首页    期刊浏览 2024年10月05日 星期六
登录注册

文章基本信息

  • 标题:A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in MANET
  • 本地全文:下载
  • 作者:Anubhuti Roda MOHINDRA ; Charu GANDHI
  • 期刊名称:Walailak Journal of Science and Technology (WJST)
  • 印刷版ISSN:2228-835X
  • 出版年度:2021
  • 卷号:18
  • 期号:6
  • 页码:1-18
  • DOI:10.48048/wjst.2021.8987
  • 语种:English
  • 出版社:Institute of Research and Development, Walailak University.
  • 摘要:Providing security to the Mobile Ad-hoc Network (MANET) is one of the demanding and critical tasks in recent days, due to its dynamic nature. For this reason, the various routing protocols and security mechanisms are developed for the traditional networks. Nonetheless, it still lacks the limitation of increased computational complexity, inefficient security, reduced throughput, and increased delay. To solve these problems, this paper developed a new system, namely, Secure Cryptography based Clustering Mechanism (SCCM) for MANET. It comprised the following stages: secure routing, encryption, signature generation, signature verification, and decryption. After forming the network, the connection between the mobile nodes was formed. After that, the secured routing was created between the source and destination by implementing the AOMDV routing protocol. Then, the original packet was converted into an unknown format by employing an Elliptic Curve Cryptography (ECC) encryption mechanism. Consequently, the signature for the encrypted packet was generated and forwarded to the destination via the Region Head (RH) and other gateway nodes. When the destination node received the packet, it performed the signature verification process for verifying whether the packet is valid or invalid.  If it were valid, the receiver would accept the data and decrypt it by using the ECC decryption mechanism; otherwise, it would reject the packet and report to the base station. The simulation results evaluated the performance of the proposed security mechanism by using various measures and compared it with other techniques for proving the superiority.
  • 关键词:Confidentiality; Elliptic Curve Cryptography (ECC); Message authentication; Mobile Adhoc Network (MANET); Secure Cryptography based Clustering Mechanism (SCCM); Schnorr’s signature generation mechanism
国家哲学社会科学文献中心版权所有