Hybrid Cryptographic Routing Algorithm for Implementation of Secure Routing in MANET’s

Authors

  • Sangeetha Y. Professor & HOD, Dept. Of Computer Science & Engineering, Rajadhani Institute of Engineering & Technology, Trivandrum, Kerala, India
  • Resmi G. Nair Professor, Department of CSE, SNGIST GROUP OF INSTITUTIONS, North Paravur, Ernakulam, Kerala, India

Keywords:

Cryptographic, Routing, Manet’s, Wireless Mobile Nodes, SHA-3

Abstract

To put it simply, a Mobile Ad Hoc Network (MANET) is a network that has been built out of wireless mobile nodes that does not rely on any preexisting infrastructure. All the nodes of a MANET are able to freely and flexibly exchange data and information with one another. As wireless technology improves and mobile devices become more widely available, MANETs are gaining in popularity. Security in MANET is difficult because of its unique characteristics, such as the random behavior of its nodes, the lack of a centralized authority figure, and the limited availability of resources. One of MANET's most important factors is its energy consumption. As a result, it is crucial to consider the high-velocity MANET environment when building the system that supports energy efficiency. In this work, we present a hybrid routing protocol that combines Digital Certificate authority and SHA-3 authentication with robust route failure detection. To reduce the number of failed communications in Mobile Ad-hoc Networks, the authors of this research propose a new routing strategy based on the SHA-3 cryptographic method. By identifying the attacks and eliminating the malicious node from the network, we suggest a way to help safeguard these systems against this vulnerability. We compared the proposed cryptographic technique SHA-3 along with its peer algorithms in terms of various parameters and evaluated the results.

Downloads

Download data is not yet available.

References

Ben Othman, J.; Mokdad, L. Enhancing data security in ad hoc networks based on multipath routing. J. Parallel Distrib. Comput.2010, 70, 309–316.

Kumar, K.V.; Jayasankar, T.; Eswaramoorthy, V.; Nivedhitha, V. SDARP: Security based Data Aware Routing Protocol for ad hoc sensor networks. Int. J. Intell. Netw. 2020, 1, 36–42.

El-Hadidi, M.G.; Azer, M.A. Traffic Analysis for Real Time Applications and its Effect on QoS in MANETs. In Proceedings of the 2021 International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), Cairo, Egypt, 26–27 May 2021; pp. 155–160.

Wu, W.C.; Liaw, H.T. A Study on High Secure and Efficient MANET Routing Scheme. J. Sens. 2015, 2015, e365863.

Devi, V.S.; Hegde, N.P. Multipath Security Aware Routing Protocol for MANET Based on Trust Enhanced Cluster Mechanism for Lossless Multimedia Data Transfer. Wirel. Pers. Commun. Int. J. 2018, 100, 923–940.

Gomathy, V.; Padhy, N.; Samanta, D.; Sivaram, M.; Jain, V.; Amiri, I.S. Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. J. Ambient Intell. Humaniz. Comput. 2020, 11, 4995–5001.

Kousar, R.; Alhaisoni, M.; Akhtar, S.A.; Shah, N.; Qamar, A.; Karim, A. A Secure Data Dissemination in a DHT-Based Routing Paradigm for Wireless Ad Hoc Network. Wirel. Commun. Mob. Comput. 2020, 2020, e2740654.

Maheswari, M.; Geetha, S.; Kumar, S.S.; Karuppiah, M.; Samanta, D.; Park, Y. PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications. IEEE Access 2021, 9, 20819–20827.

Funderburg, L.E.; Lee, I.Y. A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs.Sensors 2021, 21, 1063.

Perkins, C.E.; Bhagwat, P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput. Commun. Rev. 1994, 24, 234–244.

Perkins, C. Ad Hoc on Demand Distance Vector (aodv) Routing Ietf. Internet Draft, draft-ietf-manet-aodv-00.txt. 1997. Available online: https://datatracker.ietf.org/doc/rfc3561/

Broch, J.; Johnson, D.B.; Maltz, D.A. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. draft-ietfmanet-dsr-03. txt. Work-in-Progress. 1998. Available online: https://www.ietf.org/proceedings/42/I-D/draft-ietf-manet-dsr-00.txt

Saxena, N.; Tsudik, G.; Yi, J.H. Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.IEEE Trans. Parallel Distrib. Syst. 2009, 20, 158–170.

El Defrawy, K.; Tsudik, G. ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. IEEE Trans. Mob. Comput.2011, 10, 1345–1358.

Khan, A.; Sun, Q.T.; Mahmood, Z.; Ghafoor, A.U. Energy efficient partial permutation encryption on network coded MANETs. J. Electr. Comput. Eng. 2017, 2017, 4657831.

Dhurandher, S.K.; Obaidat, M.S.; Verma, K.; Gupta, P.; Dhurandher, P. FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems. IEEE Syst. J. 2011, 5, 176–188.

Chen, S.; Wu, M. Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks. J. Syst. Eng. Electron. 2011, 22, 519–527.

Hammamouche, A.; Omar, M.; Djebari, N.; Tari, A. Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. J. Inf. Secur. Appl. 2018, 43, 12–20.

Subramaniyan, S.; Johnson, W.; Subramaniyan, K. A distributed framework for detecting selfish nodes in MANET using Record- and Trust-Based Detection (RTBD) technique. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 205.

Cong Liu, Jie Wu, “Virtual-Force-Based Geometric Routing Protocol in MANETs”, IEEE, June 2008.

Zehua Wang, Yuanzhu Chen; Cheng Li, “PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks”, IEEE, August 2013.

Lavanya. Poluboyina, Sivakumar Reddy. V, Mallikarjuna Prasad. A, "Evaluation of QoS Support of AODV and its Multicast Extension for Multimedia over MANETs", International Journal of Computer Network and Information Security (IJCNIS),Vol.12, No.1, pp.13-19, 2020. DOI: 10.5815/ijcnis.2020.01.02

Ritu Sharma, “A Secure and Proficient Routing Protocol in Mobile Ad-hoc Networks using Genetic Mechanism”, IJIRCCE,June 2016

Fan Bai , A.Manikandan, S.Pradeep, “Quantitative Analysis of Network Arrangement in Randomized Appropriation in WSN” Journal of Chemical and Pharmaceutical Sciences, pp 181-184, 2017.

Michal Pióro,Dritan NaceYoann and Fouquet, “On Protected Traffic Routing in Wireless Networks with Partial Multiple Link Failures”, IEEE Computer Society Washington, 2013.

Manikandan, A., & Rajarajachozhan, C. (2017). Artificial Bee Colony for Socially Aware Networking. Journal of Chemical and Pharmaceutical Sciences, 2, 299–301.

Jihui Zhang,Qian Zhang,Bo Li,Xiaonan Luo, “Energy-efficient routing in mobile ad hoc networks: mobility-assisted case”, IEEE, Jan 2016.

Mahaboob Sharief Shaik, Fahad Mira, " A Comprehensive Mechanism of MANET Network Layer Based Security Attack Prevention ", International Journal of Wireless and Microwave Technologies (IJWMT), Vol.10, No.1, pp. 38-47, 2020.

M.S Kumar, “Prediction of Heart Attack from Medical Records Using Big Data Mining",International Journal of Intelligent Systems and Applications in Engineering, 2023, 11(4s), pp. 90–99.

M.S Kumar,"Nature-Inspired Optimisation-Based Regression Based Regression to Study the Scope of Professional Growth in Small and Medium Enterprises, International Journal of Intelligent Systems and Applications in Engineering, 2023, 11(4s), pp. 100–108.

Natarajan, V.A., "Improving QoS in Wireless Sensor Network routing using Machine Learning Techniques", Proceedings of the 1st IEEE International Conference on Networking and Communications 2023, ICNWC 2023, 2023.

M.S Kumar, "Chronic Kidney Disease Prediction Using Machine Learning",Journal of Advances in Information Technology, 2023, 14(2), pp. 384–391.

D Ganesh, “Deep Convolution Neural Network Based solution for Detecting Plant Diseases", Journal of Pharmaceutical Negative Results, 2022, 13, pp. 464–471

D ganesh, "Implementation of Novel Machine Learning Methods for Analysis and Detection of Fake Reviews in Social Media", 2nd International Conference on Sustainable Computing and Data Communication Systems, ICSCDS 2023 - Proceedings, 2023, pp. 243–250

Ganesh, D., Kumar, T. P., & Kumar, M. S. (2021). Optimised Levenshtein centroid cross‐layer defence for multi‐hop cognitive radio networks. IET Communications, 15(2), 245-256.

Sushama et.al, "Impact of COVID-19 pandemic and the diagnosis of the virus in the human body",World Journal of Engineeringthis link is disabled, 2022, 19(5), pp. 652–657

AnanthaNatarajan, V., Kumar, M. S., & Tamizhazhagan, V. (2020). Forecasting of Wind Power using LSTM Recurrent Neural Network. Journal of Green Engineering, 10.

Sushama et.al, Automated extraction of non-functional requirements from text files: A supervised learning approach", Handbook of Intelligent Computing and Optimization for Sustainable Development, 2022, pp. 149–170

Alia Arshad, Dur-e-Shahwarkundi and ArashReyhaniMasoleh, Compact Implementation of SHA3-512 on FPGA, 2022 Conference on Information Assurance and Cyber Security (CIACS).

Aluka, M. ., Dixit, R. ., & Kumar, P. . (2023). Enhancing and Detecting the Lung Cancer using Deep Learning. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3s), 127–134. https://doi.org/10.17762/ijritcc.v11i3s.6173

Dwarkanath Pande, S. ., & Hasane Ahammad, D. S. . (2022). Cognitive Computing-Based Network Access Control System in Secure Physical Layer. Research Journal of Computer Systems and Engineering, 3(1), 14–20. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/36

Downloads

Published

04.11.2023

How to Cite

Y. , S. ., & Nair, R. G. . (2023). Hybrid Cryptographic Routing Algorithm for Implementation of Secure Routing in MANET’s. International Journal of Intelligent Systems and Applications in Engineering, 12(3s), 202–208. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3698

Issue

Section

Research Article