Skip to main content
Erschienen in: Wireless Personal Communications 2/2022

28.09.2021

Security Enhancement in Mobile Ad-Hoc Network Using Novel Data Integrity Based Hash Protection Process

verfasst von: Sunil Kumar

Erschienen in: Wireless Personal Communications | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, Mobile Ad hoc Networks (MANET) are utilized in numerous applications like disaster management, environmental monitoring, tactical operations, and so on. Usually, the MANET is processed in a wireless movable environment, so it has met several issues like insecurity, packet drop, high execution time, etc. In addition, malicious activities in the communication process have a severe impact on network channels. For that, a robust authentication protocol should be established to limit the attack and protect the data from malicious activities. In this article, a novel Data Integrity based Hash Protection (DIHP) algorithm is developed in Intermediate System to Intermediate System (IS-IS) protocol for securing the data transmission in MANET. In this proposed approach, primarily nodes are developed to transfer the data in the moving environment; hereafter, the encryption process is functioned to encrypt the data. If any attacks are tried to decrypt the data in the network channel, then immediately, the prevention parameter is initiated to prevent the attack. Thus, the data is secured from attacks and provides better communication by reducing the data flow rate. Moreover, the proposed DIHP approach is implemented in the Java platform, and the performance metrics are calculated. Also, the obtained results are validated with prevailing protocols and provide better outcomes. Consequently, the proposed DIHP method has attained 98.97bps throughput and 99.57% packet delivery ratio. Moreover, end-to-end delay is reduced as 2 s while compared with existing techniques. In addition, the developed DHIP has obtained a lower data rate and 0.12 ms transmission rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
23.
Zurück zum Zitat Aghili, H. (2019). Improving Security Using Blow Fish Algorithm on Deduplication Cloud Storage (pp. 723–731). Springer, Singapore: Fundamental Research in Electrical Engineering. Aghili, H. (2019). Improving Security Using Blow Fish Algorithm on Deduplication Cloud Storage (pp. 723–731). Springer, Singapore: Fundamental Research in Electrical Engineering.
24.
Zurück zum Zitat Elhoseny, M., & Hassanien, A. E. (2019). An Encryption Model for Data Processing in WSN (pp. 145–169). Springer, Cham: Dynamic Wireless Sensor Networks. Elhoseny, M., & Hassanien, A. E. (2019). An Encryption Model for Data Processing in WSN (pp. 145–169). Springer, Cham: Dynamic Wireless Sensor Networks.
26.
Zurück zum Zitat Howser, G. (2020). Service Provider Protocols (pp. 299–319). Springer, Cham: Computer Networks and the Internet. Howser, G. (2020). Service Provider Protocols (pp. 299–319). Springer, Cham: Computer Networks and the Internet.
Metadaten
Titel
Security Enhancement in Mobile Ad-Hoc Network Using Novel Data Integrity Based Hash Protection Process
verfasst von
Sunil Kumar
Publikationsdatum
28.09.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-09170-z

Weitere Artikel der Ausgabe 2/2022

Wireless Personal Communications 2/2022 Zur Ausgabe