Skip to main content

ECC-Based Hybrid Approach for Data Security for MANET

  • Conference paper
  • First Online:
ICT: Innovation and Computing (ICTCS 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 879))

  • 39 Accesses

Abstract

Wireless communication innovations opened the door for the creation of compact, less-power, lower-cost, and wireless sensor networks’ multipurpose sensor nodes. The idea of “3 Any”—anybody, anywhere, and anytime—has helped wireless networks gain popularity. Nodes in a mobile ad hoc network can interact without the assistance of a centralized administration or network architecture. They may exchange data with them via several hops and are connected via wireless technologies. An independent group of mobile nodes forms the mobile ad hoc network, a wireless network lacking any kind of permanent infrastructure (mobiles, laptops, iPads, PDAs, etc.). Ad hoc joining and departing of each node cause the network to automatically re-construct its topologies and routing table info for the transmission of information packets. The researchers can understand both the general idea of MANET and its applications. In this paper, we work on secure data transmission and management using ECC and MANET-based security standards for secure data transmission using mobile nodes. The use of modified-AES and ECC and this security standard as a result shows improved PDR of 8–10%, throughput of 10–12%, and latency of the node as compared to the existing system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Panda M (2014) Security in wireless sensor networks using cryptographic techniques. AJER

    Google Scholar 

  2. Indora S, Dhadich N (2016) A review paper on low efficient wireless communication network design. IJERT

    Google Scholar 

  3. Ramphull D, Mungur A, Armoogum S, Pudaruth S (2021) A review of mobile ad hoc network (MANET) protocols and their applications. IEEE

    Google Scholar 

  4. El Jay S, Hasbi A (2016) Security in mobile ad hoc networks (MANETs) and WSNs (wireless sensor networks). Int J Comput Sci Netw Secur

    Google Scholar 

  5. Sujatha K, Vaishali R, Rakshith MB, Sparsha H, Suhas M (2019) A comprehensive study on wireless ad-hoc networks. IJAREEIE

    Google Scholar 

  6. Sreelekshmi S (2015) Secure routing and data transmission in MANETs using digital signature. IJERT

    Google Scholar 

  7. Raza N, Aftab MU, Akbar MQ, Ashraf O, Irfan M (2016) Mobile ad-hoc networks applications and its challenges. Scientific Research Publishing

    Google Scholar 

  8. Singh C, Gupta V, Kaur G (2014) A review paper on introduction to MANET”. IJETT

    Google Scholar 

  9. Patil P, Sahu M, Rizvi MA (2013) Proficient data communication in MANET using spanning tree. IEEE

    Google Scholar 

  10. Mishra AR (2012) Elliptic curve cryptography (ECC) for security in wireless sensor network. IJERT

    Google Scholar 

  11. Prastavana PS (2016) Enhanced ECC algorithm over public key cryptography. IJSEAS

    Google Scholar 

  12. Verma Y, Dharmale N (2013) A survey paper based on image encryption and decryption using modified advanced encryption standard. IJSR

    Google Scholar 

  13. Ravi Kumar K, Babu KA, Prasanth NCS, Kumar KM, Simha CY (2023) Secured communication in wireless networks using modified advanced encryption standard algorithm. IJARIIE

    Google Scholar 

  14. AL-Dhief FT, Sabri N, Salim MS, Fouad S, Aljunid SA (2018) MANET routing protocols evaluation: AODV, DSR and DSDV perspective. MATEC Web of Conferences

    Google Scholar 

  15. Li Z, Shen H (2014) A QoS-oriented distributed routing protocol for hybrid wireless networks. IEEE Trans Mobile Comput

    Google Scholar 

  16. Li J, Li Y, Ren J (2014) Hop-by-hop message authentication and source privacy in wireless sensor networks. IEEE Trans Parallel Distrib Syst

    Google Scholar 

  17. Sravana Kumar D, Suneetha CH, Chandrasekhar A (2012) Encryption of data using elliptic curve over finite field, vol 3, no 1. IJDPS

    Google Scholar 

  18. Zhang J, Chen Z, Xu M (2012) On the security of ID-based multi-receiver threshold signcryption scheme. In: Proceedings of 2nd international conference on consumer electronics, communications and networks (CECNet), pp 1944–1948

    Google Scholar 

  19. Wu L (2012) An ID-based multi-receiver signcryption scheme in MANET. J Theor Appl Inf Technol 46(1):120–124

    Google Scholar 

  20. Kushwah P, Lal S (2012) Provable secure identity based signcryption schemes without random oracles. Int J Netw Secur Appl 4(3):97–110. ISSN: 0974-9330

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haresh Parmar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Parmar, H., Dave, M. (2024). ECC-Based Hybrid Approach for Data Security for MANET. In: Joshi, A., Mahmud, M., Ragel, R.G., Karthik, S. (eds) ICT: Innovation and Computing. ICTCS 2023. Lecture Notes in Networks and Systems, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-99-9486-1_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9486-1_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9485-4

  • Online ISBN: 978-981-99-9486-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics