Cluster Computing

, Volume 22, Supplement 2, pp 4017–4025 | Cite as

A curve based cryptography for wireless security in MANET

  • N. SrideviEmail author
  • V. Nagarajan


Mobile Ad hoc Network (MANET) is a mobile and infrastructure less network, widely used in various applications. In this paper, we study the major security issues in MANET to reduce the malicious activity at the nodes. To reduce the unsecured network, Enhanced Adaptive Acknowledgement Scheme (EAACK) is proposed and it involves Acknowledgement (ACK), Secure Acknowledgement (SACK), and Misbehavior Report Authentication (MRA) schemes. In EAACK scheme, the 2b (2-Bit) packet header is used and it overcomes some of the disadvantages of Watchdog behavior. In this work, the sender has to digitally sign the ACK packets and the receiver has to verify it. The proposed Scheme is applied to 40% of malicious nodes and Routing overhead (Ro) hits the value 0.6. The Network performance is better when the value of Ro is 0. In order to secure more, Credibility Based Sequence Distance Vector Routing (CBSDV) and Curve based cryptographic technique is used. Simulation results show that proposed scheme provides better secure network and CBSDV, hop count, time duration, energy values and trust scores play a deciding factor between the source and destination in the network.


Credibility based sequence distance vector routing Curve based cryptography Enhance adaptive acknowledgement Acknowledgement Secure acknowledgement Misbehaviour report authentication Mobile ad hoc networks 


  1. 1.
    Alinci, M., Inaba, T., Elmazi, D.: A fuzzy-based system for improving node security in MANET clusters. Int. Conf. Complex Intell. Softw. Intensive Syst. 1, 390–401 (2016)Google Scholar
  2. 2.
    Alinci, M., Inaba, T., Elmazi, D.: Improving node security in MANET clusters: a comparison study of two fuzzy-based systems. Int. Conf. Complex Intell. Softw. Intensive Syst. 16, 110–112 (2016)Google Scholar
  3. 3.
    Thorat, S.A., Kulkarni, P.J.: Uncertainty analysis framework for trust based routing in MANET. Int. J. Peer-to-Peer Netw. Appl. 2, 220–233 (2017)Google Scholar
  4. 4.
    Krishna, S.R.M., Seeta Ramanath, M.N.: Security in MANET routing tables with FMNK cryptography model. IEEE Trans. Syst. Man Cybern. 12, 121–132 (2015)Google Scholar
  5. 5.
    Manoj, V., Aaqib, M., Raghavendiran, N.: A novel security framework using trust and fuzzy logic in Manet. Int. J. Distrib. Parallel Syst. (IJDPS) 3, 285–299 (2012)CrossRefGoogle Scholar
  6. 6.
    Tarannum, R., Lamble, M.: Hybrid approach: detection of intrusion in Manet. Innov. Conf. Embed. Syst. Mob. Commun. Comput. 13, 24–28 (2011)Google Scholar
  7. 7.
    Li, F., Yang, Y., Jie, W.: Attack and flee: game-theory-based analysis on interactions among nodes in MANETs. IEEE Trans. Syst. Man Cybern. 40, 612–622 (2010)CrossRefGoogle Scholar
  8. 8.
    Nagar, A., Jain, A.K.: On the security of non-invertible fingerprint template transforms. Int. Conf. Complex Intell. Softw. Intensive Syst. 50, 99–104 (2009)Google Scholar
  9. 9.
    Yih-Chun, H., Johnson, D.B., Perrig, A.: ‘SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. IEEE Workshop Mob. Comput. Syst. Appl. 55, 415–426 (2002)Google Scholar
  10. 10.
    Anguswamy, R., Thiagarajan, M., Dagli, C.H.: Systems methodology and framework for problem definition in m obile ad hoc networks. IEEE Int. Syst. Conf. 33, 312–324 (2008)Google Scholar
  11. 11.
    Ang, R., Safavi-Naini, R.: Cancelable Key-based Fingerprint Templates. University of Wollongong, Wollongong (2005)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of ECEAdhiparasakthi Engineering CollegeMelmaruvathurIndia

Personalised recommendations