Data Security-Based Routing in MANETs Using Key Management Mechanism

被引:0
|
作者
Hande J.Y. [1 ]
Sadiwala R. [1 ]
机构
[1] Department of Electronics and Communication Engineering, RKDF University Bhopal, Madhya Pradesh, Bhopal
关键词
Cryptosystems; Key management; Mobility ad hoc networks; Routing; Security;
D O I
10.1007/s42979-023-02409-5
中图分类号
学科分类号
摘要
Multicast standalone networks are inclusive of wireless nodes that are portable and can operate without framework. Nodes in an MANET can communicate freely and dynamically with one another. Unfortunately, malicious nodes are vulnerable to serious security flaws that are challenging to counter with the current mechanisms in place today. Multiple secure routing methods were established as a consequence to increase MANET cybersecurity. An effective and protected route system based on team clue management is proposed in this study. Asymmetric key cryptography is employed, with two specialised nodes known as the distribution key and the calculator key. These are the two devices that keep track of the hidden clue production, corroboration, and distribution. While there is an outcome, no further calculations are required by the other nodes to create the private keys. In accordance with power use and acceptance, nodes are picked at different levels. Every vertex in the technique must produce and distribute its own secret clue, resulting in greater energy distribution. A safety violation should also happen if any vertex is hacked. When nodes besides the DK and CK are compromised, the security of the complete connection is not threatened. Extensive tests are carried out while taking into account the current and suggested methods. According to performance evaluations, the suggested procedure performs better than competing methods. © 2024, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [41] HAMSTER - Healthy, Mobility and Security-based Data Communication Architecture for Unmanned Aircraft Systems
    Pigatto, Daniel Fernando
    Roberto, Guilherme Freire
    Goncalves, Leandro
    Rodrigues Filho, Julio Fernando
    Roschildt Pinto, Alex Sandro
    Jaquie Castelo Branco, Kalinka Regina Lucas
    2014 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS (ICUAS), 2014, : 52 - 63
  • [42] Security-Based Safety Hazard Analysis Using FMEA: A DAM Case Study
    Inayat, Irum
    Farooq, Muhammad
    Inayat, Zubaria
    Abbas, Muhammad
    DATABASE AND EXPERT SYSTEMS APPLICATIONS - DEXA 2021 WORKSHOPS, 2021, 1479 : 18 - 30
  • [43] Security Enrichment with Trust Multipath Routing and Key Management Approach in WMN
    Loret, J. B. Shajilin
    Vijayalakshmi, K.
    IETE JOURNAL OF RESEARCH, 2018, 64 (05) : 709 - 721
  • [44] RETRACTION: Retraction Note: AI-enhanced security demand and routing management for MANETs with optical technologies
    Jia, Xuetao
    Huang, Donggui
    Qin, Na
    OPTICAL AND QUANTUM ELECTRONICS, 2024, 56 (09)
  • [45] Dynamic Key Generation Mechanism to Strengthen the Data Security
    Prasath, J. S.
    Jose, Deepa
    Rammyaa, B.
    Pandian, R.
    2021 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2021,
  • [47] An efficient identity-based secret key management scheme for MANETs
    Zhang, Yong
    Qian, Hai-Feng
    Journal of China Universities of Posts and Telecommunications, 2012, 19 (SUPPL. 1): : 127 - 136
  • [48] AUTHENTICATION AND DYNAMIC KEY MANAGEMENT PROTOCOL BASED ON CERTIFIED TOKENS FOR MANETS
    Ammayappan, Kavitha
    Sastry, V. N.
    Negi, Atul
    2009 GLOBAL MOBILE CONGRESS, 2009, : 28 - +
  • [49] Blockchain-based Data Security Management Mechanism for Power Terminals
    Huang, Zhicai
    Zhu, Huiqing
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 191 - 194
  • [50] Analog Based Routing Algorithm using Ant agents for MANETs (ABRAAM)
    Ramkumar, K. R.
    Ravichandran, C. S.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 3139 - 3151