Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A curve based cryptography for wireless security in MANET

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Mobile Ad hoc Network (MANET) is a mobile and infrastructure less network, widely used in various applications. In this paper, we study the major security issues in MANET to reduce the malicious activity at the nodes. To reduce the unsecured network, Enhanced Adaptive Acknowledgement Scheme (EAACK) is proposed and it involves Acknowledgement (ACK), Secure Acknowledgement (SACK), and Misbehavior Report Authentication (MRA) schemes. In EAACK scheme, the 2b (2-Bit) packet header is used and it overcomes some of the disadvantages of Watchdog behavior. In this work, the sender has to digitally sign the ACK packets and the receiver has to verify it. The proposed Scheme is applied to 40% of malicious nodes and Routing overhead (Ro) hits the value 0.6. The Network performance is better when the value of Ro is 0. In order to secure more, Credibility Based Sequence Distance Vector Routing (CBSDV) and Curve based cryptographic technique is used. Simulation results show that proposed scheme provides better secure network and CBSDV, hop count, time duration, energy values and trust scores play a deciding factor between the source and destination in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Alinci, M., Inaba, T., Elmazi, D.: A fuzzy-based system for improving node security in MANET clusters. Int. Conf. Complex Intell. Softw. Intensive Syst. 1, 390–401 (2016)

    Google Scholar 

  2. Alinci, M., Inaba, T., Elmazi, D.: Improving node security in MANET clusters: a comparison study of two fuzzy-based systems. Int. Conf. Complex Intell. Softw. Intensive Syst. 16, 110–112 (2016)

    Google Scholar 

  3. Thorat, S.A., Kulkarni, P.J.: Uncertainty analysis framework for trust based routing in MANET. Int. J. Peer-to-Peer Netw. Appl. 2, 220–233 (2017)

    Google Scholar 

  4. Krishna, S.R.M., Seeta Ramanath, M.N.: Security in MANET routing tables with FMNK cryptography model. IEEE Trans. Syst. Man Cybern. 12, 121–132 (2015)

    Google Scholar 

  5. Manoj, V., Aaqib, M., Raghavendiran, N.: A novel security framework using trust and fuzzy logic in Manet. Int. J. Distrib. Parallel Syst. (IJDPS) 3, 285–299 (2012)

    Article  Google Scholar 

  6. Tarannum, R., Lamble, M.: Hybrid approach: detection of intrusion in Manet. Innov. Conf. Embed. Syst. Mob. Commun. Comput. 13, 24–28 (2011)

    Google Scholar 

  7. Li, F., Yang, Y., Jie, W.: Attack and flee: game-theory-based analysis on interactions among nodes in MANETs. IEEE Trans. Syst. Man Cybern. 40, 612–622 (2010)

    Article  Google Scholar 

  8. Nagar, A., Jain, A.K.: On the security of non-invertible fingerprint template transforms. Int. Conf. Complex Intell. Softw. Intensive Syst. 50, 99–104 (2009)

    Google Scholar 

  9. Yih-Chun, H., Johnson, D.B., Perrig, A.: ‘SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. IEEE Workshop Mob. Comput. Syst. Appl. 55, 415–426 (2002)

    Google Scholar 

  10. Anguswamy, R., Thiagarajan, M., Dagli, C.H.: Systems methodology and framework for problem definition in m obile ad hoc networks. IEEE Int. Syst. Conf. 33, 312–324 (2008)

    Google Scholar 

  11. Ang, R., Safavi-Naini, R.: Cancelable Key-based Fingerprint Templates. University of Wollongong, Wollongong (2005)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Sridevi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sridevi, N., Nagarajan, V. A curve based cryptography for wireless security in MANET. Cluster Comput 22 (Suppl 2), 4017–4025 (2019). https://doi.org/10.1007/s10586-018-2612-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2612-2

Keywords