Open Access
Subscription Access
Open Access
Subscription Access
Four Stage Security Algorithm for Data Transfer to Improve Security in Manet
Subscribe/Renew Journal
Mobile Ad hoc Network (MANET) regarded to be a group of mobile nodes that can communicate with others in the absence of network infrastructure. MANET is at high risk due to its basic features, such as peer-to-peer (P2P) architecture; wireless shared medium, strictly constrained resources, extremely powerful network topology and open nodes for physical capture. Security is an essential service in all types of network communication. MANET must present security that raises human’s belief in MANET. This paper proposed the Four Stage Security Algorithm (FSSA) improve MANET security. First, secret key-based encryption and decryption provided in Stage 1. Then, public key-based encryption and private key based decryption provided in Stage 2. Followed by, signature generation and verification provided in Stage 3, at last, token-based access control provided in Stage 4. The experimental result shows the proposed FSSA algorithm provides robust security compared with other existing algorithms in MANET.
Keywords
Security, Cryptography, Encryption, Decryption, Access Control, Signature Generation and Verification
Subscription
Login to verify subscription
User
Font Size
Information
- M. Elhoseny, K. Shankar, “Reliable Data Transmission Model for Mobile Ad Hoc Network using Signcryption Technique”, IEEE Transactions on Reliability, Vol. 69, No. 3, pp. 1077-1086, 2019.
- P. Sathyaraj and D.R. Devi, “Designing the Routing Protocol with Secured IoT Devices and QoS over Manet using Trust-Based Performance Evaluation Method”, Journal of Ambient Intelligence and Humanized Computing, Vol. 30, pp. 1-9, 2020.
- M.S. Pathan, N. Zhu, J. He, Z.A. Zardari, M.Q. Memon and M.I. Hussain, “An Efficient Trust-based Scheme for Secure and Quality of Service Routing in MANETs”, Future Internet, Vol. 10, No. 2, pp. 1-16, 2018.
- R. Menaka, V. Ranganathan and B. Sowmya, “Improving Performance through Reputation based Routing Protocol for Manet”, Wireless Personal Communications, Vol. 94, No. 4, pp. 2275-2290, 2017.
- V.L. Narayana and C.R. Bharathi, “Identity based Cryptography for Mobile Ad Hoc Networks”, Journal of Theoretical and Applied Information Technology, Vol. 95, No. 5, pp. 1173-1183, 2017.
- J. Sultana and T. Ahmed, “Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET”, International Journal of Electrical and Computer Engineering, Vol. 8, No. 6, pp. 1-17, 2018.
- S. Khatoon and B.S. Thakur, “Certificate Less Key Management Scheme in Manet using Threshold Cryptography”, International Journal of Network Security and Its Applications, Vol. 7, No. 2, pp. 55-63, 2015.
- B. Xing, D. Wang, Y. Yang, Z. Wei, J. Wu and C. He, “Accelerating DES and AES Algorithms for a Heterogeneous Many-Core Processor”, International Journal of Parallel Programming, Vol. 49, No. 3, pp. 463-486, 2021.
- S.H. Hashem, “Proposal Hybrid CBC Encryption System to Protect E-mail Messages”, Iraqi Journal of Science, Vol. 28, pp. 157-170, 2019.
- M.M. Abd Zaid and S. Hassan, “Lightweight RC4 Algorithm”, Journal of Al-Qadisiyah for Computer Science and Mathematics, Vol. 11, No. 1, pp. 1-27, 2019.
- V. Bhardwaj and N. Kaur, “SEEDRP: A Secure Energy Efficient Dynamic Routing Protocol in Fanets”, Wireless Personal Communications, Vol. 85, pp. 1-27, 2021.
- G.K. Chauhan and S.M. Patel, “Public String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)”, Proceedings of International Conference on Intelligent Computing and Control Systems, pp. 1-5, 2018.
- V.B. Joshi and R.H. Goudar, “Intrusion Detection Systems in MANETs using Hybrid Techniques”, Proceedings of International Conference on Smart Technologies for Smart Nation, pp. 534-538, 2017.
- D.S. Gupta, S.H. Islam and M.S. Obaidat, “A Secure Identity-based Deniable Authentication Protocol for MANETs”. Proceedings of International Conference on Computer, Information and Telecommunication Systems, pp. 1-5, 2019.
- M. Ahmad, Q. Chen, M. Najam-Ul-Islam, M.A. Iqbal and S. Hussain, “On the Secure, Optimized Link State Routing (SOLSR) Protocol for MANETs”, Proceedings of International Conference on Intelligent Systems and Knowledge Engineering, pp. 1-8, 2017.
- M. Deryabin, M. Babenko, A. Nazarov, N. Kucherov, A. Karachevtsev, A. Glotov and I. Vashchenko, “Protocol for Secure and Reliable Data Transmission in MANET based on Modular Arithmetic”, Proceedings of International Conference on Engineering and Telecommunication, pp. 1-5, 2019.
- Y. Mohsen, M. Hamdy and E. Shaaban, “Key Distribution Protocol for Identity Hiding in MANETs”, Proceedings of International Conference on Intelligent Computing and Information Systems, pp. 245-252, 2019.
- H. Kadhim and M.A. Hatem, “Secure Data Packet in MANET Based Chaos-Modified AES Algorithm”, Proceedings of International Conference on Engineering Technology and its Applications, pp. 208-213, 2019.
- M. Umar, A. Saba and A.A. Tata, “Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET”, Proceedings of International Conference on Networking and Network Applications, pp. 121-126, 2018.
- J. Usmani, R. Kumar and J. Prakash, “A Survey on Secure Gateway Discovery in MANET”, Proceedings of International Conference on Cloud Computing, Data Science and Engineering, pp. 362-368, 2017.
- G. Liu, H. Dong, Z. Yan, X. Zhou and S. Shimizu, “B4SDC: A Blockchain System for Security Data Collection in MANETs”, IEEE Transactions on Big Data, Vol. 67, pp. 1-17, 2020.
- M. Ponguwala and S. Rao, “E2-SR: A Novel Energy-Efficient Secure Routing Scheme to Protect MANET-IoT”, IET Communications, Vol. 13, No. 19, pp. 3207-3216, 2019.
- J. Sathiamoorthy, B. Ramakrishnan and M. Usha, “A Reliable and Secure Data Transmission in CEAACK MANETs using a Distinct Dynamic Key with a Classified Digital Signature Cryptographic Algorithm”, Proceedings of International Conference on Computing and Communications Technologies, pp. 144-151, 2015.
- Q. Ye and W. Zhuang, “Distributed and Adaptive Medium Access Control for Internet-of-Things-Enabled Mobile Networks”, IEEE Internet of Things Journal, Vol. 4, No. 2, pp. 446-460, 2016.
- T.H. Kwon, W. Jo, J.Y. Lee, HS. Seo, M. Baek and S.S. Lee, “Random Access Congestion Control for Periodic Safety Messages in Dense Traffic Networks”, Proceedings of International Conference on Computer Communication and Networks, pp. 1-4, 2019.
- J. Jagannath and T. Melodia, “An Opportunistic Medium Access Control Protocol for Visible Light Ad Hoc Networks”, Proceedings of International Conference on Computing, Networking and Communications, pp. 609-614, 2018.
- T. Li, J. Ma, Q. Pei, H. Song, Y. Shen and C. Sun, “DAPV: Diagnosing Anomalies in MANETs Routing with Provenance and Verification”, IEEE Access, Vol. 7, pp. 35302-35316, 2019.
- J.K. Vinayagam, C.H. Balaswamy and K. Soundararajan, “Adopting a Cross-Layer Approach for Detecting and Segregating Malicious Nodes in MANET”, Proceedings of International Conference on Signal Processing and Communication, pp. 457-461, 2017.
- K. Chen and H. Shen, “Maximizing P2P File Access Availability in Mobile Ad Hoc Networks through Replication for Efficient File Sharing”, IEEE Transactions on Computers, Vol. 64, No. 4, pp. 1029-1042, 2014.
- V.L. Narayana and C.R. Bharathi, “Multi-Mode Routing Mechanism with Cryptographic Techniques and Reduction of Packet Drop Using 2ACK Scheme MANETs”, In Smart Intelligent Computing and Applications, pp. 649-658, 2019.
- Y.K. Alapati and S. Ravichandran, “Secure Data Transfer in Manet with Key Calculator and Key Distributor Using Cryptography Methods”, International Information and Engineering Technology Association, Vol. 10, No. 4, pp. 567-572, 2020.
- B. Vanathy and M. Ramakrishnan, “Signcryption Based Hyper Elliptical Curve Cryptography Framework for Key Escrow in Manet”, International Journal of Advanced Research in Engineering and Technology, Vol. 11, No. 3, pp. 91-107, 2020.
- S.N. Asikka, “Authenticated Group Key Agreement Protocol for MANET Based on Cryptographic Techniques”, International Journal of Research in Engineering, Science and Management, Vol. 13, No. 7, pp. 13-19, 2020.
- A. Mohindra and C. Gandhi, “A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in Manet”, Walailak Journal of Science and Technology, Vol. 9, pp. 1-18, 2020.
- M.D. Singanjude and R. Dalvi, “Secure and Efficient Application of Manet Using RSA Using Vedic Method Combine with Visual Cryptography and Identity Based Cryptography Technique”, Proceedings of International Conference on Innovative Computing and Communications, pp. 1-7, 2020.
- R. Preethi and M. Sughasiny, “AKCSS: An Asymmetric Key Cryptography Based on Secret Sharing in Mobile Ad Hoc Network”, Proceedings of International Conference on Intelligent Systems Design and Applications, pp. 73-86, 2018.
- A. Murugesan, B. Saminatha, F. Al-Turjman and R.L Kumar, “Analysis on Homomorphic Technique for Data Security in Fog Computing”, Transactions on Emerging Telecommunications Technologies, Vol. 39, pp. 1-14, 2020.
- A. Murugesan, B. Saminathan, F. Al-Turjman and R.L Kumar, “A Lightweight Authentication and Secure Data access Between Fog and IoT User”, International Journal of Electronic Business, Vol. 16, No. 1, pp. 77-87, 2021.
Abstract Views: 147
PDF Views: 1