A Novel Cryptographic Based Session Key Generation Algorithm Framework for Improving Security in Mobile Ad-Hoc Network
International Journal of Electronics and Communication Engineering |
© 2024 by SSRG - IJECE Journal |
Volume 11 Issue 11 |
Year of Publication : 2024 |
Authors : S. Muruganandam, S. Gnanavel, N. Duraimurugan, G. Balamurugan |
How to Cite?
S. Muruganandam, S. Gnanavel, N. Duraimurugan, G. Balamurugan, "A Novel Cryptographic Based Session Key Generation Algorithm Framework for Improving Security in Mobile Ad-Hoc Network," SSRG International Journal of Electronics and Communication Engineering, vol. 11, no. 11, pp. 133-145, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I11P112
Abstract:
Mobile Ad-Hoc Networks (MANETs) are characterized by their dynamic topologies and lack of centralized control, making them highly susceptible to security threats. In order to improve the security of the network, this paper presents a Novel Cryptographic-Based Session Key Generation Algorithm Framework (NCBSKGAF). This framework has two phases; the first phase is designed as an Elliptic Curve Cryptography-Based Session Key Protocol (ECCBSKP), and the second phase represents Node Reputation Value Based Malicious Node Analysis (NRVBMNA). This framework also incorporates a mutual authentication mechanism to prevent unauthorized access and mitigate common attacks such as man-in-the-middle and replay attacks. The Elliptic Curve Cryptography-Based Session Key Protocol (ECCBSKP) model produces the session keys, which are sent to the recipient node and encrypted in a data packet. The session key ensures that transmission is performed within a particular time and attains secure data transmission. The Node Reputation Value Based Malicious Node Analysis (NRVBMNA) and Shortest Path Identification methods are proposed to identify the suspicious nodes and select the optimum route for data communication. The simulation results show that the suggested framework provides the maximum efficiency in all simulation conditions; the proposed NCBSKGAF provides 95% security accuracy compared to recent algorithms.
Keywords:
Mobile Ad-Hoc Network (MANET), Elliptic curve based cryptographic, Malicious node, Session key, Node authentication.
References:
[1] K. Sakthidasan Sankaran, and Seng-Phil Hong, “Trust Aware Secured Data Transmission Based Routing Strategy Using Optimal Ch Selection in Mobile Ad-Hoc Network,” Mobile Networks and Applications, pp. 1-13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] V. Krishnakumar, and R. Asokan, “Block Chain Based Trusted Distributed Routing Scheme Using Optimized Dropout Ensemble Extreme Learning Neural Network in MANET,” Peer-to-Peer Networking and Applications, vol. 16, pp. 2696-2713, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Meena Rao et al., “A Secure Routing Protocol Using Hybrid Deep Regression Based Trust Evaluation and Clustering for Mobile Ad-Hoc Network,” Peer-to-Peer Networking and Applications, vol. 16, pp. 2794-2810, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Gajendra Kumar Ahirwar, Ratish Agarwal, and Anjana Pandey, “An Extensive Review on QoS Enhancement in MANET Using Meta-Heuristic Algorithms,” Wireless Personal Communications, vol. 131, pp. 1089-1114, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Dipak W. Wajgi, and Jitendra V. Tembhurne, “Localization in Wireless Sensor Networks and Wireless Multimedia Sensor Networks Using Clustering Techniques,” Multimedia Tools and Applications, vol. 83, pp. 6829-6879, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] M. Venkata Krishna Reddy, P.V.S. Srinivas, and M. Chandra Mohan, “Energy Efficient Routing with Secure and Adaptive Trust Threshold Approach in Mobile Ad Hoc Networks,” The Journal of Supercomputing, vol. 79, pp. 13519-13544, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Rakesh Kumar, Bhisham Sharma, and Senthil Athithan, “TBMR: Trust Based Multi-Hop Routing for Secure Communication in Flying Ad-Hoc Networks,” Wireless Networks, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Zafar Sherin, and M.K. Soni, “Secure Routing in MANET through Crypt-Biometric Technique,” Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, Advances in Intelligent Systems and Computing, vol. 328, pp. 713-720, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[9] N. Sridevi, and V. Nagarajan, “A Curve Based Cryptography for Wireless Security in MANET,” Cluster Computing, vol. 22 pp. 4017-4025, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Priyanka Pandey, and Raghuraj Singh, “QoS Based Modified Route Discovery in MANET for Multimedia Applications,” Multimedia Tools and Applications, vol. 82, pp. 29671-29688, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Vivek Mankotia, Ramesh Kumar Sunkaria, and Shashi Gurung, “DT-AODV: A Dynamic Threshold Protocol against Black-Hole Attack in MANET,” Sādhanā, vol. 48, no. 4, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Subrata Joardar et al., “Mitigating DoS Attack in MANETs Considering Node Reputation with AI,” Journal of Network and Systems Management, vol. 31, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] S. Kanthimathi, and P. Jhansi Rani, “An Efficient Packet Dropping Attack Detection Mechanism in Wireless Ad-Hoc Networks Using ECC Based AODV-ACO Protocol,” Wireless Networks, vol. 30, pp. 4851-4863, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Srividya Ramisetty, and K.P. Vyshali Rao, “Light Weight Hash Function Using Secured Key Distribution Technique for MANET,” International Journal of Information Technology, vol. 14, pp. 3099-3108, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Uma Meena, and Promila Sharma, “Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN,” Wireless Personal Communications, vol. 125, pp. 1753-1781, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Saleh A. Alghamdi, “Novel Trust-Aware Intrusion Detection and Prevention System for 5G MANET–Cloud,” International Journal of Information Security, vol. 21, pp. 469-488, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Satyanarayana Pamarthi, and R. Narmadha, “Adaptive Key Management-Based Cryptographic Algorithm for Privacy Preservation in Wireless Mobile Adhoc Networks for IoT Applications,” Wireless Personal Communications, vol. 124, pp. 349-376, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Mahendra Prasad, Sachin Tripathi, and Keshav Dahal, “An Enhanced Detection System against Routing Attacks in Mobile Ad-Hoc Network,” Wireless Networks, vol. 28, pp. 1411-1428, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Sunil Kumar, “Security Enhancement in Mobile Ad-Hoc Network Using Novel Data Integrity Based Hash Protection Process,” Wireless Personal Communications, vol. 123, pp. 1059-1083, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[20] D. Anuradha et al., “Energy Aware Seagull Optimization-Based Unequal Clustering Technique in WSN Communication,” Intelligent Automation & Soft Computing, vol. 32, no. 3, pp. 1325-1341, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[21] R. Saravanan, A. Swaminathan, and S. Balaji, “An Intelligent Shell Game Optimization Based Energy Consumption Analytics Model for Smart Metering Data,” Scientific and Technical Journal of Information Technologies, vol. 23, no. 2, pp. 374-381, 2023.
[CrossRef] [Google Scholar] [Publisher Link]