Abstract
Wireless communication innovations opened the door for the creation of compact, less-power, lower-cost, and wireless sensor networks’ multipurpose sensor nodes. The idea of “3 Any”—anybody, anywhere, and anytime—has helped wireless networks gain popularity. Nodes in a mobile ad hoc network can interact without the assistance of a centralized administration or network architecture. They may exchange data with them via several hops and are connected via wireless technologies. An independent group of mobile nodes forms the mobile ad hoc network, a wireless network lacking any kind of permanent infrastructure (mobiles, laptops, iPads, PDAs, etc.). Ad hoc joining and departing of each node cause the network to automatically re-construct its topologies and routing table info for the transmission of information packets. The researchers can understand both the general idea of MANET and its applications. In this paper, we work on secure data transmission and management using ECC and MANET-based security standards for secure data transmission using mobile nodes. The use of modified-AES and ECC and this security standard as a result shows improved PDR of 8–10%, throughput of 10–12%, and latency of the node as compared to the existing system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Panda M (2014) Security in wireless sensor networks using cryptographic techniques. AJER
Indora S, Dhadich N (2016) A review paper on low efficient wireless communication network design. IJERT
Ramphull D, Mungur A, Armoogum S, Pudaruth S (2021) A review of mobile ad hoc network (MANET) protocols and their applications. IEEE
El Jay S, Hasbi A (2016) Security in mobile ad hoc networks (MANETs) and WSNs (wireless sensor networks). Int J Comput Sci Netw Secur
Sujatha K, Vaishali R, Rakshith MB, Sparsha H, Suhas M (2019) A comprehensive study on wireless ad-hoc networks. IJAREEIE
Sreelekshmi S (2015) Secure routing and data transmission in MANETs using digital signature. IJERT
Raza N, Aftab MU, Akbar MQ, Ashraf O, Irfan M (2016) Mobile ad-hoc networks applications and its challenges. Scientific Research Publishing
Singh C, Gupta V, Kaur G (2014) A review paper on introduction to MANET”. IJETT
Patil P, Sahu M, Rizvi MA (2013) Proficient data communication in MANET using spanning tree. IEEE
Mishra AR (2012) Elliptic curve cryptography (ECC) for security in wireless sensor network. IJERT
Prastavana PS (2016) Enhanced ECC algorithm over public key cryptography. IJSEAS
Verma Y, Dharmale N (2013) A survey paper based on image encryption and decryption using modified advanced encryption standard. IJSR
Ravi Kumar K, Babu KA, Prasanth NCS, Kumar KM, Simha CY (2023) Secured communication in wireless networks using modified advanced encryption standard algorithm. IJARIIE
AL-Dhief FT, Sabri N, Salim MS, Fouad S, Aljunid SA (2018) MANET routing protocols evaluation: AODV, DSR and DSDV perspective. MATEC Web of Conferences
Li Z, Shen H (2014) A QoS-oriented distributed routing protocol for hybrid wireless networks. IEEE Trans Mobile Comput
Li J, Li Y, Ren J (2014) Hop-by-hop message authentication and source privacy in wireless sensor networks. IEEE Trans Parallel Distrib Syst
Sravana Kumar D, Suneetha CH, Chandrasekhar A (2012) Encryption of data using elliptic curve over finite field, vol 3, no 1. IJDPS
Zhang J, Chen Z, Xu M (2012) On the security of ID-based multi-receiver threshold signcryption scheme. In: Proceedings of 2nd international conference on consumer electronics, communications and networks (CECNet), pp 1944–1948
Wu L (2012) An ID-based multi-receiver signcryption scheme in MANET. J Theor Appl Inf Technol 46(1):120–124
Kushwah P, Lal S (2012) Provable secure identity based signcryption schemes without random oracles. Int J Netw Secur Appl 4(3):97–110. ISSN: 0974-9330
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Parmar, H., Dave, M. (2024). ECC-Based Hybrid Approach for Data Security for MANET. In: Joshi, A., Mahmud, M., Ragel, R.G., Karthik, S. (eds) ICT: Innovation and Computing. ICTCS 2023. Lecture Notes in Networks and Systems, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-99-9486-1_27
Download citation
DOI: https://doi.org/10.1007/978-981-99-9486-1_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9485-4
Online ISBN: 978-981-99-9486-1
eBook Packages: EngineeringEngineering (R0)