On-Demand Based Wireless with Hybrid Cryptography in MANET

V. Rajesh Kannan *
Assistant Professor, Annamalai University, Tamil Nadu, India
Periodicity:January - June'2022
DOI : https://doi.org/10.26634/jwcn.10.2.18937

Abstract

The self-configuring ability of nodes in Mobile Adhoc Network (MANETs) made it popular among critical applications like military use or natural emergency recovery. Most of the proposed protocols assume that all nodes in the network are cooperative, and do not address any security issue. To adjust such trend, it is vital to address its potential security issues. The main objective of this paper is to define the path for security and to further improve delay, energy, throughput, routing overhead, packet delivery ratio and at the same time to create energy enhanced way with excellent security. In this paper, performance analysis of hybrid cryptography with reactive protocol Elliptic Curve Cryptography - Ad hoc On- Demand Distance Vector Routing (ECC-AODV) designed for MANET. In this design there is a two key encryption technique based on elliptic curve based theory that can be used to create faster, smaller, and more energetic and efficient cryptography. Network Simulator (NS2) is used to implement and test the proposed system.

Keywords

MANETs, Routing, Reactive, Cryptography, NS2.

How to Cite this Article?

Kannan, V. R. (2022). On-Demand Based Wireless with Hybrid Cryptography in MANET. i-manager’s Journal on Wireless Communication Networks, 10(2), 8-14. https://doi.org/10.26634/jwcn.10.2.18937

References

[1]. Alappatt, V., & Prathap, P. J. (2020). Hybrid cryptographic algorithm based key management scheme in MANET. Materials Today: Proceedings.
[2]. Arivazhagan, A. K., Thamizhmaran., & Thamilselvi, N. (2015). Performance Comparison of on Demand Routing Protocols under Back whole For MANET. Advance Research in Computer Science and Software Engineering, 5(3), 407–411.
[3]. Husain, R., Khan, R., & Tyagi, R. K. (2019). Comparitive Evaluation of Security Algorithms for Ad Hoc Wireless Networks in an Energy Constrained Environment. i-manager's Journal on Wireless Communication Networks, 8(2), 1-7. https://doi.org/10.26634/jwcn.8.2.16788
[4]. Joshi, V. B., & Goudar, R. H. (2017, August). Intrusion detection systems in MANETs using hybrid techniques. In 2017, International Conference on Smart Technologies For Smart Nation (SmartTechCon) (pp. 534-538). IEEE.
[5]. K. Thamizhmaran (2016). “Performance Evaluation of EA3ACK in different topology's Using EAACK for MANET, imanager Journal of Information Technology , Vol. 5, No.4, pp. 5-10.
[6]. K. Thamizhmaran (2020). Acknowledgement based Topology Control using Hybrid Cryptography for MANETs. imanager's Journal on Information Technology, 9(2), 36-40.
[7]. K. Thamizhmaran, M. Anitha. & Alamelunachippan. (2017). Comparison and Parameter Adjustment of Topology Based (S-EA3ACK) for MANETs. International Journal of Control Theory and Application, Vol. 10, No. 30, pp. 423-436.
[8]. K. Thamizhmaran, M. Anitha & Alamelunachippan (2017). Performance Analysis of On-demand Routing Protocol for MANET Using EA3ACK Algorithm. International Journal of Mobile Network Design and Innovation (Inderscience), Vol. 7, No. 2, pp. 88-100.
[9]. K. Thamizhmaran, M. Anitha & Alamelunachippan (2018). Reduced End-To-End delay for MANETS using SHSPEA3ACK algorithm. Journal on Communication Engineering and System, Vol. 7, No. 3, pp. 8-15.
[10]. Krishnamoorthy, T., & Arivazhagan, A. D. (2015, January). Energy efficient routing protocol with ad hoc on-demand distance vector for MANET. In 2015, IEEE 9th International Conference on Intelligent Systems and Control (ISCO) (pp. 1-6). IEEE.
[11]. Marahatta, A., & Babu, K. S. (2014). Enhanced intrusion detection system with on-demand routing protocol using hybrid cryptographic technique for MANETs. International Journal of Scientific & Engineering Research, 5(8), 125,133.
[12]. Prabu, K., & Subramani, A. Performance comparison of routing protocol in MANET, IJARCSSE, Vol. 2, Issue. 9, pp. 388-392.K.
[13]. Prabu, K., & Subramani, A. Energy efficient routing in MANET through edge node selection using ESPR algorithm, IJMNDI, Vol. 5, Issue. 3, pp. 166-175.
[14]. Thamizhmaran, K., Mahto, R. S. K., & Tripathi, V. S. K. (2012). Performance analysis of secure routing protocols in MANET. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 651-654.
[15]. Yavuz, A. A., Alagöz, F., & Anarim, E. (2010). A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. Turkish Journal of Electrical Engineering and Computer Sciences, 18(1), 1-22.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.