Efficient ECGDH algorithm through protected multicast routing protocol in MANETs

A Mobile Ad-hoc Network (MANET) covers a set of autonomous mobile nodes that communicates through the wireless communication in an infrastructure-less environment. Mostly, MANETs are used in group communication mechanisms like military applications, rescue operations, emergency search, vehicular ad-hoc communications and mining operations etc. In such type of networks, a group communication takes place by the multicasting technique. Communication and collaboration is necessary among the nodes in the groups in multicast protocols. The PUMA has the best multicast routing protocol as compared to the tree and mesh based multicast protocols, although it suffers from the security issues. Mainly, PUMA suffers from the Man in the middle attack (MITM) which generates traffic flow; drop the packets and miscommunicate the neighbor nodes with the false hop count. So, defending from the MITM attack, we designed a new mechanism called Elliptic Curve Group Diffie-Hellman (ECGDH). This approach compares the results of PUMA routing protocol with the legitimate, under attack and after providing security against an attack. Finally, we observed that ECGDH gives efficient results even after the attack has happened

[1]  Mhm Krishna Prasad,et al.  An Implementation Analysis and Evaluation Study of DSR with Inactive DoS Attack in Mobile Ad hoc Networks , 2013 .

[2]  Shailendra Kumar Shrivastava,et al.  Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks , 2018 .

[3]  Yong Wang,et al.  The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks , 2006, 2006 IEEE International Conference on Communications.

[4]  Upendra Singh,et al.  Secure data transmission on MANET by hybrid cryptography technique , 2015, 2015 International Conference on Computer, Communication and Control (IC4).

[5]  Ashish Kumar Jain Ravindra Verma TRUST-BASED SOLUTION FOR WORMHOLE ATTACKS IN MOBILE AD HOC NETWORKS , 2015 .

[6]  Upendra Singh,et al.  Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm , 2015, 2015 International Conference on Computer, Communication and Control (IC4).

[7]  Shweta Shah,et al.  Wormhole attack in mobile ad-hoc networks , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

[8]  Upendra Singh,et al.  Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

[9]  Jie Liu,et al.  A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol , 2010, Int. J. Netw. Secur..

[10]  Vrinda Tokekar,et al.  Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[11]  Upendra Singh,et al.  Detection and avoidance of unified attacks on MANET using trusted secure AODV routing protocol , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

[12]  Erukala Suresh Babu,et al.  Inspired Pseudo Biotic DNA Based Cryptographic Mechanism Against Adaptive Cryptographic Attacks , 2016, Int. J. Netw. Secur..

[13]  Shah Shweta,et al.  MITIGATION FOR JELLY FISH ATTACK ON MANET , 2016 .

[14]  E. Babu,et al.  An Implementation and Performance Evaluation Study of AODV, MAODV, RAODV in Mobile Ad hoc Networks , 2013 .

[15]  Erukala Suresh Babu,et al.  Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks , 2015, ACSS.

[16]  Vrinda Tokekar,et al.  Classification of Denial of Service Attacks in Mobile Ad Hoc Networks , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.