Abstract
MANETs, or Mobile Ad hoc Networks, are a group of self-organized mobile devices that can connect with one another without relying on a centralized infrastructure or authority. The key benefit of MANETs lies in their ability to handle mobility while facilitating data communication among users within the network. However, ensuring the security of MANETs is essential for their proper functioning, particularly in terms of maintaining data confidentiality and integrity during transmission. MANETs are highly vulnerable to attacks due to their inherent properties.Clustering is an energetic technique employed in MANETs to handle mobile nodes effectively. It involves dividing the network into sub-networks known as clusters, which can consist of overlapping or disjointed nodes. For each cluster, an enhanced node termed the Cluster Head (CH) is chosen to oversee routing tasks. This approach reduces the operating expense on member nodes and improves the overall system efficiency. However, the relationship between nodes and CHs can change arbitrarily, resulting in re-union and re-grouping in the clustered MANET.
In a MANET, which is characterized by its dynamic and unpredictable nature, multiple path discovery plays a vital role in maintaining connectivity, improving reliability, optimizing resource utilization, and ensuring resilience to network conditions and node failures. This study aims to create multiple paths between a source and destination using a hybrid protocol that combines AODV (Ad hoc On-Demand Distance Vector) and MBOMRP (Multi-Path Byzantine OLSR). Additionally, a hybrid cryptographic technique is applied to securely transmit fragmented data. The primary objective of this proposed solution is to guarantee the appropriate, secure, and accurate delivery of packets. The results of our study demonstrate that the transmission of encrypted messages through multiple paths enhances network performance, efficiency, and the secure transmission of data within these self-configuring and infrastructure-less networks. It achieves these benefits while minimizing bandwidth consumption during routing operations.
Similar content being viewed by others
Data availability
The data required to reproduce the above findings cannot be shared at this time as the data also forms part of an ongoing study.
Change history
19 September 2024
A Correction to this paper has been published: https://doi.org/10.1007/s11042-024-20260-5
References
Sakhaee E, Jamalipour A (2008) Stable clustering and communications in pseudolinear highly mobile ad hoc networks. IEEE Trans Veh Technol 56(8):3769-3777 2
Silva L et al (2021) Computing paradigms in emerging vehicular environments: a review. IEEE/CAA J Autom Sin 8(3):491–511. https://doi.org/10.1109/JAS.2021.1003862
Huiyao A, Xicheng L, Wei P (2004) A cluster-based multipath routing for MANET. National University of Defense Technology, Changsha, China, Computer School, pp 405–413
Huang H, Huang C, Ma D (2020) A method for deploying the minimal number of UAV base stations in cellular networks. IEEE/CAA J Autom Sin 7(2):559–567. https://doi.org/10.1109/JAS.2019.1911813
Chatterjee M, Das SK, Turgut D (2009) A weight based distributed clustering algorithm for mobile ad hoc networks. HiPC 2000, LNCS 1970, pp. 511–521, 2000.
Asif W, Qaisar S (2011) “Energy and path aware clustering algorithm for mobile ad hoc networks. ICCSA, Part IV, LNCS 6785:133–147
Basu P, Naidu W (2012) A mobility based metric for clustering in mobile ad hoc networks," in International conference on Distributed computing systems workshop. pp 413–418
Zhong J, Huang Z, Feng L, Du W, Li Y (2020) A hyper-heuristic framework for lifetime maximization in wireless sensor networks with a mobile sink. IEEE/CAA J Autom Sin 7(1):223–236. https://doi.org/10.1109/JAS.2019.1911846
Shukla N (2013) Mobile Ad-Hoc Network (MANET): Security Issues Regarding Attacks. In International Journal of Computer Applications (0975–8887), National Conference on Recent Trends in Engineering and Management “NCRTEM-2013
Sudha K, Ranjith JP, Ganapathy S, Sasidharan MSR (2015) Secure transmission over remote group: a new key management prototype. Int J Comput Sci Netw Secur (IJCSNS) 15(1):102–105. http://paper.ijcsns.org/07_book/201501/20150118.pdf
Sung S, Seo Y, Shin Y (2006) Hierarchical clustering algorithm based on mobility in mobile ad hoc networks. ICCSA, LNCS 3982:954–963. https://doi.org/10.1007/11751595_100
Morris R, Jannotti J, Kaashoek F, Li J, Decouto D (2010) CarNet: A Scalable Ad Hoc Wireless Network System. Proc. of 9th ACM SIGOPS European Workshop, Kolding, Denmark
Grossglauser M, Tse D (2001) Mobility increases the capacity of ad-hoc wireless networks. Proc. of INFOCOM’01. pp 1360–1369
Steenstrup M (2001) Cluster-Based Networks. Chapter 4, Ad Hoc Networking, edited by C. E. Perkins, Addison-Wesley
Neethu V, Singh AK (2015) Mobility aware loose clustering for mobile ad hoc network. Procedia Comput Sci 54:57–64
Loutf A (2014) An energy aware algorithm for OLSR clustering. Ann Telecommun 69:201–207
Basurra SS, De Vos M, Padget J, Ji Y, Lewis T, Armour S (2015) Energy efcientzonebased routing protocol for MANETs. Ad Hoc Netw 25:16–37
Sp RM, Bhattacharya S, Maddikunta PKR, Somayaji SRK, Lakshmanna K, Kaluri R, Hussien A, Gadekallu TR (2020) Load balancing of energy cloud using wind driven and frefy algorithms in internet of everything. J Parallel Distrib Comput 142:16–26. https://doi.org/10.1016/j.jpdc.2020.0.2.010
Kulkarni SB, Yuvaraju B (2016) Challenges and issues of cluster based security in MANET. IOSR J Comput Eng (IOSR-JCE) 18:01–05
Kaur I, Rao A (2017) A framework to improve the network security with less mobility in MANET. Int J Comput Appl 167(10):21–24. https://doi.org/10.5120/ijca2017914390
Jhaveri RH, Patel NM (2015) A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Netw 21(8):2781–2798
Singh M, Gagangeet S (2015) A secure and efficient cluster head selection algorithm for MANET. J NetwCommunEmergTechnol (JNCET);2. www.jncet.org
Chakeres ID, Belding-Royer EM (2004) AODV routing protocol implementation design. ICDCSW '04: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) 7:698–703
Panke T Clustering based certifcate revocation scheme for malicious nodes in MANET. IJSRP, Volume 3, Issue 5, May 2013 Edition [ISSN 2250–3153]
Dhenakaran DS, Parvathavarthini A (2013) An overview of routing protocols in mobile ad-hoc network. Int J Adv Res Comput Sci Softw Eng 3:251–259
Taneja S (2010) A survey of routing protocols in mobile ad hoc networks. Int J Innov Manag Technol 1(3):279
ALGhafran L, Yusof ZBM (2015) Anefcient load balancing clustering algorithm for mobile ad hoc networks. Int J Comput Commun Instrum Eng (UCCIE) 2(2):215–9
Chatterjee M, Das SK, Turgut D (2002) WCA: a weighted clustering algorithm for mobile ad hoc networks. Clust Comput 5:193–204
Grover D, Saini S (2015) A survey on unicast routing protocols in mobile ad-hoc networks. Int J Adhoc Ubiquitous Comput 5:697–702
Djemili F, Tolba C (2013) A mixed approach load balancing and efcient energy for multi-path routing in mobile ad hoc networks. In: SENSORS, IEEE, Baltimore, MD, USA, IEEE, pp 1–4
Spyropoulos T, Psounis K, Raghavendra C (2010) Performance analysis of mobility-assisted routing. In Proc. MobiHoc ’06: 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing. pp 49–60
Xinming Z, Dong S, Fengfu Z (2010) Integrated routing metric for mobile ad hoc networks. J Softw 20(11):3077–3085
He G (2002) Destination-Sequenced Distance Vector (DSDV) Protocol. Hels Univ Technol Finl Mag 135:1–9
Kavitha P, Mukesh R (2018) Detection of impersonation attack in MANET using polynomial reduction algorithm. Int J Netw Secur 20(2):381–389. https://doi.org/10.6633/IJNS.201803.20(2).19
Camp T, Boleng J, Davies V (2002) A survey of mobility models for ad hoc network research. Wirel Commun Mob Comput 2(5):483–502
Zhang X (2016) A street-centric opportunistic routing protocol based on link correlation for urban manets. IEEE Trans Mob Comput 1:1–1
Subba B, Biswas S, Karmakar S (2016) Intrusion detection in mobile ad hoc networks: Bayesian game formulation. Eng Sci Technol 19(2):782–799
Marchang N, Datta R, Das SK (2017) A novel approach for efcient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans Veh Technol 66(2):1684–1695
Singh O, Singh J, Singh R (2018) Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Comput 21:51–63
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The original online version of this article was revised: The author's affiliation was incorrect in the original publication of this article.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rathod, J.A., Kotari, M. Secure and efficient message transmission in MANET using hybrid cryptography and multipath routing technique. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19542-9
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-19542-9