Data Security-Based Routing in MANETs Using Key Management Mechanism

被引:0
|
作者
Hande J.Y. [1 ]
Sadiwala R. [1 ]
机构
[1] Department of Electronics and Communication Engineering, RKDF University Bhopal, Madhya Pradesh, Bhopal
关键词
Cryptosystems; Key management; Mobility ad hoc networks; Routing; Security;
D O I
10.1007/s42979-023-02409-5
中图分类号
学科分类号
摘要
Multicast standalone networks are inclusive of wireless nodes that are portable and can operate without framework. Nodes in an MANET can communicate freely and dynamically with one another. Unfortunately, malicious nodes are vulnerable to serious security flaws that are challenging to counter with the current mechanisms in place today. Multiple secure routing methods were established as a consequence to increase MANET cybersecurity. An effective and protected route system based on team clue management is proposed in this study. Asymmetric key cryptography is employed, with two specialised nodes known as the distribution key and the calculator key. These are the two devices that keep track of the hidden clue production, corroboration, and distribution. While there is an outcome, no further calculations are required by the other nodes to create the private keys. In accordance with power use and acceptance, nodes are picked at different levels. Every vertex in the technique must produce and distribute its own secret clue, resulting in greater energy distribution. A safety violation should also happen if any vertex is hacked. When nodes besides the DK and CK are compromised, the security of the complete connection is not threatened. Extensive tests are carried out while taking into account the current and suggested methods. According to performance evaluations, the suggested procedure performs better than competing methods. © 2024, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [1] Data Security-Based Routing in MANETs Using Key Management Mechanism
    Bondada, Praveen
    Samanta, Debabrata
    Kaur, Manjit
    Lee, Heung-No
    APPLIED SCIENCES-BASEL, 2022, 12 (03):
  • [2] A Mechanism-Based QoS and Security Requirements Consideration for MANETs QoS Routing
    Sedaghat, Shahrzad
    Adibniya, Fazlollah
    Derhami, Vali
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1123 - 1128
  • [3] Security-Based Circuit Breaker Maintenance Management
    Dehghanian, Payman
    Kezunovic, Mladen
    Gurrala, Gurunath
    Guan, Yufan
    2013 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PES), 2013,
  • [4] Secure Routing with an Integrated Localized Key Management Protocol in MANETs
    Talawar, Shrikant H.
    Maity, Soumyadev
    Hansdah, R. C.
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 605 - 612
  • [5] Data security in MANETs by integrating multipath routing and secret sharing
    Wu, Minghu
    Chen, Siguang
    Liao, Jiaping
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 1, 2010, : 72 - 75
  • [6] Improved Trust Based Routing Mechanism in DSR Routing Protocol in MANETs
    Sahu, Ankita
    Sejwar, Vikas
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (01): : 137 - 148
  • [7] An ID-based node key management scheme based on PTPM in MANETs
    Yang, Guang
    Liu, Jiqiang
    Han, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2816 - 2826
  • [8] Internet of Things Data Privacy and Security-Based on Blockchain Technology
    Raheem, Mohammed Talib
    Avci, Isa
    FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE AIOT ERA, VOL 2, FONES-AIOT 2024, 2024, 1036 : 52 - 63
  • [9] Emerging Issues in Cloud Storage Security: Encryption, Key Management, Data Redundancy, Trust Mechanism
    Tse, Daniel W. K.
    Chen, Danqing
    Liu, Qingshu
    Wang, Fan
    Wei, Zhaoyi
    MULTIDISCIPLINARY SOCIAL NETWORKS RESEARCH, MISNC 2014, 2014, 473 : 297 - 310
  • [10] Key Management for Outsourced Data Security
    PEI Bei
    CHEN Changsong
    WAN Changsheng
    Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 449 - 454