Skip to main content
Log in

Data Security-Based Routing in MANETs Using Key Management Mechanism

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Multicast standalone networks are inclusive of wireless nodes that are portable and can operate without framework. Nodes in an MANET can communicate freely and dynamically with one another. Unfortunately, malicious nodes are vulnerable to serious security flaws that are challenging to counter with the current mechanisms in place today. Multiple secure routing methods were established as a consequence to increase MANET cybersecurity. An effective and protected route system based on team clue management is proposed in this study. Asymmetric key cryptography is employed, with two specialised nodes known as the distribution key and the calculator key. These are the two devices that keep track of the hidden clue production, corroboration, and distribution. While there is an outcome, no further calculations are required by the other nodes to create the private keys. In accordance with power use and acceptance, nodes are picked at different levels. Every vertex in the technique must produce and distribute its own secret clue, resulting in greater energy distribution. A safety violation should also happen if any vertex is hacked. When nodes besides the DK and CK are compromised, the security of the complete connection is not threatened. Extensive tests are carried out while taking into account the current and suggested methods. According to performance evaluations, the suggested procedure performs better than competing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Badis H, Sherali Z, Houda L, Rida K, Youcef B, Lyes K. A secure multipath reactive protocol for routing in IoT and HANETs. Ad Hoc Netw. 2020;103:102118. https://doi.org/10.1016/j.adhoc.2020.102118. (ISSN 1570-8705).

    Article  Google Scholar 

  2. Vinoth Kumar K, Jayasankar T, Eswaramoorthy V, Nivedhitha V. SDARP: security based data aware routing protocol for ad hoc sensor networks. Int J Intell Netw. 2020;1:36–42. https://doi.org/10.1016/j.ijin.2020.05.005.

    Article  Google Scholar 

  3. El-Hadidi MG, Azer MA (2021) Traffic Analysis for Real Time Applications and its Effect on QoS in MANETs. In: 2021 International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), pp. 155–160. https://doi.org/10.1109/MIUCC52538.2021.9447611

  4. Hwanseok Y. A study on improving secure routing performance using trust model in MANET. Mob Inform Syst. 2020;2020:17. https://doi.org/10.1155/2020/8819587. (Article ID 8819587).

    Article  Google Scholar 

  5. Mohammad S, Rupa C, Iwendi C, Biamba C. TBSMR: a trust-based secure multipath routing protocol for enhancing the QoS of the mobile ad hoc network. Secur Commun Netw. 2021;2021:9. https://doi.org/10.1155/2021/5521713.

    Article  Google Scholar 

  6. Gomathy V, Padhy N, Samanta D, et al. Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. J Ambient Intell Human Comput. 2020;11:4995–5001. https://doi.org/10.1007/s12652-020-01797-3.

    Article  Google Scholar 

  7. Rukhsana K, Majed A, Shahbaz AA, Nadir S, Aamir Q, Ahmad K. A Secure data dissemination in a DHT-based routing paradigm for wireless ad hoc network. Wirel Commun Mob Comput. 2020;2020:32. https://doi.org/10.1155/2020/2740654. (Article ID 2740654).

    Article  Google Scholar 

  8. Maheswari M, Geetha S, Kumar SS, Karuppiah M, Samanta D, Park Y. PEVRM: probabilistic evolution based version recommendation model for mobile applications. IEEE Access. 2021;9:20819–27. https://doi.org/10.1109/ACCESS.2021.3053583.

    Article  Google Scholar 

  9. Funderburg LE, Lee I-Y. A privacy-preserving key management scheme with support for sybil attack detection in VANETs. Sensors. 2021;21:1063. https://doi.org/10.3390/s21041063.

    Article  Google Scholar 

  10. Arega KL. Survey on performance analysis of AODV, DSR and DSDV in MANET. Comput Eng Intell Syst. 2020;11:23–32. https://doi.org/10.7176/ceis/11-3-03.

    Article  Google Scholar 

  11. Le P. About ad hoc on-demand multi-path distance vector routing for mobile ad hoc networks. IJARCCE. 2020;9:1–5. https://doi.org/10.17148/IJARCCE.2020.91001.

    Article  Google Scholar 

  12. Almazok SA, Bilgehan B. A novel dynamic source routing (DSR) protocol based on minimum execution time scheduling and moth flame optimization (MET-MFO). J Wirel Com Netw. 2020;2020:219. https://doi.org/10.1186/s13638-020-01802-5.

    Article  Google Scholar 

  13. Khan MA, et al. An efficient and provably secure certificateless key-encapsulated signcryption scheme for flying ad-hoc network. IEEE Access. 2020;8:36807–28. https://doi.org/10.1109/ACCESS.2020.2974381.

    Article  Google Scholar 

  14. Balasubramanian M, Hyunsung K, Surya Prasath VB. Location verification technique for cluster based geographical routing in MANET. Informatica. 2020;31(1):113–30. https://doi.org/10.15388/20-INFOR402.

    Article  MathSciNet  Google Scholar 

  15. Ning Z, Shi W, Xiao L, Liang W, Weng T-H. A novel approach for anti-pollution attacks in network coding. Connect Sci. 2021;33(3):447–62. https://doi.org/10.1080/09540091.2020.1841109.

    Article  Google Scholar 

  16. Olanrewaju R, Khan B, Anwar F, Rasool B, Mir R. MANET security appraisal: challenges, essentials, attacks. Countermeasur Fut Direct. 2020;8:3013–24. https://doi.org/10.35940/ijrte.E6537.038620.

    Article  Google Scholar 

  17. Ran C, Yan S, Huang L, et al. An improved AODV routing security algorithm based on blockchain technology in ad hoc network. J Wirel Com Netw. 2021;2021:52. https://doi.org/10.1186/s13638-021-01938-y.

    Article  Google Scholar 

  18. Abhay B, Anil K, Arpit J, Adesh K, Chaman V, Zoltan I, Ioan A, Maria SR. Networked control system with MANET communication and AODV routing. Heliyon. 2022;8(11):e11678. https://doi.org/10.1016/j.heliyon.2022.e11678. (ISSN 2405-8440).

    Article  Google Scholar 

  19. Zhifei W, Gang X, Na Z, Zhihan Q, Fengqi W, Liqiang H. Ferry node identification model for the security of mobile ad hoc network. Secur Commun Netw. 2021;2021:13. https://doi.org/10.1155/2021/6682311. (Article ID 6682311).

    Article  Google Scholar 

  20. Gholamreza F. Black hole attack detection using K-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks. Secur Commun Netw. 2021;2021:15. https://doi.org/10.1155/2021/8814141. (Article ID 8814141).

    Article  Google Scholar 

  21. Hemalatha S, Kshirsagar PR, Hariprasath Manoharan N, Vasantha Gowri A, Vani SQ, et al. Novel link establishment communication scheme against selfish attack using node reward with trust level evaluation algorithm in MANET. Wirel Commun Mob Comput. 2022;2022:9. https://doi.org/10.1155/2022/6776378. (Article ID 6776378).

    Article  Google Scholar 

  22. Veeraiah N, et al. Trust aware secure energy efficient hybrid protocol for MANET. IEEE Access. 2021;9:120996–1005. https://doi.org/10.1109/ACCESS.2021.3108807.

    Article  MathSciNet  Google Scholar 

  23. Srilakshmi U, Veeraiah N, Alotaibi Y, Alghamdi SA, Khalaf OI, Subbayamma BV. An improved hybrid secure multipath routing protocol for MANET. IEEE Access. 2021;9:163043–53. https://doi.org/10.1109/ACCESS.2021.3133882.

    Article  Google Scholar 

  24. Elhoseny M, Shankar K. Reliable data transmission model for mobile ad hoc network using signcryption technique. IEEE Trans Reliab. 2020;69(3):1077–86. https://doi.org/10.1109/TR.2019.2915800.

    Article  Google Scholar 

  25. Sankaran KS, Vasudevan N, Devabalaji KR, Babu TS, Alhelou HH, Yuvaraj T. A recurrent reward based learning technique for secure neighbor selection in mobile AD-HOC networks. IEEE Access. 2021;9:21735–45. https://doi.org/10.1109/ACCESS.2021.3055422.

    Article  Google Scholar 

  26. Zahid S, Ullah K, Waheed A, Basar A, Zareei M, Biswal RR. Fault Tolerant DHT-based routing in MANET. Sensors. 2022;22:4280. https://doi.org/10.3390/s22114280.

    Article  Google Scholar 

  27. Sindhwani M, Sachdeva S, Arora K, Yoon T, Yoo D, Joshi GP, Cho W. Soft computing techniques aware clustering-based routing protocols in vehicular ad hoc networks: a review. Appl Sci. 2022;12:7922. https://doi.org/10.3390/app12157922.

    Article  Google Scholar 

  28. Kaur M, Singh D, Kumar V, Gupta BB, Abd El-Latif AA. Secure and energy efficient-based e-health care framework for green internet of things. IEEE Trans Green Commun Netw. 2021;5(3):1223–31. https://doi.org/10.1109/TGCN.2021.3081616.

    Article  Google Scholar 

  29. Chalew ZS, Mekuanint AB. Mobility-aware routing algorithm for mobile ad hoc networks. Wirel Commun Mob Comput. 2021;2021:12. https://doi.org/10.1155/2021/6672297. (Article ID 6672297).

    Article  Google Scholar 

  30. Yaohua C, Waixi L. MAC layer energy consumption and routing protocol optimization algorithm for mobile ad hoc networks. Complexity. 2021;2021:12. https://doi.org/10.1155/2021/6687189. (Article ID 6687189).

    Article  Google Scholar 

  31. Singh T, Saxena N, Khurana M, Singh D, Abdalla M, Alshazly H. Data clustering using moth-flame optimization algorithm. Sensors. 2021;21:4086. https://doi.org/10.3390/s21124086.

    Article  Google Scholar 

  32. Mei S, Yuyan G, Dongbing Z, Ming MJ. Anonymous authentication and key agreement scheme combining the group key for vehicular ad hoc networks. Complexity. 2021;2021:13. https://doi.org/10.1155/2021/5526412. (Article ID 5526412).

    Article  Google Scholar 

  33. Shibu KR, Suji Pramila R. Load based key generation for MANETs: a comparative study with DSR and AODV. Wirel Pers Commun. 2021;116:1703–12. https://doi.org/10.1007/s11277-020-07757-6.

    Article  Google Scholar 

  34. Pamarthi S, Narmadha R. Adaptive key management-based cryptographic algorithm for privacy preservation in wireless mobile adhoc networks for IoT applications. Wirel Pers Commun. 2022;124:349–76. https://doi.org/10.1007/s11277-021-09360-9.

    Article  Google Scholar 

  35. Jaber G, Kacimi R. A collaborative caching strategy for content-centric enabled wireless sensor networks. Comput Commun. 2020;159:60–70. https://doi.org/10.1016/j.comcom.2020.05.018.

    Article  Google Scholar 

  36. Li M, Gu Z, Long Y, Shu X, Rong Q, Ma Z, Shao X. W-GPCR routing method for vehicular ad hoc networks. Sensors. 2020;20:3406. https://doi.org/10.3390/s20123406.

    Article  Google Scholar 

  37. Ronaldo C, da Costa B, Emilio CGW. Bio-inspired routing algorithm for MANETs based on fungi networks. Ad Hoc Netw. 2020;107:102248. https://doi.org/10.1016/j.adhoc.2020.102248. (ISSN 1570-8705).

    Article  Google Scholar 

  38. Firdose S, Marios A, Dimitrios S, Nina S, Dimitrios D, John V, Aris L, Nikolaos A, Nathalie M, Symeon P. Task offloading in edge and cloud computing: a survey on mathematical, artificial intelligence and control theory solutions. Comput Netw. 2021;195:108177. https://doi.org/10.1016/j.comnet.2021.108177. (ISSN 1389-1286).

    Article  Google Scholar 

  39. Yang L, Yingqi F, Darong H, Bo M, Liyuan H. Formal model and analysis for the random event in the intelligent car with stochastic petri nets and Z. Secur Commun Netw. 2022;2022:18. https://doi.org/10.1155/2022/3288308. (Article ID 3288308).

    Article  Google Scholar 

  40. Tumakov D, Kayumov Z, Zhumaniezov A, Chikrin D, Galimyanov D. Elimination of defects in mammograms caused by a malfunction of the device matrix. J Imaging. 2022;8:128. https://doi.org/10.3390/jimaging8050128.

    Article  Google Scholar 

  41. Hu G, Chen SHK, Mazur N. Deep neural network-based speaker-aware information logging for augmentative and alternative communication. J Artif Intell Technol. 2021. https://doi.org/10.37965/jait.2021.0017.

    Article  Google Scholar 

  42. Ghosh S, Shivakumara P, Roy P, Pal U, Lu T. Graphology based handwritten character analysis for human behaviour identification. CAAI Trans Intell Technol. 2020;5:55–65. https://doi.org/10.1049/trit.2019.0051.

    Article  Google Scholar 

  43. Jiang D, Hu G, Qi G, Neal M. A fully convolutional neural network-based regression approach for effective chemical composition analysis using near-infrared spectroscopy in cloud. J Artif Intell Technol. 2021;1(1):74–82. https://doi.org/10.37965/jait.2020.0037.

    Article  Google Scholar 

  44. Xu Y, Qiu TT. Human activity recognition and embedded application based on convolutional neural network. J Artif Intell Technol. 2020;1(1):51–60. https://doi.org/10.37965/jait.2020.0051.

    Article  Google Scholar 

  45. Basavegowda HS, Dagnew G. Deep learning approach for microarray cancer data classification. CAAI Trans Intell Technol. 2020;5:22–33. https://doi.org/10.1049/trit.2019.0028.

    Article  Google Scholar 

  46. Manjit K, Vijay K, Vaishali Y, Dilbag S, Naresh K, Nripendra ND. Metaheuristic-based Deep COVID-19 screening model from chest X-ray images. J Healthc Eng. 2021;2021:9. https://doi.org/10.1155/2021/8829829. (Article ID 8829829).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ritesh Sadiwala.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Wireless Networks and Mobile Systems” guest edited by Jaime Lloret Mauri and Joel Rodrigues.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hande, J.Y., Sadiwala, R. Data Security-Based Routing in MANETs Using Key Management Mechanism. SN COMPUT. SCI. 5, 155 (2024). https://doi.org/10.1007/s42979-023-02409-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02409-5

Keywords

Navigation