An Effective Key Management Protocol on AODV for Group Security

Authors

  • Bhawna Sharma Department of Computer Science and Engineering, MMEC, MM (Deemed to be University), Mullana, Ambala, India
  • Rohit Vaid Department of Computer Science and Engineering, MMEC, MM (Deemed to be University), Mullana, Ambala, India

Keywords:

MANET, Routing protocols, key management, AODV, group key management, RSA and DH

Abstract

Mobile Ad Hoc Networks, or MANETs, are decentralised networks made up of mobile devices that can connect with one another without the use of a centralised infrastructure. Because MANETs are dynamic and self-organizing, securing data transfer presents specific difficulties, particularly with regard to routing algorithms. By providing authentication and confidentiality for communication among the participating nodes, the Key Management Protocol for MANET Routing Group Security is a protocol created to secure the routing operations within a MANET. In this study, group communication security is provided using a combination of the RSA and DH (Diffie-Hellman) algorithms. Utilizing metrics like routing overhead, throughput, and security level, the performance of this ensemble key management system is evaluated for the AODV. After using this technique, we discovered that our suggested ensemble method secures group communication as compared to Diffie-Hellman, improves throughput by altering the quantity of messages sent, and decreases routing overhead in various groups. Group security over Diffie-Hellman was boosted by 30% by combining RSA and DH.

Downloads

Download data is not yet available.

References

Jain S, Agrawal K. The impact of resource consumption attack on signal-stability based adaptive routing protocol in Manet. Indian Journal of Science and Technology. 2017 Aug;10:30.

Medi Sandhya Rani, Rekha Redamalla and K.V.N. Sunitha “Secure Group Key Exchange and Encryption Mechanism in MANETs” in Innovations in Computer Science and Engineering, 2019

Wan AnXoing and Yao Huan Gong, “Secure and Highly Efficient Three Level Key Management Scheme for Manet”, Wseas Transactions on Computers, Vol. 10, No. 10, 2011

Khalili, Katz, Jonathan and Arbaugh, A. William, “Towards secure key distribution in truly ad hoc networks”, IEEE Workshop on Security and Assurance in ad hoc Networks –2003.

Néstor J. Hetnández Marcano, Jonas Gabs Fugl Nørby, and Rune Hylsberg Jacobsen, “On Ad hoc On-Demand distance vector routing in low earth orbit nanosatellite constellations”, In IEEE 91st Vehicular Technology Conference (VTC2020-Spring), IEEE, pp. 1-6, 2020, 10.1109/VTC2020-Spring48590.2020.9128736.

Rajashanthi, M., and Valarmathi K, “Energy-efficient multipath routing in networking aid of clustering with OGFSO algorithm”, Soft Computing, pp. 1-10, 2020, 10.1007/s00500-020-04710-4.

Muthukumaran, N, “Analyzing throughput of MANET with reduced packet loss”, Wireless Personal Communications, vol. 97, no. 1, pp. 565-578, 2017.

Yimin Lv, “Security Issues in Multi-hop Device-to-device Communication Networks - Secure Routing Protocols Solution” in Journal of Physics: Conference Series 1828 (2021) doi:10.1088/1742-6596/1828/1/012117

Y. Prasad1 and R. Balakrishna, “Energy Efficient and Secured Clustering Algorithm using Fuzzy Logic with K-means Method in MANET” in Indian Journal of Science and Technology, Vol 12(19), DOI: 10.17485/ijst/2019/v12i19/144195, May 2019.

Burmester, M. and B.D. Medeiros, 2009. On the security of route discovery in MANETs. IEEE Trans. Mobile Comput., 8: 1180-1188. DOI: 10.1109/TMC.2009.13

Shu, T., M. Krunz and S. Liu, 2010. Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mobile Computing, 9: 941-954. DOI: 10.1109/TMC.2010.36

Ahmadzadeh, S.A., S.A. Motahari and A.K. Khandani, 2010. Signal Space Cooperative Communication. IEEE Trans. Wireless Communication, 9: 1266-1271. DOI: 10.1109/TWC.2010.04.090059.

Mohindra Ar, Gandhi C, A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in MANET. Walailak J Sci & Tech [Internet] 2021Mar.9 DOI: https://doi.org/10.48048/wjst.2021.8987.

Manjula T, Anand B. A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing. 2021.

Wan An Xoing and Yao Huan Gong, “Secure and Highly Efficient Three Level Key Management Scheme for Manet”, Wseas Transactions on Computers, Vol. 10, No. 10, 2011.

Rajesh Kumar Dangi, Rachna Singh Thakur, Neha Rahinj, Sankalp Rajora & Dinesh Thakur, “Key Distributed Cryptography using Key Algorithm in MANET” in International Journal of Recent Advances in Engineering & Technology (IJRAET) ISSN (Online): 2347 - 2812, Volume-5, Issue -12, 2017.

Vinitha. R. G “An Improved Efficient Data Transmission using Key Management in Mobile Ad-Hoc Network” in International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 RTICCT – 2017.

Nitika Singhi and Ravi Singh Pippal “Analysis of Key Management Schemes in MANET” in International Journal of Applied Environmental Sciences ISSN 0973-6077 Volume 13, Number 2 (2018), pp. 161-169.

Bing, Jie Wu and Yuhong Dong, “An efficient group key management scheme for mobile ad hoc network”, International Journal and Networks, Vol. 2, No.3, 2008.

K.Sanzgir, and B.Dahill, “A secure routing protocol for ad hoc networks”, Proceeding of the 10th IEEE International Conference on Network Protocols, pp.1-10, 2000.

Mr. Nikhil Surkar, Ms. Shriya Timande. (2012). Analysis of Analog to Digital Converter for Biomedical Applications. International Journal of New Practices in Management and Engineering, 1(03), 01 - 07. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/6

Vyas, A. ., & Sharma, D. A. . (2020). Deep Learning-Based Mango Leaf Detection by Pre-Processing and Segmentation Techniques. Research Journal of Computer Systems and Engineering, 1(1), 11–16. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/18

Downloads

Published

21.09.2023

How to Cite

Sharma , B. ., & Vaid , R. . (2023). An Effective Key Management Protocol on AODV for Group Security. International Journal of Intelligent Systems and Applications in Engineering, 11(4), 645 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3599

Issue

Section

Research Article