Abstract
MANET(Mobile Adhoc Networks) possess the open system condition, absence of central server, mobile nodes that make helpless to security assault while conventional security components couldn’t meet MANET security prerequisites in view of restricted correspondence data transfer capacity, calculation power, memory and battery limit in addition to the vitality enabled environment. The trusted MANETs provide a reliable path and efficient communication but the secrecy of the trust values sometimes may be overheard by the masqueraders. Due to the need of the clustered MANETs the exchange of mathematical values remains to be a necessary part. In the proposed security of the trusted MANETs is focused so as to provide rigid and robust networks when additional resources are added. For clustering of the nodes LEACH protocol is suggested in which the CHs and CMs are fixed for the data transfer in the network. The energy is disseminated in the LEACH as to avoid the battery drain and network fatal. Hence to add resistance and to make an authentic network, the encryption and decoding is incorporated as a further supplementary to avoid the denial of service attacks, we have utilized DoS Pliancy Algorithm in which the acknowledgment based flooding attacks is focused. Likewise the encoded messages from the source node in one cluster can be recoded in the transmission stage itself to reproduce the messages. Contrasted with the past works, QoS of our proposed work has been made strides when tested with black hole and sink hole attacks. Simulation results shows that the DoS pliancy scheme works better and efficient when compared to the existing trust based systems.
Similar content being viewed by others
Change history
20 May 2023
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s11042-023-15836-6
References
Antoo A et al (2014) EEM-LEACH: energy efficient multi-hop LEACH routing protocol for clustered WSNs. 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT), 978-1-4799-4190-2/14 ©2014 IEEE
Bala Anand M, Karthikeyan N, Karthik S (2018) Designing a framework for communal software: based on the assessment using relation modelling. Int J Parallel Prog. https://doi.org/10.1007/s10766-018-0598-2
Bhosle A, Pandey Y (2013) Applying security to data using symmetric encryption in MANET. Int J Emerging Technol Adv Eng 3(1):426–430
Breivold HP, Sandstrom K (2015) Internet of Things for Industrial Automation-Challenges and Technical Solutions. Proceedings - 2015 IEEE International Conference on Data Science and Data Intensive Systems, pp 532–539
Brittadevi V, Hemalatha P (2018) A smart agriculture assisting robot using internet of things. Int J Trends Eng Technol 28(1):2349–9303
Chen W, Yeung D-Y (2006) Defending against TCP SYN flooding attacks under different types of IP spoofing. Networking, international conference on mobile communications and learning technologies, 2006. IEEE
Dhall R, Solanki V (2017) An IoT Based Predictive Connected Car Maintenance Approach. Int J Interact Multimed Artif Intell 4(3):16–22. https://doi.org/10.9781/ijimai.2017.433
Dorri A, Kamel SR, kheyrkhah E (2015) Security challenges in Mobile Ad Hoc Netwok: a survey. Int J Comput Sci Eng Surv (IJCSES) 6(1). https://doi.org/10.5121/ijcses.2015.6102
Geetha K (2014) SYN flooding attacks in mobile adhoc networks, (IJCSIT). Int J Comput Sci Inf Technol 5(4):5033–5503
Hemalatha P, Dhanalakshmi K (2017) Development of IOT enabled robotic guide dog for visually impaired people to enhance the guiding and interacting experience. JARDCS, Scopus(Elsevier) 02(Special Issue):262–272
Hemalatha P, Dhanalakshmi K, Matilda S, Bala Anand M (2018) Farmbot-a smart agriculture assistor using internet of things. Int J Pure Appl Math, Special Issue 119(10):557–566 ISSN: 1311–8080 (printed version); ISSN: 1314–3395 (on-line version)
Jhaveri RH, Patel SJ, Jinwala DC (2012) DoS attacks in mobile ad hoc networks: a survey. Second international conference on advanced computing & communication technologies (ACCT)
Kim Y, Hyunggoy O, Kang S (2017) Proof of Concept of Home IoT Connected Vehicles. Sensors (Basel) 17(6):1289. https://doi.org/10.3390/s17061289 Published online 2017 Jun 5.
Kumar A, Gopal K, Aggarwal A (2012) A complete, efficient and lightweight cryptography solution for resource contrainst mobile ad-hoc networks. 2nd IEEE international conference on parallel, distributed and grid computing, pp854–860
Li C, Wang G (2012) A light-weight commodity integrity detection algorithm based on Chinese remainder theorem. IEEE 11th international conference on trust, security and privacy in computing and communications, pp 1018–1023
Liu J, Sangi AR, Du R, Wu Q (2013) Light Weight Network Coding Based Key Distribution Scheme for MANETs. In: Lopez J, Huang X, Sandhu R (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_38
Michael A, Nadeem (2009) Adaptive intrusion detection & prevention of denial of service attacks in MANETs. IWCMC '09 proceedings of the international conference on wireless communications and mobile computing, connecting the world wirelessly
Patel R, Pariyani S, Ukani V (2011) Article: Energy and Throughput Analysis of Hierarchical Routing Protocol (LEACH) for Wireless Sensor Network. Int J Comput Appl 20(4):32–36. https://doi.org/10.5120/2420-3247
Shanthi K, Murugan D (2017) Pair-wise key agreement and hop-by-hop authentication protocol for MANET. Wirel Netw 23:1025–1033. https://doi.org/10.1007/s11276-015-1191-x
Singhai P, Saluja NK (2016) Survey of Low Energy Low Cost Base Route Selection using LEACH in MANET. Int J Sci Res Dev 3(12):2321–0613
Soryal J, Saadawi T (2012) IEEE 802.11 denial of service attack detection in MANET. Wireless telecommunications symposium (WTS)
Su J, Liu H (2011) Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network. In: Zeng D (ed) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_31
Supriya KM (2012) Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey. In: Meghanathan N, Chaki N, Nagamalai D (eds) Advances in Computer Science and Information Technology. Networks and Communications. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27299-8_14
Tajamolian M, Taghiloo M, Tajamolian M (2009) Lightweight secure IP address autoconfiguration based on VASM. International conference on advanced information networking and applications workshops, pp 176–180
Tseng YC, Jiang JR, Lee JH (2003) Secure bootstrapping and routing in an IPv6-based ad hoc network. Proceedings of the International Conference on Parallel Processing Workshops (ICPPW’03), pp 375–382
Vimalkumar S, Hemalatha P, Kalaivani J (2018) A review on smart IOT car for accident prevention. Asian J Appl Sci Technol 2(1):287–292
Yu PH, Pooch UW (2011) Security and Dynamic Encryption System in Mobile Ad-Hoc Network, Mobile Ad-Hoc Networks Xin Wang, IntechOpen. https://doi.org/10.5772/12843. Available from: https://www.intechopen.com/books/mobile-ad-hoc-networks-protocol-design/security-and-dynamic-encryption-system-in-mobile-ad-hoc-network
Zhang P, Lin C, Jiang Y, Fan Y, Shen X (2014) A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks. IEEE Trans Parallel Distrib Syst 25(9):2211–2221. https://doi.org/10.1109/TPDS.2013.161
Zhao X, You Z, Zhao Z, Chen D, Peng F (2010) Availability based trust model of clusters for MANET. 7th international conference on service systems and service management (ICSSSM), Tokyo, pp 1–6
Zhao S, Kent RD, Aggarwal A (2012) An integrated key management and secure routing framework for mobile ad-hoc networks. Tenth annual international conference on privacy, security and trust, pp 96–103
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s11042-023-15836-6
About this article
Cite this article
Anbarasan, M., Prakash, S., Antonidoss, A. et al. RETRACTED ARTICLE: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks. Multimed Tools Appl 79, 8929–8949 (2020). https://doi.org/10.1007/s11042-018-6777-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6777-8