[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

Secure and efficient message transmission in MANET using hybrid cryptography and multipath routing technique

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

A Correction to this article was published on 19 September 2024

This article has been updated

Abstract

MANETs, or Mobile Ad hoc Networks, are a group of self-organized mobile devices that can connect with one another without relying on a centralized infrastructure or authority. The key benefit of MANETs lies in their ability to handle mobility while facilitating data communication among users within the network. However, ensuring the security of MANETs is essential for their proper functioning, particularly in terms of maintaining data confidentiality and integrity during transmission. MANETs are highly vulnerable to attacks due to their inherent properties.Clustering is an energetic technique employed in MANETs to handle mobile nodes effectively. It involves dividing the network into sub-networks known as clusters, which can consist of overlapping or disjointed nodes. For each cluster, an enhanced node termed the Cluster Head (CH) is chosen to oversee routing tasks. This approach reduces the operating expense on member nodes and improves the overall system efficiency. However, the relationship between nodes and CHs can change arbitrarily, resulting in re-union and re-grouping in the clustered MANET.

In a MANET, which is characterized by its dynamic and unpredictable nature, multiple path discovery plays a vital role in maintaining connectivity, improving reliability, optimizing resource utilization, and ensuring resilience to network conditions and node failures. This study aims to create multiple paths between a source and destination using a hybrid protocol that combines AODV (Ad hoc On-Demand Distance Vector) and MBOMRP (Multi-Path Byzantine OLSR). Additionally, a hybrid cryptographic technique is applied to securely transmit fragmented data. The primary objective of this proposed solution is to guarantee the appropriate, secure, and accurate delivery of packets. The results of our study demonstrate that the transmission of encrypted messages through multiple paths enhances network performance, efficiency, and the secure transmission of data within these self-configuring and infrastructure-less networks. It achieves these benefits while minimizing bandwidth consumption during routing operations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

The data required to reproduce the above findings cannot be shared at this time as the data also forms part of an ongoing study.

Change history

References

  1. Sakhaee E, Jamalipour A (2008) Stable clustering and communications in pseudolinear highly mobile ad hoc networks. IEEE Trans Veh Technol 56(8):3769-3777 2

    Article  Google Scholar 

  2. Silva L et al (2021) Computing paradigms in emerging vehicular environments: a review. IEEE/CAA J Autom Sin 8(3):491–511. https://doi.org/10.1109/JAS.2021.1003862

    Article  Google Scholar 

  3. Huiyao A, Xicheng L, Wei P (2004) A cluster-based multipath routing for MANET. National University of Defense Technology, Changsha, China, Computer School, pp 405–413

    Google Scholar 

  4. Huang H, Huang C, Ma D (2020) A method for deploying the minimal number of UAV base stations in cellular networks. IEEE/CAA J Autom Sin 7(2):559–567. https://doi.org/10.1109/JAS.2019.1911813

    Article  MathSciNet  Google Scholar 

  5. Chatterjee M, Das SK, Turgut D (2009) A weight based distributed clustering algorithm for mobile ad hoc networks. HiPC 2000, LNCS 1970, pp. 511–521, 2000.

  6. Asif W, Qaisar S (2011) “Energy and path aware clustering algorithm for mobile ad hoc networks. ICCSA, Part IV, LNCS 6785:133–147

    Google Scholar 

  7. Basu P, Naidu W (2012) A mobility based metric for clustering in mobile ad hoc networks," in International conference on Distributed computing systems workshop. pp 413–418

  8. Zhong J, Huang Z, Feng L, Du W, Li Y (2020) A hyper-heuristic framework for lifetime maximization in wireless sensor networks with a mobile sink. IEEE/CAA J Autom Sin 7(1):223–236. https://doi.org/10.1109/JAS.2019.1911846

    Article  Google Scholar 

  9. Shukla N (2013) Mobile Ad-Hoc Network (MANET): Security Issues Regarding Attacks. In International Journal of Computer Applications (0975–8887), National Conference on Recent Trends in Engineering and Management “NCRTEM-2013

  10. Sudha K, Ranjith JP, Ganapathy S, Sasidharan MSR (2015) Secure transmission over remote group: a new key management prototype. Int J Comput Sci Netw Secur (IJCSNS) 15(1):102–105. http://paper.ijcsns.org/07_book/201501/20150118.pdf

  11. Sung S, Seo Y, Shin Y (2006) Hierarchical clustering algorithm based on mobility in mobile ad hoc networks. ICCSA, LNCS 3982:954–963. https://doi.org/10.1007/11751595_100

    Article  Google Scholar 

  12. Morris R, Jannotti J, Kaashoek F, Li J, Decouto D (2010) CarNet: A Scalable Ad Hoc Wireless Network System. Proc. of 9th ACM SIGOPS European Workshop, Kolding, Denmark

  13. Grossglauser M, Tse D (2001) Mobility increases the capacity of ad-hoc wireless networks. Proc. of INFOCOM’01. pp 1360–1369

  14. Steenstrup M (2001) Cluster-Based Networks. Chapter 4, Ad Hoc Networking, edited by C. E. Perkins, Addison-Wesley

  15. Neethu V, Singh AK (2015) Mobility aware loose clustering for mobile ad hoc network. Procedia Comput Sci 54:57–64

    Article  Google Scholar 

  16. Loutf A (2014) An energy aware algorithm for OLSR clustering. Ann Telecommun 69:201–207

    Article  Google Scholar 

  17. Basurra SS, De Vos M, Padget J, Ji Y, Lewis T, Armour S (2015) Energy efcientzonebased routing protocol for MANETs. Ad Hoc Netw 25:16–37

    Article  Google Scholar 

  18. Sp RM, Bhattacharya S, Maddikunta PKR, Somayaji SRK, Lakshmanna K, Kaluri R, Hussien A, Gadekallu TR (2020) Load balancing of energy cloud using wind driven and frefy algorithms in internet of everything. J Parallel Distrib Comput 142:16–26. https://doi.org/10.1016/j.jpdc.2020.0.2.010

    Article  Google Scholar 

  19. Kulkarni SB, Yuvaraju B (2016) Challenges and issues of cluster based security in MANET. IOSR J Comput Eng (IOSR-JCE) 18:01–05

    Article  Google Scholar 

  20. Kaur I, Rao A (2017) A framework to improve the network security with less mobility in MANET. Int J Comput Appl 167(10):21–24. https://doi.org/10.5120/ijca2017914390

    Article  Google Scholar 

  21. Jhaveri RH, Patel NM (2015) A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Netw 21(8):2781–2798

    Article  Google Scholar 

  22. Singh M, Gagangeet S (2015) A secure and efficient cluster head selection algorithm for MANET. J NetwCommunEmergTechnol (JNCET);2. www.jncet.org

  23. Chakeres ID, Belding-Royer EM (2004) AODV routing protocol implementation design. ICDCSW '04: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) 7:698–703

  24. Panke T Clustering based certifcate revocation scheme for malicious nodes in MANET. IJSRP, Volume 3, Issue 5, May 2013 Edition [ISSN 2250–3153]

  25. Dhenakaran DS, Parvathavarthini A (2013) An overview of routing protocols in mobile ad-hoc network. Int J Adv Res Comput Sci Softw Eng 3:251–259

    Google Scholar 

  26. Taneja S (2010) A survey of routing protocols in mobile ad hoc networks. Int J Innov Manag Technol 1(3):279

    Google Scholar 

  27. ALGhafran L, Yusof ZBM (2015) Anefcient load balancing clustering algorithm for mobile ad hoc networks. Int J Comput Commun Instrum Eng (UCCIE) 2(2):215–9

    Google Scholar 

  28. Chatterjee M, Das SK, Turgut D (2002) WCA: a weighted clustering algorithm for mobile ad hoc networks. Clust Comput 5:193–204

    Article  Google Scholar 

  29. Grover D, Saini S (2015) A survey on unicast routing protocols in mobile ad-hoc networks. Int J Adhoc Ubiquitous Comput 5:697–702

    Google Scholar 

  30. Djemili F, Tolba C (2013) A mixed approach load balancing and efcient energy for multi-path routing in mobile ad hoc networks. In: SENSORS, IEEE, Baltimore, MD, USA, IEEE, pp 1–4

  31. Spyropoulos T, Psounis K, Raghavendra C (2010) Performance analysis of mobility-assisted routing. In Proc. MobiHoc ’06: 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing. pp 49–60

  32. Xinming Z, Dong S, Fengfu Z (2010) Integrated routing metric for mobile ad hoc networks. J Softw 20(11):3077–3085

    Google Scholar 

  33. He G (2002) Destination-Sequenced Distance Vector (DSDV) Protocol. Hels Univ Technol Finl Mag 135:1–9

    Google Scholar 

  34. Kavitha P, Mukesh R (2018) Detection of impersonation attack in MANET using polynomial reduction algorithm. Int J Netw Secur 20(2):381–389. https://doi.org/10.6633/IJNS.201803.20(2).19

    Article  Google Scholar 

  35. Camp T, Boleng J, Davies V (2002) A survey of mobility models for ad hoc network research. Wirel Commun Mob Comput 2(5):483–502

    Article  Google Scholar 

  36. Zhang X (2016) A street-centric opportunistic routing protocol based on link correlation for urban manets. IEEE Trans Mob Comput 1:1–1

    Google Scholar 

  37. Subba B, Biswas S, Karmakar S (2016) Intrusion detection in mobile ad hoc networks: Bayesian game formulation. Eng Sci Technol 19(2):782–799

    Google Scholar 

  38. Marchang N, Datta R, Das SK (2017) A novel approach for efcient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans Veh Technol 66(2):1684–1695

    Article  Google Scholar 

  39. Singh O, Singh J, Singh R (2018) Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Comput 21:51–63

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jayantkumar A. Rathod.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original online version of this article was revised: The author's affiliation was incorrect in the original publication of this article.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rathod, J.A., Kotari, M. Secure and efficient message transmission in MANET using hybrid cryptography and multipath routing technique. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-19542-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-19542-9

Keywords