Skip to main content

Advertisement

Log in

RETRACTED ARTICLE: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

This article was retracted on 20 May 2023

This article has been updated

Abstract

MANET(Mobile Adhoc Networks) possess the open system condition, absence of central server, mobile nodes that make helpless to security assault while conventional security components couldn’t meet MANET security prerequisites in view of restricted correspondence data transfer capacity, calculation power, memory and battery limit in addition to the vitality enabled environment. The trusted MANETs provide a reliable path and efficient communication but the secrecy of the trust values sometimes may be overheard by the masqueraders. Due to the need of the clustered MANETs the exchange of mathematical values remains to be a necessary part. In the proposed security of the trusted MANETs is focused so as to provide rigid and robust networks when additional resources are added. For clustering of the nodes LEACH protocol is suggested in which the CHs and CMs are fixed for the data transfer in the network. The energy is disseminated in the LEACH as to avoid the battery drain and network fatal. Hence to add resistance and to make an authentic network, the encryption and decoding is incorporated as a further supplementary to avoid the denial of service attacks, we have utilized DoS Pliancy Algorithm in which the acknowledgment based flooding attacks is focused. Likewise the encoded messages from the source node in one cluster can be recoded in the transmission stage itself to reproduce the messages. Contrasted with the past works, QoS of our proposed work has been made strides when tested with black hole and sink hole attacks. Simulation results shows that the DoS pliancy scheme works better and efficient when compared to the existing trust based systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Change history

References

  1. Antoo A et al (2014) EEM-LEACH: energy efficient multi-hop LEACH routing protocol for clustered WSNs. 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT), 978-1-4799-4190-2/14 ©2014 IEEE

  2. Bala Anand M, Karthikeyan N, Karthik S (2018) Designing a framework for communal software: based on the assessment using relation modelling. Int J Parallel Prog. https://doi.org/10.1007/s10766-018-0598-2

  3. Bhosle A, Pandey Y (2013) Applying security to data using symmetric encryption in MANET. Int J Emerging Technol Adv Eng 3(1):426–430

    Google Scholar 

  4. Breivold HP, Sandstrom K (2015) Internet of Things for Industrial Automation-Challenges and Technical Solutions. Proceedings - 2015 IEEE International Conference on Data Science and Data Intensive Systems, pp 532–539

  5. Brittadevi V, Hemalatha P (2018) A smart agriculture assisting robot using internet of things. Int J Trends Eng Technol 28(1):2349–9303

    Google Scholar 

  6. Chen W, Yeung D-Y (2006) Defending against TCP SYN flooding attacks under different types of IP spoofing. Networking, international conference on mobile communications and learning technologies, 2006. IEEE

  7. Dhall R, Solanki V (2017) An IoT Based Predictive Connected Car Maintenance Approach. Int J Interact Multimed Artif Intell 4(3):16–22. https://doi.org/10.9781/ijimai.2017.433

    Article  Google Scholar 

  8. Dorri A, Kamel SR, kheyrkhah E (2015) Security challenges in Mobile Ad Hoc Netwok: a survey. Int J Comput Sci Eng Surv (IJCSES) 6(1). https://doi.org/10.5121/ijcses.2015.6102

  9. Geetha K (2014) SYN flooding attacks in mobile adhoc networks, (IJCSIT). Int J Comput Sci Inf Technol 5(4):5033–5503

    Google Scholar 

  10. Hemalatha P, Dhanalakshmi K (2017) Development of IOT enabled robotic guide dog for visually impaired people to enhance the guiding and interacting experience. JARDCS, Scopus(Elsevier) 02(Special Issue):262–272

    Google Scholar 

  11. Hemalatha P, Dhanalakshmi K, Matilda S, Bala Anand M (2018) Farmbot-a smart agriculture assistor using internet of things. Int J Pure Appl Math, Special Issue 119(10):557–566 ISSN: 1311–8080 (printed version); ISSN: 1314–3395 (on-line version)

    Google Scholar 

  12. Jhaveri RH, Patel SJ, Jinwala DC (2012) DoS attacks in mobile ad hoc networks: a survey. Second international conference on advanced computing & communication technologies (ACCT)

  13. Kim Y, Hyunggoy O, Kang S (2017) Proof of Concept of Home IoT Connected Vehicles. Sensors (Basel) 17(6):1289. https://doi.org/10.3390/s17061289 Published online 2017 Jun 5.

    Article  Google Scholar 

  14. Kumar A, Gopal K, Aggarwal A (2012) A complete, efficient and lightweight cryptography solution for resource contrainst mobile ad-hoc networks. 2nd IEEE international conference on parallel, distributed and grid computing, pp854–860

  15. Li C, Wang G (2012) A light-weight commodity integrity detection algorithm based on Chinese remainder theorem. IEEE 11th international conference on trust, security and privacy in computing and communications, pp 1018–1023

  16. Liu J, Sangi AR, Du R, Wu Q (2013) Light Weight Network Coding Based Key Distribution Scheme for MANETs. In: Lopez J, Huang X, Sandhu R (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_38

    Chapter  Google Scholar 

  17. Michael A, Nadeem (2009) Adaptive intrusion detection & prevention of denial of service attacks in MANETs. IWCMC '09 proceedings of the international conference on wireless communications and mobile computing, connecting the world wirelessly

  18. Patel R, Pariyani S, Ukani V (2011) Article: Energy and Throughput Analysis of Hierarchical Routing Protocol (LEACH) for Wireless Sensor Network. Int J Comput Appl 20(4):32–36. https://doi.org/10.5120/2420-3247

    Article  Google Scholar 

  19. Shanthi K, Murugan D (2017) Pair-wise key agreement and hop-by-hop authentication protocol for MANET. Wirel Netw 23:1025–1033. https://doi.org/10.1007/s11276-015-1191-x

    Article  Google Scholar 

  20. Singhai P, Saluja NK (2016) Survey of Low Energy Low Cost Base Route Selection using LEACH in MANET. Int J Sci Res Dev 3(12):2321–0613

    Google Scholar 

  21. Soryal J, Saadawi T (2012) IEEE 802.11 denial of service attack detection in MANET. Wireless telecommunications symposium (WTS)

  22. Su J, Liu H (2011) Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network. In: Zeng D (ed) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_31

    Chapter  Google Scholar 

  23. Supriya KM (2012) Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey. In: Meghanathan N, Chaki N, Nagamalai D (eds) Advances in Computer Science and Information Technology. Networks and Communications. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27299-8_14

    Chapter  Google Scholar 

  24. Tajamolian M, Taghiloo M, Tajamolian M (2009) Lightweight secure IP address autoconfiguration based on VASM. International conference on advanced information networking and applications workshops, pp 176–180

  25. Tseng YC, Jiang JR, Lee JH (2003) Secure bootstrapping and routing in an IPv6-based ad hoc network. Proceedings of the International Conference on Parallel Processing Workshops (ICPPW’03), pp 375–382

  26. Vimalkumar S, Hemalatha P, Kalaivani J (2018) A review on smart IOT car for accident prevention. Asian J Appl Sci Technol 2(1):287–292

    Google Scholar 

  27. Yu PH, Pooch UW (2011) Security and Dynamic Encryption System in Mobile Ad-Hoc Network, Mobile Ad-Hoc Networks Xin Wang, IntechOpen. https://doi.org/10.5772/12843. Available from: https://www.intechopen.com/books/mobile-ad-hoc-networks-protocol-design/security-and-dynamic-encryption-system-in-mobile-ad-hoc-network

  28. Zhang P, Lin C, Jiang Y, Fan Y, Shen X (2014) A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks. IEEE Trans Parallel Distrib Syst 25(9):2211–2221. https://doi.org/10.1109/TPDS.2013.161

    Article  Google Scholar 

  29. Zhao X, You Z, Zhao Z, Chen D, Peng F (2010) Availability based trust model of clusters for MANET. 7th international conference on service systems and service management (ICSSSM), Tokyo, pp 1–6

  30. Zhao S, Kent RD, Aggarwal A (2012) An integrated key management and secure routing framework for mobile ad-hoc networks. Tenth annual international conference on privacy, security and trust, pp 96–103

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Anbarasan.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s11042-023-15836-6

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anbarasan, M., Prakash, S., Antonidoss, A. et al. RETRACTED ARTICLE: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks. Multimed Tools Appl 79, 8929–8949 (2020). https://doi.org/10.1007/s11042-018-6777-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6777-8

Keywords

Navigation