processing and Communication Engineering Systems (SPACES), Guntur, India.","DOI":"10.1109\/SPACES.2015.7058298"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Jain, A.K., and Tokekar, V. (2015, January 8\u201310). Mitigating the Effects of BLACK Hole Attacks on AODV Routing Protocol in Mobile Ad-Hoc Networks. Proceedings of the 2015 International Conference on Pervasive Computing (ICPC), Pune, India.","DOI":"10.1109\/PERVASIVE.2015.7087174"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Hazra, S., and Setua, S.K. (2012, January 29\u201331). Sybil Attack Defending Trusted AODV in Ad-Hoc Network. Proceedings of the 2012 2nd International Conference on Computer Science and Network Technology (ICCSNT), Changchun, China.","DOI":"10.1109\/ICCSNT.2012.6526018"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kasiran, Z., and Mohamad, J. (2014, January 6\u20138). Throughput Performance Analysis of the Wormhole and Sybil Attack in AODV. Proceedings of the 2014 Fourth International Conference on Digital Information and Communication Technology and It\u2019s Applications (DICTAP), Bangkok, Thailand.","DOI":"10.1109\/DICTAP.2014.6821661"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Patel, A., Patel, N., and Patel, R. (2015, January 4\u20136). Defending Against Wormhole Attack in MANET. Proceedings of the IEEE 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India.","DOI":"10.1109\/CSNT.2015.253"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ehsan, H., and Khan, F.A. (2012, January 25\u201327). Malicious AODV: Implementation and Analysis of Routing Attacks in MANET. Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK.","DOI":"10.1109\/TrustCom.2012.199"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Harwahyu, R., Simaremare, H., Sari, R.F., and Lorenz, P. (2014, January 3\u20135). Performance Estimation of AODV Variant with Trust Scheme. Proceedings of the 2014 International Conference on Communications (ICC), Melmaruvathur, India.","DOI":"10.1109\/ICC.2014.6883375"},{"key":"ref_18","unstructured":"Chaubey, N., Aggarwal, A., Gandhi, S., and Jani, K.A. (2015, January 11\u201313). Effect of Pause Time on AODV and TSDRP Routing Protocols under Black Hole Attack and DoS Attacks in MANET. Proceedings of the 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Su, M.Y., and Yang, C.W. (2015, January 20\u201324). A Resilient Routing Approach for Mobile Ad Hoc Networks. Proceedings of the 2015 International Conference on High Performance Computing & Simulation (HPCS), Amsterdam, The Netherlands.","DOI":"10.1109\/HPCSim.2015.7237102"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.aasri.2013.10.054","article-title":"Research of AODV Routing Protocol for Ad Hoc Networks1","volume":"5","author":"Liu","year":"2013","journal-title":"AASRI Procedia"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Hanji, B.R., and Shettar, R. (2015, January 8\u201310). Improved AODV with Restricted Route Discovery Area. Proceedings of the 2015 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India.","DOI":"10.1109\/ICCCI.2015.7218065"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"8303","DOI":"10.3390\/s130708303","article-title":"Energy Consumption and Control Response Evaluations of AODV Routing in WSANs for Building-Temperature Control","volume":"13","author":"Apidet","year":"2013","journal-title":"Sensors"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"22811","DOI":"10.3390\/s141222811","article-title":"On the MAC\/Network\/Energy Performance Evaluation of Wireless Sensor Networks: Contrasting MPH, AODV, DSR and ZTR Routing Protocols","volume":"14","author":"Carolina","year":"2014","journal-title":"Sensors"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Bala, R., and Krishna, C.R. (2015, January 13\u201314). Scenario Based Performance Analysis of AODV and GPSR Routing Protocols in a VANET. Proceedings of the 2015 IEEE International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India.","DOI":"10.1109\/CICT.2015.54"},{"key":"ref_25","unstructured":"Hamidian, A. (2003). A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS2. [Master\u2019s Thesis, Lund Institute of Technology]."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Wantoro, J., and Mustika, I.W. (2014, January 4\u20135). M-AODV+: An Extension of AODV+ Routing Protocol for Supporting Vehicle-to-Vehicle Communication in Vehicular Ad Hoc Networks. Proceedings of the 2014 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), DKI Jakarta, Indonesia.","DOI":"10.1109\/COMNETSAT.2014.7050523"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Arya, V., and Gandhi, C. (2014, January 7\u20139). NDj\u2014AODV: Node Disjoint Multipath Routing in Mobile Ad Hoc Networks based on AODV Protocol. Proceedings of the 2014 Seventh International Conference on Contemporary Computing (IC3), Noida, India.","DOI":"10.1109\/IC3.2014.6897241"},{"key":"ref_28","unstructured":"Sharma, L., and Dimri, P. (2015, January 11\u201313). An improved AODV with QoS support in mobile ad-hoc network. Proceedings of the 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India."},{"key":"ref_29","unstructured":"Zapata, M.G. (2006, September 07). Secure Ad Hoc On-Demand Distance Vector (SAODV) Routing. Available online: http:\/\/ietfreport.isoc.org\/idref\/draft-guerrero-manet-saodv\/."},{"key":"ref_30","first-page":"753","article-title":"A Multi-Parameter Joint Evaluation Scheme in Energy Consumption for Wireless Sensor Networks","volume":"34","author":"Fang","year":"2015","journal-title":"Chin. High Technol. Lett."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/6\/1421\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:39:30Z","timestamp":1760207970000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/6\/1421"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,17]]},"references-count":30,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2017,6]]}},"alternative-id":["s17061421"],"URL":"https:\/\/doi.org\/10.3390\/s17061421","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2017,6,17]]}}}