Abstract
Mobile Ad hoc Network (MANET) is a mobile and infrastructure less network, widely used in various applications. In this paper, we study the major security issues in MANET to reduce the malicious activity at the nodes. To reduce the unsecured network, Enhanced Adaptive Acknowledgement Scheme (EAACK) is proposed and it involves Acknowledgement (ACK), Secure Acknowledgement (SACK), and Misbehavior Report Authentication (MRA) schemes. In EAACK scheme, the 2b (2-Bit) packet header is used and it overcomes some of the disadvantages of Watchdog behavior. In this work, the sender has to digitally sign the ACK packets and the receiver has to verify it. The proposed Scheme is applied to 40% of malicious nodes and Routing overhead (Ro) hits the value 0.6. The Network performance is better when the value of Ro is 0. In order to secure more, Credibility Based Sequence Distance Vector Routing (CBSDV) and Curve based cryptographic technique is used. Simulation results show that proposed scheme provides better secure network and CBSDV, hop count, time duration, energy values and trust scores play a deciding factor between the source and destination in the network.
Similar content being viewed by others
References
Alinci, M., Inaba, T., Elmazi, D.: A fuzzy-based system for improving node security in MANET clusters. Int. Conf. Complex Intell. Softw. Intensive Syst. 1, 390–401 (2016)
Alinci, M., Inaba, T., Elmazi, D.: Improving node security in MANET clusters: a comparison study of two fuzzy-based systems. Int. Conf. Complex Intell. Softw. Intensive Syst. 16, 110–112 (2016)
Thorat, S.A., Kulkarni, P.J.: Uncertainty analysis framework for trust based routing in MANET. Int. J. Peer-to-Peer Netw. Appl. 2, 220–233 (2017)
Krishna, S.R.M., Seeta Ramanath, M.N.: Security in MANET routing tables with FMNK cryptography model. IEEE Trans. Syst. Man Cybern. 12, 121–132 (2015)
Manoj, V., Aaqib, M., Raghavendiran, N.: A novel security framework using trust and fuzzy logic in Manet. Int. J. Distrib. Parallel Syst. (IJDPS) 3, 285–299 (2012)
Tarannum, R., Lamble, M.: Hybrid approach: detection of intrusion in Manet. Innov. Conf. Embed. Syst. Mob. Commun. Comput. 13, 24–28 (2011)
Li, F., Yang, Y., Jie, W.: Attack and flee: game-theory-based analysis on interactions among nodes in MANETs. IEEE Trans. Syst. Man Cybern. 40, 612–622 (2010)
Nagar, A., Jain, A.K.: On the security of non-invertible fingerprint template transforms. Int. Conf. Complex Intell. Softw. Intensive Syst. 50, 99–104 (2009)
Yih-Chun, H., Johnson, D.B., Perrig, A.: ‘SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. IEEE Workshop Mob. Comput. Syst. Appl. 55, 415–426 (2002)
Anguswamy, R., Thiagarajan, M., Dagli, C.H.: Systems methodology and framework for problem definition in m obile ad hoc networks. IEEE Int. Syst. Conf. 33, 312–324 (2008)
Ang, R., Safavi-Naini, R.: Cancelable Key-based Fingerprint Templates. University of Wollongong, Wollongong (2005)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sridevi, N., Nagarajan, V. A curve based cryptography for wireless security in MANET. Cluster Comput 22 (Suppl 2), 4017–4025 (2019). https://doi.org/10.1007/s10586-018-2612-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2612-2