Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence-based secure ad-hoc on-demand distance vector algorithm

IF 1.5 Q3 TELECOMMUNICATIONS IET Wireless Sensor Systems Pub Date : 2023-10-14 DOI:10.1049/wss2.12068
Anita R. Patil, Gautam M. Borkar
{"title":"Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence-based secure ad-hoc on-demand distance vector algorithm","authors":"Anita R. Patil,&nbsp;Gautam M. Borkar","doi":"10.1049/wss2.12068","DOIUrl":null,"url":null,"abstract":"<p>In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The existing secure routing protocol and their security concerns are analysed in this work. The suggested Swarm Intelligence-based Secure Ad-hoc On-demand Distance Vector (SIS-AODV) algorithm offers security by applying a secret key and hash mechanism to prevent the involvement of malicious nodes in routing operations. A secure routing system of MANET guards against internal and external network attacks. The proposed SIS-AODV algorithm consists of two sections: the secret key value generated by applying Elliptical Curve Cryptography (ECC)-based algorithm and the PRESENT algorithm to encrypt the data packets. Besides, authentication and non-repudiation are applied using the H-PRESENT 128 algorithm. The PRESENT algorithm and H-PRESENT 128 hash function require less computational power. Centralised management is optional in this scheme, so overhead decreases. The second section of SIS-AODV consists of Ant Colony Grey Wolf Optimization over the AODV algorithm to improve network performance while implementing a security algorithm over MANET. Analysis results show maximum performance with a packet delivery ratio of 98% and throughput of 85%. In addition, end-to-end delay is reduced by up to 25%, and routing overhead decreases by up to 20%. Keywords: AODV, Elliptical Curve, PRESENT, H-PRESENT, Euclidean Algorithm, ACO, GWO, Blackhole attack.</p>","PeriodicalId":51726,"journal":{"name":"IET Wireless Sensor Systems","volume":null,"pages":null},"PeriodicalIF":1.5000,"publicationDate":"2023-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/wss2.12068","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Wireless Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/wss2.12068","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a crucial issue. The existing secure routing protocol and their security concerns are analysed in this work. The suggested Swarm Intelligence-based Secure Ad-hoc On-demand Distance Vector (SIS-AODV) algorithm offers security by applying a secret key and hash mechanism to prevent the involvement of malicious nodes in routing operations. A secure routing system of MANET guards against internal and external network attacks. The proposed SIS-AODV algorithm consists of two sections: the secret key value generated by applying Elliptical Curve Cryptography (ECC)-based algorithm and the PRESENT algorithm to encrypt the data packets. Besides, authentication and non-repudiation are applied using the H-PRESENT 128 algorithm. The PRESENT algorithm and H-PRESENT 128 hash function require less computational power. Centralised management is optional in this scheme, so overhead decreases. The second section of SIS-AODV consists of Ant Colony Grey Wolf Optimization over the AODV algorithm to improve network performance while implementing a security algorithm over MANET. Analysis results show maximum performance with a packet delivery ratio of 98% and throughput of 85%. In addition, end-to-end delay is reduced by up to 25%, and routing overhead decreases by up to 20%. Keywords: AODV, Elliptical Curve, PRESENT, H-PRESENT, Euclidean Algorithm, ACO, GWO, Blackhole attack.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用基于蜂群智能的安全按需特设距离矢量算法在移动特设网络中进行节点验证和加密数据传输
在移动自组织网络(MANET)中,所有节点通过无线网络相互通信,以创建一个临时网络,而无需集中管理的支持。由于MANET的拓扑结构是动态的,因此安全路由是一个关键问题。本文分析了现有的安全路由协议及其存在的安全问题。建议的基于群智能的安全Ad-hoc按需距离矢量(SIS-AODV)算法通过应用密钥和哈希机制来防止恶意节点参与路由操作,从而提供安全性。一个安全的路由系统可以防止内部和外部网络的攻击。本文提出的SIS-AODV算法由两部分组成:采用椭圆曲线加密算法生成的密钥值和采用PRESENT算法对数据包进行加密。此外,采用H-PRESENT 128算法进行认证和不可否认。PRESENT算法和H-PRESENT 128哈希函数需要较少的计算能力。在此方案中,集中式管理是可选的,因此减少了开销。SIS-AODV的第二部分包括基于AODV算法的蚁群灰狼优化,以提高网络性能,同时在MANET上实现安全算法。分析结果表明,最大性能为98%的数据包传输率和85%的吞吐量。此外,端到端延迟减少了25%,路由开销减少了20%。关键词:AODV,椭圆曲线,PRESENT, H-PRESENT,欧几里得算法,蚁群算法,GWO,黑洞攻击
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IET Wireless Sensor Systems
IET Wireless Sensor Systems TELECOMMUNICATIONS-
CiteScore
4.90
自引率
5.30%
发文量
13
审稿时长
33 weeks
期刊介绍: IET Wireless Sensor Systems is aimed at the growing field of wireless sensor networks and distributed systems, which has been expanding rapidly in recent years and is evolving into a multi-billion dollar industry. The Journal has been launched to give a platform to researchers and academics in the field and is intended to cover the research, engineering, technological developments, innovative deployment of distributed sensor and actuator systems. Topics covered include, but are not limited to theoretical developments of: Innovative Architectures for Smart Sensors;Nano Sensors and Actuators Unstructured Networking; Cooperative and Clustering Distributed Sensors; Data Fusion for Distributed Sensors; Distributed Intelligence in Distributed Sensors; Energy Harvesting for and Lifetime of Smart Sensors and Actuators; Cross-Layer Design and Layer Optimisation in Distributed Sensors; Security, Trust and Dependability of Distributed Sensors. The Journal also covers; Innovative Services and Applications for: Monitoring: Health, Traffic, Weather and Toxins; Surveillance: Target Tracking and Localization; Observation: Global Resources and Geological Activities (Earth, Forest, Mines, Underwater); Industrial Applications of Distributed Sensors in Green and Agile Manufacturing; Sensor and RFID Applications of the Internet-of-Things ("IoT"); Smart Metering; Machine-to-Machine Communications.
期刊最新文献
Enhancing offloading with cybersecurity in edge computing for digital twin‐driven patient monitoring SmartCardio: Advancing cardiac risk prediction through Internet of things and edge cloud intelligence Wearable micro‐electro‐mechanical systems pressure sensors in health care: Advancements and trends—A review Design of shipborne cold chain monitoring system based on multi link compression transmission Optimising multi-user wireless networks through discrete Fourier transform-based channel estimation with cascaded intelligent reflecting surfaces
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1