Data Security-Based Routing in MANETs Using Key Management Mechanism

被引:0
|
作者
Hande J.Y. [1 ]
Sadiwala R. [1 ]
机构
[1] Department of Electronics and Communication Engineering, RKDF University Bhopal, Madhya Pradesh, Bhopal
关键词
Cryptosystems; Key management; Mobility ad hoc networks; Routing; Security;
D O I
10.1007/s42979-023-02409-5
中图分类号
学科分类号
摘要
Multicast standalone networks are inclusive of wireless nodes that are portable and can operate without framework. Nodes in an MANET can communicate freely and dynamically with one another. Unfortunately, malicious nodes are vulnerable to serious security flaws that are challenging to counter with the current mechanisms in place today. Multiple secure routing methods were established as a consequence to increase MANET cybersecurity. An effective and protected route system based on team clue management is proposed in this study. Asymmetric key cryptography is employed, with two specialised nodes known as the distribution key and the calculator key. These are the two devices that keep track of the hidden clue production, corroboration, and distribution. While there is an outcome, no further calculations are required by the other nodes to create the private keys. In accordance with power use and acceptance, nodes are picked at different levels. Every vertex in the technique must produce and distribute its own secret clue, resulting in greater energy distribution. A safety violation should also happen if any vertex is hacked. When nodes besides the DK and CK are compromised, the security of the complete connection is not threatened. Extensive tests are carried out while taking into account the current and suggested methods. According to performance evaluations, the suggested procedure performs better than competing methods. © 2024, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [31] PSO-DQ: An Improved Routing Protocol Based on PSO using Dynamic Queue Mechanism for MANETs
    Kumari, Priyanka
    Sahana, Sudip Kumar
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2022, 38 (01) : 41 - 56
  • [32] An information security-based literature survey and classification framework of data storage in DNA
    Jain, Shipra
    Chaudhary, Himanshu
    Bhatnagar, Vishal
    International Journal of Networking and Virtual Organisations, 2013, 13 (02) : 176 - 201
  • [33] Data Security Management Based on the EFS File Encryption Mechanism
    Liu, Shu-dan
    Wang, Lin
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ENGINEERING (ACSE 2014), 2014, : 120 - 124
  • [34] Enabling security in MANETs using an efficient cluster based group key management with elliptical curve cryptography in consort with sail fish optimization algorithm
    Shanmuganathan, C.
    Boopalan, K.
    Elangovan, G.
    Sathish Kumar, P. J.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (03)
  • [35] Multipath Routing and MPTCP-Based Data Delivery Over Manets
    Zhang, Tongguang
    Zhao, Shuai
    Cheng, Bo
    IEEE ACCESS, 2020, 8 : 32652 - 32673
  • [36] Role of information security-based tourism management system in the intelligent recommendation of tourism resources
    Nan, Xiang
    Kanato, Kayo
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2021, 18 (06) : 7955 - 7964
  • [37] Security-based multi-objective congestion management for emission reduction in power system
    Salehizadeh, Mohammad Reza
    Rahimi-Kian, Ashkan
    Oloomi-Buygi, Majid
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2015, 65 : 124 - 135
  • [38] An InfiniBand-Based Mechanism to Enhance QoS in Multipath Routing Protocols in MANETs
    Zaghal, Raid
    Salah, Saeed
    Ismail, Mohammad
    2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [39] Study on the Improvement of the Governance Mechanism of Cyber Security-Based on the Precaution and Control of Internet Virus
    Dong Shuai
    Liu Zhi-yong
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (12TH) & INTERNATIONAL SYMPOSIUM ON WEST AFRICAN STUDIES (1ST), VOL II, 2017, : 289 - 294
  • [40] An ID-based node key management scheme based on PTPM in MANETs
    Yang, Guang
    Liu, Jiqiang
    Han, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2816 - 2826