Data Security-Based Routing in MANETs Using Key Management Mechanism

被引:0
作者
Hande J.Y. [1 ]
Sadiwala R. [1 ]
机构
[1] Department of Electronics and Communication Engineering, RKDF University Bhopal, Madhya Pradesh, Bhopal
关键词
Cryptosystems; Key management; Mobility ad hoc networks; Routing; Security;
D O I
10.1007/s42979-023-02409-5
中图分类号
学科分类号
摘要
Multicast standalone networks are inclusive of wireless nodes that are portable and can operate without framework. Nodes in an MANET can communicate freely and dynamically with one another. Unfortunately, malicious nodes are vulnerable to serious security flaws that are challenging to counter with the current mechanisms in place today. Multiple secure routing methods were established as a consequence to increase MANET cybersecurity. An effective and protected route system based on team clue management is proposed in this study. Asymmetric key cryptography is employed, with two specialised nodes known as the distribution key and the calculator key. These are the two devices that keep track of the hidden clue production, corroboration, and distribution. While there is an outcome, no further calculations are required by the other nodes to create the private keys. In accordance with power use and acceptance, nodes are picked at different levels. Every vertex in the technique must produce and distribute its own secret clue, resulting in greater energy distribution. A safety violation should also happen if any vertex is hacked. When nodes besides the DK and CK are compromised, the security of the complete connection is not threatened. Extensive tests are carried out while taking into account the current and suggested methods. According to performance evaluations, the suggested procedure performs better than competing methods. © 2024, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
[31]   SECURITY AND PRIVACY FOR SMART GRID USING SCALABLE KEY MANAGEMENT [J].
Beevi, L. Sherin ;
Merlin, G. ;
MoganaPriya, G. .
2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, :4716-4721
[32]   Urgency-based packet scheduling and routing algorithms for delay-sensitive data over MANETs [J].
Wan Kim ;
Hyunchul Joo ;
Ki Jin An ;
Inkyu Lee ;
Hwangjun Song .
Wireless Networks, 2013, 19 :1595-1609
[33]   Performance and security assessment of a PKC based key management scheme for hierarchical sensor networks [J].
Naureen, Ayesha ;
Akram, Attiya ;
Maqsood, Tariq ;
Riaz, Rabia ;
Kim, Ki-Hyung ;
Ahmed, H. Farooq .
2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, :163-+
[34]   Cloud data transmission based on security and improved routing through hybrid machine learning techniques [J].
Qamar, Shamimul ;
Amaan, Mohd ;
Rahman, Mohammed Inamur ;
Aqeel, Ibrahim ;
Shuaib, Mohammed ;
Khormi, Ibrahim Mohsen ;
Alam, Shadab .
SOFT COMPUTING, 2023,
[35]   Urgency-based packet scheduling and routing algorithms for delay-sensitive data over MANETs [J].
Kim, Wan ;
Joo, Hyunchul ;
An, Ki Jin ;
Lee, Inkyu ;
Song, Hwangjun .
WIRELESS NETWORKS, 2013, 19 (07) :1595-1609
[36]   Enhancing data security in ad hoc networks based on multipath routing [J].
Othman, Jalel Ben ;
Mokdad, Lynda .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2010, 70 (03) :309-316
[37]   Secure energy efficient network priority routing protocol for effective data collection and key management in dynamic WSNs [J].
Anil G.L. ;
Mazher Iqbal J.L. .
International Journal of Information and Computer Security, 2021, 14 (01) :60-78
[38]   Public-Key Based Routing In Internet For Anonymous Data Communication [J].
Mirzaei, Reza ;
Farahani, Reza ;
Yazdani, Naser .
2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, :58-64
[39]   Wormhole Prevention using COTA Mechanism in Position Based Environment over MANETs [J].
Teotia, Vinesh ;
Dhurandher, Sanjay Kumar ;
Woungang, Isaac ;
Obaidat, Mohammad S. .
2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, :7036-7040
[40]   A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks [J].
Du, Xiaojiang ;
Guizani, Mohsen ;
Xiao, Yang ;
Chen, Hsiao-Hwa .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1223-1229