Data Security-Based Routing in MANETs Using Key Management Mechanism
A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resi...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-01-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/12/3/1041 |
_version_ | 1797489383122665472 |
---|---|
author | Praveen Bondada Debabrata Samanta Manjit Kaur Heung-No Lee |
author_facet | Praveen Bondada Debabrata Samanta Manjit Kaur Heung-No Lee |
author_sort | Praveen Bondada |
collection | DOAJ |
description | A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resist using the existing security approaches. Therefore, various secure routing protocols have been developed to strengthen the security of MANETs. In this paper, a secure and energy-efficient routing protocol is proposed by using group key management. Asymmetric key cryptography is used, which involves two specialized nodes, labeled the Calculator Key (CK) and the Distribution Key (DK). These two nodes are responsible for the generation, verification, and distribution of secret keys. As a result, other nodes need not perform any kind of additional computation for building the secret keys. These nodes are selected using the energy consumption and trust values of nodes. In most of the existing routing protocols, each node is responsible for the generation and distribution of its own secret keys, which results in more energy dissemination. Moreover, if any node is compromised, security breaches should occur. When nodes other than the CK and DK are compromised, the entire network’s security is not jeopardized. Extensive experiments are performed by considering the existing and the proposed protocols. Performance analyses reveal that the proposed protocol outperforms the competitive protocols. |
first_indexed | 2024-03-10T00:15:45Z |
format | Article |
id | doaj.art-30c516d5b46d434badc32d4f491e9f08 |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-10T00:15:45Z |
publishDate | 2022-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-30c516d5b46d434badc32d4f491e9f082023-11-23T15:50:54ZengMDPI AGApplied Sciences2076-34172022-01-01123104110.3390/app12031041Data Security-Based Routing in MANETs Using Key Management MechanismPraveen Bondada0Debabrata Samanta1Manjit Kaur2Heung-No Lee3Dayananda Sagar Research Foundation, University of Mysore (UoM), Mysuru 570005, IndiaDayananda Sagar Research Foundation, University of Mysore (UoM), Mysuru 570005, IndiaGwangju Institute of Science and Technology, School of Electrical Engineering and Computer Science, Gwangju 61005, KoreaGwangju Institute of Science and Technology, School of Electrical Engineering and Computer Science, Gwangju 61005, KoreaA Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resist using the existing security approaches. Therefore, various secure routing protocols have been developed to strengthen the security of MANETs. In this paper, a secure and energy-efficient routing protocol is proposed by using group key management. Asymmetric key cryptography is used, which involves two specialized nodes, labeled the Calculator Key (CK) and the Distribution Key (DK). These two nodes are responsible for the generation, verification, and distribution of secret keys. As a result, other nodes need not perform any kind of additional computation for building the secret keys. These nodes are selected using the energy consumption and trust values of nodes. In most of the existing routing protocols, each node is responsible for the generation and distribution of its own secret keys, which results in more energy dissemination. Moreover, if any node is compromised, security breaches should occur. When nodes other than the CK and DK are compromised, the entire network’s security is not jeopardized. Extensive experiments are performed by considering the existing and the proposed protocols. Performance analyses reveal that the proposed protocol outperforms the competitive protocols.https://www.mdpi.com/2076-3417/12/3/1041cryptosystemsMANETroutingsecuritykey management |
spellingShingle | Praveen Bondada Debabrata Samanta Manjit Kaur Heung-No Lee Data Security-Based Routing in MANETs Using Key Management Mechanism Applied Sciences cryptosystems MANET routing security key management |
title | Data Security-Based Routing in MANETs Using Key Management Mechanism |
title_full | Data Security-Based Routing in MANETs Using Key Management Mechanism |
title_fullStr | Data Security-Based Routing in MANETs Using Key Management Mechanism |
title_full_unstemmed | Data Security-Based Routing in MANETs Using Key Management Mechanism |
title_short | Data Security-Based Routing in MANETs Using Key Management Mechanism |
title_sort | data security based routing in manets using key management mechanism |
topic | cryptosystems MANET routing security key management |
url | https://www.mdpi.com/2076-3417/12/3/1041 |
work_keys_str_mv | AT praveenbondada datasecuritybasedroutinginmanetsusingkeymanagementmechanism AT debabratasamanta datasecuritybasedroutinginmanetsusingkeymanagementmechanism AT manjitkaur datasecuritybasedroutinginmanetsusingkeymanagementmechanism AT heungnolee datasecuritybasedroutinginmanetsusingkeymanagementmechanism |