Skip to main content
Log in

Security Enhancement in Mobile Ad-Hoc Network Using Novel Data Integrity Based Hash Protection Process

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Nowadays, Mobile Ad hoc Networks (MANET) are utilized in numerous applications like disaster management, environmental monitoring, tactical operations, and so on. Usually, the MANET is processed in a wireless movable environment, so it has met several issues like insecurity, packet drop, high execution time, etc. In addition, malicious activities in the communication process have a severe impact on network channels. For that, a robust authentication protocol should be established to limit the attack and protect the data from malicious activities. In this article, a novel Data Integrity based Hash Protection (DIHP) algorithm is developed in Intermediate System to Intermediate System (IS-IS) protocol for securing the data transmission in MANET. In this proposed approach, primarily nodes are developed to transfer the data in the moving environment; hereafter, the encryption process is functioned to encrypt the data. If any attacks are tried to decrypt the data in the network channel, then immediately, the prevention parameter is initiated to prevent the attack. Thus, the data is secured from attacks and provides better communication by reducing the data flow rate. Moreover, the proposed DIHP approach is implemented in the Java platform, and the performance metrics are calculated. Also, the obtained results are validated with prevailing protocols and provide better outcomes. Consequently, the proposed DIHP method has attained 98.97bps throughput and 99.57% packet delivery ratio. Moreover, end-to-end delay is reduced as 2 s while compared with existing techniques. In addition, the developed DHIP has obtained a lower data rate and 0.12 ms transmission rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Sarbhukan, V. V., & Ragha, L. (2020). Establishing secure routing path using trust to enhance security in MANET. Wirel Pers Commun, 110(1), 245–255. https://doi.org/10.1007/s11277-019-06724-0

    Article  Google Scholar 

  2. Kumar, S. (2020). Prediction of node and link failures in mobile ad hoc network using hello based path recovery routing protocol. Wirel Pers Commun. https://doi.org/10.1007/s11277-020-07596-5

    Article  Google Scholar 

  3. Ourouss, K., Naja, N., & Jamali, A. (2020). Defending against smart grayhole attack within MANETs: a reputation-based ant colony optimization approach for secure route discovery in DSR protocol. Wirel Pers Commun. https://doi.org/10.1007/s11277-020-07711-6

    Article  Google Scholar 

  4. Josephine, J. A., & Senthilkumar, S. (2020). Tanimoto support vector regressive linear program boost based node trust evaluation for secure communication in MANET. Wirel Pers Commun. https://doi.org/10.1007/s11277-020-07209-1

    Article  Google Scholar 

  5. Vatambeti, R. (2020). A novel wolf based trust accumulation approach for preventing the malicious activities in mobile ad hoc network. Wirel Pers Commun, 113(4), 2141–2166. https://doi.org/10.1007/s11277-020-07316-z

    Article  Google Scholar 

  6. Boddu, N., Boba, V., & Vatambeti, R. (2021). A novel georouting potency based optimum spider monkey approach for avoiding congestion in energy efficient mobile ad-hoc network. Wirel Pers Commun. https://doi.org/10.1007/s11277-021-08571-4

    Article  Google Scholar 

  7. Ellis J, Hertig CA, & Metscher R (2020) Concepts and Evolution of Asset Protection and Security. The Professional Protection Officer, Butterworth-Heinemann. (pp. 3–18). https://doi.org/10.1016/B978-0-12-817748-8.00001-8

  8. Majeed, A., ur Rasool, R., Ahmad, F., Alam, M., & Javaid, N. (2019). Near-miss situation based visual analysis of SIEM rules for real time network security monitoring. J Ambient Intell Humaniz Comput, 10(4), 1509–1526. https://doi.org/10.1007/s12652-018-0936-7

    Article  Google Scholar 

  9. Simpson, S. V., & Nagarajan, G. (2020). SEAL—security-aware list-based routing protocol for mobile ad hoc network. Int Conf Emerg Trends Adv Electr Eng Renew Energy, Springer, Singap. https://doi.org/10.1007/978-981-15-7504-4_51

    Article  Google Scholar 

  10. Moradipour, O., & Fathi, M. (2020). An anti-gray hole attack scheme in mobile ad hoc network. Int J Wirel Inform Netw, 27(4), 558–567. https://doi.org/10.1007/s10776-020-00492-6

    Article  Google Scholar 

  11. Parham, M., & Pouyan, A. A. (2020). An effective privacy-aware Sybil attack detection scheme for secure communication in vehicular ad hoc network. Wirel Pers Commun, 113(2), 1149–1182. https://doi.org/10.1007/s11277-020-07272-8

    Article  Google Scholar 

  12. Kshirsagar, V. H., Kanthe, A. M., & Simunic, D. (2018). Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wirel Pers Commun, 100(2), 311–320. https://doi.org/10.1007/s11277-017-5070-x

    Article  Google Scholar 

  13. Stylianopoulos, C., Almgren, M., Landsiedel, O., & Papatriantafilou, M. (2020). Multiple pattern matching for network security applications: acceleration through vectorization. J Parallel Distrib Comput, 137, 34–52. https://doi.org/10.1016/j.jpdc.2019.10.011

    Article  Google Scholar 

  14. Boche, H., Schaefer, R. F., Baur, S., & Poor, H. V. (2019). On the algorithmic computability of the secret key and authentication capacity under channel, storage, and privacy leakage constraints. IEEE Trans Signal Process, 67(17), 4636–4648. https://doi.org/10.1109/TSP.2019.2929467

    Article  MathSciNet  MATH  Google Scholar 

  15. Manjula, T., & Anand, B. (2019). A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-019-01612-8

    Article  Google Scholar 

  16. Elmahdi, E., Yoo, S. M., & Sharshembiev, K. (2020). Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. J Inform Secur Appl, 51, 102425. https://doi.org/10.1016/j.jisa.2019.102425

    Article  Google Scholar 

  17. Kumar, S. (2020). Prediction of node and link failures in mobile ad hoc network using hello based path recovery routing protocol. Wirel Pers Commun, 115(1), 725–744. https://doi.org/10.1007/s11277-020-07596-5

    Article  Google Scholar 

  18. AlRubaiei, M., Jassim, H., Sharef, B. T., Safdar, S., Sharef, Z. T., & Malallah, F. L. (2020). Current vulnerabilities, challenges and attacks on routing protocols for mobile ad hoc network: a review. Swarm Intell Resour Manage Internet Things. https://doi.org/10.1016/B978-0-12-818287-1.00012-7

    Article  Google Scholar 

  19. Guo, Z., Zhang, X., & Zhao, B. (2019). A memory-reinforced tabu search algorithm with critical path awareness for HW/SW partitioning on reconfigurable MPSoCs. IEEE Access, 7, 112448–112458. https://doi.org/10.1109/ACCESS.2019.2934390

    Article  Google Scholar 

  20. Mohammad SN, Singh RP, Dey A, & Ahmad SJ (2019) ESMBCRT: Enhance Security to MANETs Against Black Hole Attack Using MCR Technique. Innovations in Electronics and Communication Engineering, Singapore, Springer. (pp. 319–326). https://doi.org/10.1007/978-981-10-8204-7_32

  21. Furqan HM, Sidhu GAS, & Arslan H (2019) User Association for Enhancing Physical Layer Security in Heterogeneous Network. International Telecommunications Conference, Springer, Singapore. https://doi.org/10.1007/978-981-13-0408-8_19

  22. Yang, C. T., Chen, S. T., Liu, J. C., Yang, Y. Y., Mitra, K., & Ranjan, R. (2019). Implementation of a real-time network traffic monitoring service with network functions virtualization. Future Generation Computer Systems, 93, 687–701. https://doi.org/10.1016/j.future.2018.08.050

    Article  Google Scholar 

  23. Aghili, H. (2019). Improving Security Using Blow Fish Algorithm on Deduplication Cloud Storage (pp. 723–731). Springer, Singapore: Fundamental Research in Electrical Engineering.

    Google Scholar 

  24. Elhoseny, M., & Hassanien, A. E. (2019). An Encryption Model for Data Processing in WSN (pp. 145–169). Springer, Cham: Dynamic Wireless Sensor Networks.

    Google Scholar 

  25. Islabudeen, M., & Devi, M. K. K. (2020). A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks. Wirel Pers Commun. https://doi.org/10.1007/s11277-019-07022-5

    Article  Google Scholar 

  26. Howser, G. (2020). Service Provider Protocols (pp. 299–319). Springer, Cham: Computer Networks and the Internet.

    Google Scholar 

  27. Puthal, D., Wu, X., Nepal, S., Ranjan, R., & Chen, J. (2017). SEEN: a selective encryption method to ensure confidentiality for big sensing data streams. IEEE Trans Big Data. https://doi.org/10.1109/TBDATA.2017.2702172

    Article  Google Scholar 

  28. Jolly, P. K., & Batra, S. (2019). Security against attacks and malicious code execution in mobile agent using IBF-CPABE protocol. Wirel Pers Commun. https://doi.org/10.1007/s11277-019-06329-7

    Article  Google Scholar 

  29. Vo, T. T., Luong, N. T., & Hoang, D. (2019). MLAMAN: A novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network. Wirel Netw, 25(7), 4115–4132. https://doi.org/10.1007/s11276-018-1734-z

    Article  Google Scholar 

  30. Elhoseny, M., & Shankar, K. (2019). Reliable data transmission model for mobile ad hoc network using signcryption technique. IEEE Trans Reliab, 69(3), 1077–1086. https://doi.org/10.1109/TR.2019.2915800

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunil Kumar.

Ethics declarations

Conflict of interest

The authors declare that they have no potential conflict of interest.

Ethical Approval

All applicable institutional and/or national guidelines for the care and use of animals were followed.

Informed Consent

For this type of study formal consent is not required.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, S. Security Enhancement in Mobile Ad-Hoc Network Using Novel Data Integrity Based Hash Protection Process. Wireless Pers Commun 123, 1059–1083 (2022). https://doi.org/10.1007/s11277-021-09170-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09170-z

Keywords

Navigation