Data Security-Based Routing in MANETs Using Key Management Mechanism

被引:0
作者
Hande J.Y. [1 ]
Sadiwala R. [1 ]
机构
[1] Department of Electronics and Communication Engineering, RKDF University Bhopal, Madhya Pradesh, Bhopal
关键词
Cryptosystems; Key management; Mobility ad hoc networks; Routing; Security;
D O I
10.1007/s42979-023-02409-5
中图分类号
学科分类号
摘要
Multicast standalone networks are inclusive of wireless nodes that are portable and can operate without framework. Nodes in an MANET can communicate freely and dynamically with one another. Unfortunately, malicious nodes are vulnerable to serious security flaws that are challenging to counter with the current mechanisms in place today. Multiple secure routing methods were established as a consequence to increase MANET cybersecurity. An effective and protected route system based on team clue management is proposed in this study. Asymmetric key cryptography is employed, with two specialised nodes known as the distribution key and the calculator key. These are the two devices that keep track of the hidden clue production, corroboration, and distribution. While there is an outcome, no further calculations are required by the other nodes to create the private keys. In accordance with power use and acceptance, nodes are picked at different levels. Every vertex in the technique must produce and distribute its own secret clue, resulting in greater energy distribution. A safety violation should also happen if any vertex is hacked. When nodes besides the DK and CK are compromised, the security of the complete connection is not threatened. Extensive tests are carried out while taking into account the current and suggested methods. According to performance evaluations, the suggested procedure performs better than competing methods. © 2024, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
[11]   Key Management for Outsourced Data Security [J].
PEI Bei ;
CHEN Changsong ;
WAN Changsheng .
Wuhan University Journal of Natural Sciences, 2014, 19 (05) :449-454
[12]   Data Security and Privacy using Data Partition and Centric key management in Cloud [J].
Patel, Krunal ;
Kumar, Sendhil K. S. ;
Singh, Navneet ;
Parikh, Kushang ;
Jaisankar, N. .
2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
[13]   A Physical Layer Security-based Routing Protocol in Mobile Ad-hoc Wireless Networks [J].
Shim, Kyusung ;
Tri Nhu Do ;
Beongku An .
2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, :417-422
[14]   A Council-based Distributed Key Management Scheme for MANETs [J].
Hajami, Abdelmajid ;
Elkoutbi, Mohammed .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2010, 1 (03) :29-38
[15]   PSO-DQ: An Improved Routing Protocol Based on PSO using Dynamic Queue Mechanism for MANETs [J].
Kumari, Priyanka ;
Sahana, Sudip Kumar .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2022, 38 (01) :41-56
[16]   An information security-based literature survey and classification framework of data storage in DNA [J].
Jain, Shipra ;
Chaudhary, Himanshu ;
Bhatnagar, Vishal .
International Journal of Networking and Virtual Organisations, 2013, 13 (02) :176-201
[17]   Data security in Ad hoc networks using multipath routing [J].
Bouam, S ;
Ben-Othman, J .
PIMRC 2003: 14TH IEEE 2003 INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS PROCEEDINGS, VOLS 1-3 2003, 2003, :1331-1335
[18]   Optimal and Secure Routing Protocol based on Key Management for IoT [J].
Othmen, Salwa ;
Khdhir, Radhia ;
Belghith, Aymen ;
Hamouid, Khaled .
2024 10TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES, CODIT 2024, 2024, :2955-2960
[19]   HAMSTER - Healthy, Mobility and Security-based Data Communication Architecture for Unmanned Aircraft Systems [J].
Pigatto, Daniel Fernando ;
Roberto, Guilherme Freire ;
Goncalves, Leandro ;
Rodrigues Filho, Julio Fernando ;
Roschildt Pinto, Alex Sandro ;
Jaquie Castelo Branco, Kalinka Regina Lucas .
2014 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS (ICUAS), 2014, :52-63
[20]   Dynamic Key Generation Mechanism to Strengthen the Data Security [J].
Prasath, J. S. ;
Jose, Deepa ;
Rammyaa, B. ;
Pandian, R. .
2021 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2021,