Reliable AODV for DANET using Homomorphic Encryption Scheme

DANETs, when compared to MANETs, have high network density and mobility over time. To maintain a secure communication over DANET, requires the knowledge of mobility and complex key management scheme based on the topology change. Operation of DANETs can be categorized into two types based on the acti...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of recent technology and engineering 2019-11, Vol.8 (4), p.11529-11533
Hauptverfasser: Kumar G, Manoj, Rahiman, M Abdul
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:DANETs, when compared to MANETs, have high network density and mobility over time. To maintain a secure communication over DANET, requires the knowledge of mobility and complex key management scheme based on the topology change. Operation of DANETs can be categorized into two types based on the activity: 1. Activities requiring small key length 2. Activities requiring large key length. For disaster detection and emergency rescues, key length with reduced size (partial authentication mechanism) is preferable, whereas military operation or critical data sharing needs larger key size (complete authentication mechanism). The challenges for key management in DANETs include the identification of which routing information to be trusted, legitimate nodes with the key for conducting safety communication. Maintaining existing key management schemes over network density change leads to a complex routing and data handling methods.. In this paper we propose a novel approach of homomorphic encryption scheme for data communication security by combining network protocol steganographic security management scheme which reduces the critical information leakage in DANETs. The proposed algorithm helps to identify the distributed denial of service attack and identification of malicious nodes. The malicious activities in a group are identified by analysis of link failures, retransmission information encoded over application layers. In order to assure reliability, encoded data is used as a means to monitor, detect and remove malicious nodes from routing table. We conduct simulation experiments by using network simulator 3.26, Open street Map to verify that our method achieves significant improvement in preventing critical data leakage in presence of malicious nodes.
ISSN:2277-3878
2277-3878
DOI:10.35940/ijrte.D4384.118419