Skip to main content

2024 | OriginalPaper | Buchkapitel

ECC-Based Hybrid Approach for Data Security for MANET

verfasst von : Haresh Parmar, Mansi Dave

Erschienen in: ICT: Innovation and Computing

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless communication innovations opened the door for the creation of compact, less-power, lower-cost, and wireless sensor networks’ multipurpose sensor nodes. The idea of “3 Any”—anybody, anywhere, and anytime—has helped wireless networks gain popularity. Nodes in a mobile ad hoc network can interact without the assistance of a centralized administration or network architecture. They may exchange data with them via several hops and are connected via wireless technologies. An independent group of mobile nodes forms the mobile ad hoc network, a wireless network lacking any kind of permanent infrastructure (mobiles, laptops, iPads, PDAs, etc.). Ad hoc joining and departing of each node cause the network to automatically re-construct its topologies and routing table info for the transmission of information packets. The researchers can understand both the general idea of MANET and its applications. In this paper, we work on secure data transmission and management using ECC and MANET-based security standards for secure data transmission using mobile nodes. The use of modified-AES and ECC and this security standard as a result shows improved PDR of 8–10%, throughput of 10–12%, and latency of the node as compared to the existing system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Panda M (2014) Security in wireless sensor networks using cryptographic techniques. AJER Panda M (2014) Security in wireless sensor networks using cryptographic techniques. AJER
2.
Zurück zum Zitat Indora S, Dhadich N (2016) A review paper on low efficient wireless communication network design. IJERT Indora S, Dhadich N (2016) A review paper on low efficient wireless communication network design. IJERT
3.
Zurück zum Zitat Ramphull D, Mungur A, Armoogum S, Pudaruth S (2021) A review of mobile ad hoc network (MANET) protocols and their applications. IEEE Ramphull D, Mungur A, Armoogum S, Pudaruth S (2021) A review of mobile ad hoc network (MANET) protocols and their applications. IEEE
4.
Zurück zum Zitat El Jay S, Hasbi A (2016) Security in mobile ad hoc networks (MANETs) and WSNs (wireless sensor networks). Int J Comput Sci Netw Secur El Jay S, Hasbi A (2016) Security in mobile ad hoc networks (MANETs) and WSNs (wireless sensor networks). Int J Comput Sci Netw Secur
5.
Zurück zum Zitat Sujatha K, Vaishali R, Rakshith MB, Sparsha H, Suhas M (2019) A comprehensive study on wireless ad-hoc networks. IJAREEIE Sujatha K, Vaishali R, Rakshith MB, Sparsha H, Suhas M (2019) A comprehensive study on wireless ad-hoc networks. IJAREEIE
6.
Zurück zum Zitat Sreelekshmi S (2015) Secure routing and data transmission in MANETs using digital signature. IJERT Sreelekshmi S (2015) Secure routing and data transmission in MANETs using digital signature. IJERT
7.
Zurück zum Zitat Raza N, Aftab MU, Akbar MQ, Ashraf O, Irfan M (2016) Mobile ad-hoc networks applications and its challenges. Scientific Research Publishing Raza N, Aftab MU, Akbar MQ, Ashraf O, Irfan M (2016) Mobile ad-hoc networks applications and its challenges. Scientific Research Publishing
8.
Zurück zum Zitat Singh C, Gupta V, Kaur G (2014) A review paper on introduction to MANET”. IJETT Singh C, Gupta V, Kaur G (2014) A review paper on introduction to MANET”. IJETT
9.
Zurück zum Zitat Patil P, Sahu M, Rizvi MA (2013) Proficient data communication in MANET using spanning tree. IEEE Patil P, Sahu M, Rizvi MA (2013) Proficient data communication in MANET using spanning tree. IEEE
10.
Zurück zum Zitat Mishra AR (2012) Elliptic curve cryptography (ECC) for security in wireless sensor network. IJERT Mishra AR (2012) Elliptic curve cryptography (ECC) for security in wireless sensor network. IJERT
11.
Zurück zum Zitat Prastavana PS (2016) Enhanced ECC algorithm over public key cryptography. IJSEAS Prastavana PS (2016) Enhanced ECC algorithm over public key cryptography. IJSEAS
12.
Zurück zum Zitat Verma Y, Dharmale N (2013) A survey paper based on image encryption and decryption using modified advanced encryption standard. IJSR Verma Y, Dharmale N (2013) A survey paper based on image encryption and decryption using modified advanced encryption standard. IJSR
13.
Zurück zum Zitat Ravi Kumar K, Babu KA, Prasanth NCS, Kumar KM, Simha CY (2023) Secured communication in wireless networks using modified advanced encryption standard algorithm. IJARIIE Ravi Kumar K, Babu KA, Prasanth NCS, Kumar KM, Simha CY (2023) Secured communication in wireless networks using modified advanced encryption standard algorithm. IJARIIE
14.
Zurück zum Zitat AL-Dhief FT, Sabri N, Salim MS, Fouad S, Aljunid SA (2018) MANET routing protocols evaluation: AODV, DSR and DSDV perspective. MATEC Web of Conferences AL-Dhief FT, Sabri N, Salim MS, Fouad S, Aljunid SA (2018) MANET routing protocols evaluation: AODV, DSR and DSDV perspective. MATEC Web of Conferences
15.
Zurück zum Zitat Li Z, Shen H (2014) A QoS-oriented distributed routing protocol for hybrid wireless networks. IEEE Trans Mobile Comput Li Z, Shen H (2014) A QoS-oriented distributed routing protocol for hybrid wireless networks. IEEE Trans Mobile Comput
16.
Zurück zum Zitat Li J, Li Y, Ren J (2014) Hop-by-hop message authentication and source privacy in wireless sensor networks. IEEE Trans Parallel Distrib Syst Li J, Li Y, Ren J (2014) Hop-by-hop message authentication and source privacy in wireless sensor networks. IEEE Trans Parallel Distrib Syst
17.
Zurück zum Zitat Sravana Kumar D, Suneetha CH, Chandrasekhar A (2012) Encryption of data using elliptic curve over finite field, vol 3, no 1. IJDPS Sravana Kumar D, Suneetha CH, Chandrasekhar A (2012) Encryption of data using elliptic curve over finite field, vol 3, no 1. IJDPS
18.
Zurück zum Zitat Zhang J, Chen Z, Xu M (2012) On the security of ID-based multi-receiver threshold signcryption scheme. In: Proceedings of 2nd international conference on consumer electronics, communications and networks (CECNet), pp 1944–1948 Zhang J, Chen Z, Xu M (2012) On the security of ID-based multi-receiver threshold signcryption scheme. In: Proceedings of 2nd international conference on consumer electronics, communications and networks (CECNet), pp 1944–1948
19.
Zurück zum Zitat Wu L (2012) An ID-based multi-receiver signcryption scheme in MANET. J Theor Appl Inf Technol 46(1):120–124 Wu L (2012) An ID-based multi-receiver signcryption scheme in MANET. J Theor Appl Inf Technol 46(1):120–124
20.
Zurück zum Zitat Kushwah P, Lal S (2012) Provable secure identity based signcryption schemes without random oracles. Int J Netw Secur Appl 4(3):97–110. ISSN: 0974-9330 Kushwah P, Lal S (2012) Provable secure identity based signcryption schemes without random oracles. Int J Netw Secur Appl 4(3):97–110. ISSN: 0974-9330
Metadaten
Titel
ECC-Based Hybrid Approach for Data Security for MANET
verfasst von
Haresh Parmar
Mansi Dave
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-9486-1_27

Neuer Inhalt