Data Security-Based Routing in MANETs Using Key Management Mechanism

A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resi...

Full description

Bibliographic Details
Main Authors: Praveen Bondada, Debabrata Samanta, Manjit Kaur, Heung-No Lee
Format: Article
Language:English
Published: MDPI AG 2022-01-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/3/1041
_version_ 1797489383122665472
author Praveen Bondada
Debabrata Samanta
Manjit Kaur
Heung-No Lee
author_facet Praveen Bondada
Debabrata Samanta
Manjit Kaur
Heung-No Lee
author_sort Praveen Bondada
collection DOAJ
description A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resist using the existing security approaches. Therefore, various secure routing protocols have been developed to strengthen the security of MANETs. In this paper, a secure and energy-efficient routing protocol is proposed by using group key management. Asymmetric key cryptography is used, which involves two specialized nodes, labeled the Calculator Key (CK) and the Distribution Key (DK). These two nodes are responsible for the generation, verification, and distribution of secret keys. As a result, other nodes need not perform any kind of additional computation for building the secret keys. These nodes are selected using the energy consumption and trust values of nodes. In most of the existing routing protocols, each node is responsible for the generation and distribution of its own secret keys, which results in more energy dissemination. Moreover, if any node is compromised, security breaches should occur. When nodes other than the CK and DK are compromised, the entire network’s security is not jeopardized. Extensive experiments are performed by considering the existing and the proposed protocols. Performance analyses reveal that the proposed protocol outperforms the competitive protocols.
first_indexed 2024-03-10T00:15:45Z
format Article
id doaj.art-30c516d5b46d434badc32d4f491e9f08
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-10T00:15:45Z
publishDate 2022-01-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-30c516d5b46d434badc32d4f491e9f082023-11-23T15:50:54ZengMDPI AGApplied Sciences2076-34172022-01-01123104110.3390/app12031041Data Security-Based Routing in MANETs Using Key Management MechanismPraveen Bondada0Debabrata Samanta1Manjit Kaur2Heung-No Lee3Dayananda Sagar Research Foundation, University of Mysore (UoM), Mysuru 570005, IndiaDayananda Sagar Research Foundation, University of Mysore (UoM), Mysuru 570005, IndiaGwangju Institute of Science and Technology, School of Electrical Engineering and Computer Science, Gwangju 61005, KoreaGwangju Institute of Science and Technology, School of Electrical Engineering and Computer Science, Gwangju 61005, KoreaA Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resist using the existing security approaches. Therefore, various secure routing protocols have been developed to strengthen the security of MANETs. In this paper, a secure and energy-efficient routing protocol is proposed by using group key management. Asymmetric key cryptography is used, which involves two specialized nodes, labeled the Calculator Key (CK) and the Distribution Key (DK). These two nodes are responsible for the generation, verification, and distribution of secret keys. As a result, other nodes need not perform any kind of additional computation for building the secret keys. These nodes are selected using the energy consumption and trust values of nodes. In most of the existing routing protocols, each node is responsible for the generation and distribution of its own secret keys, which results in more energy dissemination. Moreover, if any node is compromised, security breaches should occur. When nodes other than the CK and DK are compromised, the entire network’s security is not jeopardized. Extensive experiments are performed by considering the existing and the proposed protocols. Performance analyses reveal that the proposed protocol outperforms the competitive protocols.https://www.mdpi.com/2076-3417/12/3/1041cryptosystemsMANETroutingsecuritykey management
spellingShingle Praveen Bondada
Debabrata Samanta
Manjit Kaur
Heung-No Lee
Data Security-Based Routing in MANETs Using Key Management Mechanism
Applied Sciences
cryptosystems
MANET
routing
security
key management
title Data Security-Based Routing in MANETs Using Key Management Mechanism
title_full Data Security-Based Routing in MANETs Using Key Management Mechanism
title_fullStr Data Security-Based Routing in MANETs Using Key Management Mechanism
title_full_unstemmed Data Security-Based Routing in MANETs Using Key Management Mechanism
title_short Data Security-Based Routing in MANETs Using Key Management Mechanism
title_sort data security based routing in manets using key management mechanism
topic cryptosystems
MANET
routing
security
key management
url https://www.mdpi.com/2076-3417/12/3/1041
work_keys_str_mv AT praveenbondada datasecuritybasedroutinginmanetsusingkeymanagementmechanism
AT debabratasamanta datasecuritybasedroutinginmanetsusingkeymanagementmechanism
AT manjitkaur datasecuritybasedroutinginmanetsusingkeymanagementmechanism
AT heungnolee datasecuritybasedroutinginmanetsusingkeymanagementmechanism