Reputation based Symmetric Key Authentication for Secure Data Transmission in Mobile Ad Hoc Networks
DOI:
https://doi.org/10.4108/eetsis.v10i3.1940Keywords:
Reputation, Mobile nodes, Node authentication, Confidentiality, Symmetric key Cryptography, Secret keyAbstract
INTRODUCTION: MANETs were a group of nodes which connected each other to establish the network via wireless association to forward packets towards destinations.
OBJECTIVES: Reputation-based Symmetric Key Authentication (RSKA) technique is proposed to improve the security of data communication, which securely transmits data packets within MANET communication. Initially, a reputation counts-based node authentication algorithm is designed in RSKA technique by considering the reputation value of mobile nodes in networks.
METHODS: By using a reputation count-based node authentication algorithm, the RSKA technique performs the node authentication process before initiating route identification and selects cooperative nodes in MANETs for data transmission. Therefore, the RSKA of nodes results in improved security of data communication for enhancing throughput and reducing data loss rate. Besides, the RSKA technique uses symmetric key cryptography for secure data transmission in which a secret key is generated for the data to be transmitted by the corresponding mobile node along the route path of the source-destination pair. The destination node having the secret key can only decrypt the cypher text.
RESULTS: Thus, the RSKA technique improves the data confidentiality rate as well as minimizes the time to protect the data transmission in an efficient way. RSKA was calculated by various parameters, namely data loss rate, throughput and time to protect data delivery as well as data confidentiality rate. CONCLUSION: The simulation result of RSKA improves the data confidentiality rate for achieving secured data transmission as well as minimizes time to protect data delivery within MANETs compared with conventional methods.
References
He K, Chen M-R, Mao Y, Zhang X and Zhan Y. Efficient Hierarchical Identity-Based Encryption for Mobile Ad Hoc Networks, Mobile Information Systems, Hindawi Publishing Corporation, 2014, 10(4), 407-425.
Ning H, Liu H and Yang LT. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things, IEEE Transactions on Parallel and Distributed Systems, March 2015, 26(3), 657 – 667.
Aluvala S, Sekhar KR, Vodnala D. A novel technique for node authentication in mobile ad hoc networks, Perspectives in Science, Elsevier, September 2016, 8, 680–682.
Suresh A and Duraiswamy K. Security for Reactive Routing Protocol with Node Reputation Scheme, Journal of Advanced MANET Research in Computer Engineering, 2011, 5(2), 115-121.
Rajeswari KS, Arivazhagi A. Trust and Reputation Management Based Cluster Head Selection in Mobile Ad-Hoc Networks, International Journal of Technology and Engineering System (IJTES), 2015, 7(1), 54-58.
Papaj J and Dobos L. Cooperation between Trust and Routing Mechanisms for Relay Node Selection in Hybrid MANET-DTN, Hindawi Publishing Corporation, Mobile Information Systems, Article ID 7353691, 2016, 2016, 1-18.
[7]Menaka R, Ranganathan V and Sowmya B. Improving Performance through Reputation Based Routing Protocol for MANET, Wireless Personal Communications, Springer, 2016, 1–16.
[8]Kokate T and Joshi RB. Authentication in Mobile Ad Hoc Network for Secure Communication, International Journal of Science and Research (IJSR), June 2015, 4(6), 327-331.
Bidaki M and Masdari M. Reputation-Based Clustering Algorithms in Mobile Ad Hoc Networks, International Journal of Advanced Science and Technology, May 2013, 54:1-12.
Bose JSC, Devi UA, Prasanalaxmi M, Malathi K, Vinodhini KP, Saranya S. Acknowledgment-Based Secure Authentication Method for MANET, International Journal of Innovative Research in Computer and Communication Engineering, March 2014, 2(Special Issue 1), 1895-1900.
Sukumran S, Jaganathan V, Korath A (June 2012) Reputation based Dynamic Source Routing Protocol for MANET, International Journal of Computer Applications (0975 – 888), 47(4), 42-46.
Alomari A. Mutual Authentication and Updating the Authentication Key in MANETS, Wireless Personal Communications, Springer, April 2015, 81(3), 1031–1043.
Wang Z, Chen Y, Li C. CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, February 2012, 30(2), 289 – 296.
Yang S, Yeo CK and Lee BS. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, January 2012, 11(1), 111 – 124.
Madhusudhanan B, Chitra S and Rajan C. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks, Hindawi Publishing Corporation, The Scientific World Journal, 2015, Article ID 801632, 2015: 1-10.
Aldabbas H, Alwada’n T, Janicke H, Al-Bayatti A. Data Confidentiality in Mobile Ad hoc Networks, International Journal of Wireless & Mobile Networks (IJWMN) February 2012, 4(1), 225-236.
Gorti VNKV, Rao S, Uma G. An Efficient Secure Message Transmission in Mobile Ad Hoc Networks using Enhanced Homomorphic Encryption Scheme, Global Journal of Computer Science and Technology Network, Web & Security, 2013, 13(9), 21-33.
Sandhya P and Dhas JPM, Secure Multipath Routing for Data Confidentiality in Mobile Ad Hoc Networks”, Research Journal of Applied Sciences, Engineering and Technology, 2013, 6(13), 2415-2422.
Yakubu BM, Chajera P, Dr. Garko AB. Advanced Secure Method for Data Transmission in MANET Using RSA Algorithm, International Journal of Advanced Technology in Engineering and Science, 2015, 3(1), 176-185.
Tan S, Li X, Dong Q. Trust based routing mechanism for securing OSLR-based MANET, Ad Hoc Networks, Elsevier, July 2015, 30, 84–98.
Papaj J and Dobos L. Cooperation between Trust and Routing Mechanisms for Relay Node Selection in Hybrid MANET-DTN, Hindawi Publishing Corporation, Mobile Information Systems, 2016, Article ID 7353691, 1-18.
Yin, J., Tang, M., Cao, J., You, M., Wang, H., & Alazab, M. (2022). Knowledge-driven cybersecurity intelligence: software vulnerability co-exploitation behaviour discovery. IEEE Transactions on Industrial Informatics.
You, M., Yin, J., Wang, H., Cao, J., Wang, K., Miao, Y., & Bertino, E. (2022). A knowledge graph empowered online learning framework for access control decision-making. World Wide Web, 1-22.
Usman, M., Jan, M. A., He, X., & Nanda, P. (2020). QASEC: A secured data communication scheme for mobile Ad-hoc networks. Future Generation Computer Systems, 109, 604-610.
Gharib, M., Moradlou, Z., Doostari, M. A., & Movaghar, A. (2017). Fully distributed ECC-based key management for mobile ad hoc networks. Computer Networks, 113, 269-283.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 S. Sangeetha, S. Sathappan
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.