A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in MANET

Authors

  • Anubhuti Roda MOHINDRA Department of Computer Science, Jaypee Institute of Information Technology, Noida, India
  • Charu GANDHI Department of Computer Science, Jaypee Institute of Information Technology, Noida, India

DOI:

https://doi.org/10.48048/wjst.2021.8987

Keywords:

Confidentiality, Elliptic Curve Cryptography (ECC), Message authentication, Mobile Adhoc Network (MANET), Secure Cryptography based Clustering Mechanism (SCCM), Schnorr’s signature generation mechanism

Abstract

Providing security to the Mobile Ad-hoc Network (MANET) is one of the demanding and critical tasks in recent days, due to its dynamic nature. For this reason, the various routing protocols and security mechanisms are developed for the traditional networks. Nonetheless, it still lacks the limitation of increased computational complexity, inefficient security, reduced throughput, and increased delay. To solve these problems, this paper developed a new system, namely, Secure Cryptography based Clustering Mechanism (SCCM) for MANET. It comprised the following stages: secure routing, encryption, signature generation, signature verification, and decryption. After forming the network, the connection between the mobile nodes was formed. After that, the secured routing was created between the source and destination by implementing the AOMDV routing protocol. Then, the original packet was converted into an unknown format by employing an Elliptic Curve Cryptography (ECC) encryption mechanism. Consequently, the signature for the encrypted packet was generated and forwarded to the destination via the Region Head (RH) and other gateway nodes. When the destination node received the packet, it performed the signature verification process for verifying whether the packet is valid or invalid.  If it were valid, the receiver would accept the data and decrypt it by using the ECC decryption mechanism; otherwise, it would reject the packet and report to the base station. The simulation results evaluated the performance of the proposed security mechanism by using various measures and compared it with other techniques for proving the superiority.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

JG Ponsam and R Srinivasan. A survey on MANET security challenges, attacks and its countermeasures. Int. J. Emerg. Trends Tech. Comput. Sci. 2014; 3, 274-9.

MM Alani. MANET security: A survey. In: Proceedings of 2014 IEEE International Conference on Control System, Computing and Engineering, Batu Ferringhi, Malaysia. 2014, p. 559-64.

K Dhanalakshmi, B Kannapiran and A Divya. Enhancing manet security using hybrid techniques in key generation mechanism. In: Proceedings of 2014 International Conference on Electronics and Communication Systems, Coimbatore, India. 2014, p. 1-5.

R Mohandas and K Krishnamoorthi. MANET security betterment by enhanced multiple key management scheme. Wireless Pers. Comm. 2017; 94, 2173-88.

SD Mohanty, V Thotakura and M Ramkumar. An efficient trusted computing base for MANET security. J. Inform. Secur. 2014; 5, 192.

T Alam. Middleware implementation in cloud-MANET mobility model for internet of smart devices. Int. J. Comput. Sci. Netw. Secur. 2017; 17, 86-94.

P Nikam and V Raut. Improoved MANET security using Elliptic curve cryptography and EAACK. In: Proceedings of 2015 International Conference on Computational Intelligence and Communication Networks, Jabalur, India. 2015, p. 1125-9.

D Dawoud, L Richard, S Ashraph, S Kasmir and V Raja. Trust establishment in mobile ad hoc networks: Key management. Mobile Ad Hoc Networks: Application. In: X wang (Ed.). In Tech, Shanghai, 2011, 153-93.

R Agrawal and S Sahu. Secured routing over manet using Enhanced Secured Routing (ESR). In: Proceedings of 2013 International Conference on Control, Computing, Communication and Materials, Allahabad, India. 2013, p. 1-6.

RS Shaktawat, D Singh and N Choudhary. An efficient secure routing protocol in MANET Security-Enhanced AODV (SE-AODV). Int. J. Comput. Appl. 2014; 97, 34-41.

MK Nazir, RU Rehman and A Nazir. A novel review on security and routing protocols in MANET. Comm. Netw. 2016; 8, 205-18.

R Singh, P Singh and M Duhan. An effective implementation of security based algorithmic approach in mobile adhoc networks. Hum. Cent. Comput. Inform. Sci. 2014; 4, 7.

N Shukla, S Gupta and A Virmani. Mobile Ad-Hoc Network (MANET): Security issues regarding attacks. Int. J. Comput. Appl. 2013; 975, 8887.

MK Rafsanjani and H Fatemidokht. FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs. AEU Int. J. Electron. Comm. 2015; 69, 1613-21.

A Chavan, D Kurule and P Dere. Performance analysis of AODV and DSDV routing protocol in MANET and modifications in AODV against black hole attack. Proc. Comput. Sci. 2016; 79, 835-44.

JM Chang, PC Tsou, I Woungang, HC Chao and CF Lai. Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Syst. J. 2014; 9, 65-75.

S Vhora, R Patel and N Patel. Rank Base Data Routing (RBDR) scheme using AOMDV: A proposed scheme for packet drop attack detection and prevention in MANET. In: Proceedings of 2015 IEEE International Conference on Electrical, Computer and Communication Technologies, Coimbatone, India. 2015, p. 1-5.

M Cai, L Rui, D Liu, H Huang and X Qiu. Group mobility based clustering algorithm for mobile ad hoc networks. In: Proceedings of 2015 17th Asia-Pacific Network Operations and Management Symposium, Busan, South Korea. 2015, p. 340-3.

A Loutfi, M Elkoutbi, JB Othman and A Kobbane. An energy aware algorithm for OLSR clustering. Ann. Telecomm. 2014; 69, 201-7.

M Saxena, N Phate, K Mathai and M Rizvi. Clustering based energy efficient algorithm using max-heap tree for MANET. In: Proceedings of the 4th International Conference on Communication Systems and Network Technologies, Bhopal, India. 2014, p. 123-7.

MM Morshed and MR Islam. CBSRP: Cluster based secure routing protocol. In: Proceedings of the 3rd IEEE International Advance Computing Conference, Ghaziabad, India. 2013, p. 571-6.

RH Jhaveri. MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In: Proceedings of the 3rd International Conference on Advanced Computing and Communication Technologies, Rohtak, India. 2013, p. 254-60.

M Singh and G Singh. A secure and efficient cluster head selection algorithm for MANET. J. Netw. Comm. Emerg. Tech. 2015; 2, 49-53.

SB Kulkarni and BN Yuvaraju. Challenges and Issues of Cluster Based Security in MANET. IOSR J. Comput. Eng. 2016; 18, 1-5.

I Kaur and A Rao. A framework to improve the network security with less mobility in MANET. Int. J. Comput. Appl. 2017; 167, 10-24.

T Panke. Clustering based certificate revocation scheme for malicious nodes in MANET. Int. J. Sci. Res. Publ. 2013; 3, 1-5.

K Prasanth and P Sivakumar. Energy efficient improvement geocast forwarding in manet based on a clustered structure. J. Eng. Sci. Tech. 2015; 10, 1224-38.

G Hahn, T Kwon, S Kim and J Song. Cluster-based certificate chain for mobile ad hoc networks. In: Proceedings of the 2006 Computational Science and Its Applications. Springer, Berlin, 2006, p. 769-78.

PR Satav, PM Jawandhiya and VM Thakare. Secure route selection mechanism in the presence of black hole attack with AOMDV routing algorithmin. In: Proceedings of 4th International Conference on Computing Communication Control and Automation, Pune, India. 2018, p. 1-6.

AO Alkhamisi and SM Buhari. Trusted secure adhoc on-demand multipath distance vector routing in MANET. In: Proceedings of the IEEE 30th International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland. 2016, p. 212-9.

AM Makhlouf and M Guizani. SE-AOMDV: Secure and efficient AOMDV routing protocol for vehicular communications. Int. J. Inform. Secur. 2019; 18, 665-76.

AR Mohindra and C Gandhi. An energy-efficient clustering approach for collaborative data forwarding in heterogeneous MANET. Int. J. Comm. Syst. 2017; 30, e3366.

MN Ahmed, AH Abdullah, H Chizari and O Kaiwartya. F3TM: Flooding factor based trust management framework for secure data transmission in MANETs. J. King Saud Univ. Comput. Inform. Sci. 2017; 29, 269-80.

Z Wang, Y Chen, and C Li. CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks. IEEE J. Sel. Area. Comm. 2012; 30, 289-96.

R Jaiswal and S Sharma. Relative cluster entropy based wormhole detection using AOMDV in adhoc network. In: Proceedings of the 4th International Conference on Computational Intelligence and Communication Networks, Mathura, India. 2012, p. 747-52.

Downloads

Published

2021-03-09

How to Cite

MOHINDRA, A. R. ., & GANDHI, C. . (2021). A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in MANET. Walailak Journal of Science and Technology (WJST), 18(6), Article 8987 (18 pages). https://doi.org/10.48048/wjst.2021.8987