Data Security-Based Routing in MANETs Using Key Management Mechanism

被引:0
作者
Hande J.Y. [1 ]
Sadiwala R. [1 ]
机构
[1] Department of Electronics and Communication Engineering, RKDF University Bhopal, Madhya Pradesh, Bhopal
关键词
Cryptosystems; Key management; Mobility ad hoc networks; Routing; Security;
D O I
10.1007/s42979-023-02409-5
中图分类号
学科分类号
摘要
Multicast standalone networks are inclusive of wireless nodes that are portable and can operate without framework. Nodes in an MANET can communicate freely and dynamically with one another. Unfortunately, malicious nodes are vulnerable to serious security flaws that are challenging to counter with the current mechanisms in place today. Multiple secure routing methods were established as a consequence to increase MANET cybersecurity. An effective and protected route system based on team clue management is proposed in this study. Asymmetric key cryptography is employed, with two specialised nodes known as the distribution key and the calculator key. These are the two devices that keep track of the hidden clue production, corroboration, and distribution. While there is an outcome, no further calculations are required by the other nodes to create the private keys. In accordance with power use and acceptance, nodes are picked at different levels. Every vertex in the technique must produce and distribute its own secret clue, resulting in greater energy distribution. A safety violation should also happen if any vertex is hacked. When nodes besides the DK and CK are compromised, the security of the complete connection is not threatened. Extensive tests are carried out while taking into account the current and suggested methods. According to performance evaluations, the suggested procedure performs better than competing methods. © 2024, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [21] On the realization of VANET using named data networking: On improvement of VANET using NDN-based routing, caching, and security
    da Silva, Elidio Tomas
    Duarte Costa, Antonio Luis
    Henriques de Macedo, Joaquim Melo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (18)
  • [22] A Distributed Key Management Scheme based on Multi hop Clustering Algorithm for MANETs
    Hajami, Abdelmajid
    Oudidi, Kamal
    Elkoutbi, Mohammed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (02): : 39 - 49
  • [23] A Novel Fuzzy Based Bio-Key Management scheme for Medical Data Security
    Kalaivani, K.
    Sivakumar, R.
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2016, 11 (05) : 1509 - 1518
  • [24] Key Management Mechanism in ALTO/SDN based CDNi Architecture
    Li, Shi
    Doh, Inshil
    Chae, Kijoon
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 110 - 115
  • [25] On the Effects of Using Proactive Components on the Performance of Ant-based Routing Algorithms in MANETs
    Farhadpour, Zahra
    Soleimani, Atena
    ICECCO'12: 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION, 2012, : 19 - 23
  • [26] Polynomial and matrix based key management security scheme in wireless sensor networks
    Dinker, Aarti Gautam
    Sharma, Vidushi
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08) : 1563 - 1575
  • [27] Security Vulnerability and Robust Security Requirements using Key Management in Sensor Network
    Patel, Jaykumar Shantilal
    Chavda, Vijaykumar M.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 23 - 28
  • [28] RFID security authentication protocol based on key update mechanism
    Wei, Ruidong
    Jiang, Lei
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1395 - 1401
  • [29] Towards a fully self-organized identity-based key management system for MANETs
    da Silva, Eduardo
    Pessoa Albini, Luiz Carlos
    2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 717 - 723
  • [30] Security Improvement of Portable Key Management Using a Mobile Phone
    Kim, Jiye
    Lee, Donghoon
    Choi, Younsung
    Lee, Youngsook
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT IV, 2015, 9158 : 148 - 159