An Effective Key Management Protocol on AODV for Group Security
Keywords:
MANET, Routing protocols, key management, AODV, group key management, RSA and DHAbstract
Mobile Ad Hoc Networks, or MANETs, are decentralised networks made up of mobile devices that can connect with one another without the use of a centralised infrastructure. Because MANETs are dynamic and self-organizing, securing data transfer presents specific difficulties, particularly with regard to routing algorithms. By providing authentication and confidentiality for communication among the participating nodes, the Key Management Protocol for MANET Routing Group Security is a protocol created to secure the routing operations within a MANET. In this study, group communication security is provided using a combination of the RSA and DH (Diffie-Hellman) algorithms. Utilizing metrics like routing overhead, throughput, and security level, the performance of this ensemble key management system is evaluated for the AODV. After using this technique, we discovered that our suggested ensemble method secures group communication as compared to Diffie-Hellman, improves throughput by altering the quantity of messages sent, and decreases routing overhead in various groups. Group security over Diffie-Hellman was boosted by 30% by combining RSA and DH.
Downloads
References
Jain S, Agrawal K. The impact of resource consumption attack on signal-stability based adaptive routing protocol in Manet. Indian Journal of Science and Technology. 2017 Aug;10:30.
Medi Sandhya Rani, Rekha Redamalla and K.V.N. Sunitha “Secure Group Key Exchange and Encryption Mechanism in MANETs” in Innovations in Computer Science and Engineering, 2019
Wan AnXoing and Yao Huan Gong, “Secure and Highly Efficient Three Level Key Management Scheme for Manet”, Wseas Transactions on Computers, Vol. 10, No. 10, 2011
Khalili, Katz, Jonathan and Arbaugh, A. William, “Towards secure key distribution in truly ad hoc networks”, IEEE Workshop on Security and Assurance in ad hoc Networks –2003.
Néstor J. Hetnández Marcano, Jonas Gabs Fugl Nørby, and Rune Hylsberg Jacobsen, “On Ad hoc On-Demand distance vector routing in low earth orbit nanosatellite constellations”, In IEEE 91st Vehicular Technology Conference (VTC2020-Spring), IEEE, pp. 1-6, 2020, 10.1109/VTC2020-Spring48590.2020.9128736.
Rajashanthi, M., and Valarmathi K, “Energy-efficient multipath routing in networking aid of clustering with OGFSO algorithm”, Soft Computing, pp. 1-10, 2020, 10.1007/s00500-020-04710-4.
Muthukumaran, N, “Analyzing throughput of MANET with reduced packet loss”, Wireless Personal Communications, vol. 97, no. 1, pp. 565-578, 2017.
Yimin Lv, “Security Issues in Multi-hop Device-to-device Communication Networks - Secure Routing Protocols Solution” in Journal of Physics: Conference Series 1828 (2021) doi:10.1088/1742-6596/1828/1/012117
Y. Prasad1 and R. Balakrishna, “Energy Efficient and Secured Clustering Algorithm using Fuzzy Logic with K-means Method in MANET” in Indian Journal of Science and Technology, Vol 12(19), DOI: 10.17485/ijst/2019/v12i19/144195, May 2019.
Burmester, M. and B.D. Medeiros, 2009. On the security of route discovery in MANETs. IEEE Trans. Mobile Comput., 8: 1180-1188. DOI: 10.1109/TMC.2009.13
Shu, T., M. Krunz and S. Liu, 2010. Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mobile Computing, 9: 941-954. DOI: 10.1109/TMC.2010.36
Ahmadzadeh, S.A., S.A. Motahari and A.K. Khandani, 2010. Signal Space Cooperative Communication. IEEE Trans. Wireless Communication, 9: 1266-1271. DOI: 10.1109/TWC.2010.04.090059.
Mohindra Ar, Gandhi C, A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in MANET. Walailak J Sci & Tech [Internet] 2021Mar.9 DOI: https://doi.org/10.48048/wjst.2021.8987.
Manjula T, Anand B. A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing. 2021.
Wan An Xoing and Yao Huan Gong, “Secure and Highly Efficient Three Level Key Management Scheme for Manet”, Wseas Transactions on Computers, Vol. 10, No. 10, 2011.
Rajesh Kumar Dangi, Rachna Singh Thakur, Neha Rahinj, Sankalp Rajora & Dinesh Thakur, “Key Distributed Cryptography using Key Algorithm in MANET” in International Journal of Recent Advances in Engineering & Technology (IJRAET) ISSN (Online): 2347 - 2812, Volume-5, Issue -12, 2017.
Vinitha. R. G “An Improved Efficient Data Transmission using Key Management in Mobile Ad-Hoc Network” in International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 RTICCT – 2017.
Nitika Singhi and Ravi Singh Pippal “Analysis of Key Management Schemes in MANET” in International Journal of Applied Environmental Sciences ISSN 0973-6077 Volume 13, Number 2 (2018), pp. 161-169.
Bing, Jie Wu and Yuhong Dong, “An efficient group key management scheme for mobile ad hoc network”, International Journal and Networks, Vol. 2, No.3, 2008.
K.Sanzgir, and B.Dahill, “A secure routing protocol for ad hoc networks”, Proceeding of the 10th IEEE International Conference on Network Protocols, pp.1-10, 2000.
Mr. Nikhil Surkar, Ms. Shriya Timande. (2012). Analysis of Analog to Digital Converter for Biomedical Applications. International Journal of New Practices in Management and Engineering, 1(03), 01 - 07. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/6
Vyas, A. ., & Sharma, D. A. . (2020). Deep Learning-Based Mango Leaf Detection by Pre-Processing and Segmentation Techniques. Research Journal of Computer Systems and Engineering, 1(1), 11–16. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/18
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.