Skip to main content
Log in

Enhancing Data Security and Privacy in SDN-Enabled MANETs Through Improved Data Aggregation Protection and Secrecy

  • Research
  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The increasing use of technology has led to the incorporation of software-defined network (SDN) communication in ad hoc mobile environments. Although a lot of study has been done on MANET network security, privacy issues in SDN-enabled MANETs have received less attention. We suggest using PRISDASM (Enhanced Data Security and Privacy for SDN-Enabled MANET), a cutting-edge technology created to improve data integrity and privacy protections, to close this gap. Our suggested approach provides a practical way to handle these problems by integrating online/offline signature approaches for safe data aggregation, Paillier homomorphic encryption, and the Walrus optimization algorithm for cluster head selection. Furthermore, in order to select the best cluster head, our study presents a fitness function that considers trust, mobility, and energy consumption criteria. Our six-phase solution is designed to protect sensitive data, authenticate users and ensure data integrity, and manage aggregation requests over many networks to enable effective communication. Furthermore, our strategy specifically targets lightweight processing to reduce the computational load on mobile nodes and enable seamless integration into different systems. Using ns3 simulation, we have put our suggested system into practice and assessed its effectiveness, showing that it has better security features and communication efficiency than existing methods. Our findings unequivocally show that PRISDASM outperforms current techniques for data integrity and privacy in SDN-enabled MANETs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data Availability

No datasets were generated or analysed during the current study.

Code Availability

The code used in this paper is custom.

References

  1. Zhang, J., Zhao, Y., Jie, W., & Chen, B. (2020). LVPDA: a lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2020.2978286

    Article  Google Scholar 

  2. Trojovský, P., & Dehghani, M. (2023). Anew bio-inspired meta heuristic algorithm for solving optimization problems based on walruses behavior. Scientific Reports. https://doi.org/10.1038/s41598-023-35863-5

    Article  Google Scholar 

  3. Dehghani, M., Hubalovsky, S., & Trojovsky, P. (2021). Northern Goshawk optimization: a new swarm-based algorithm for solving optimization problems. IEEE Access, 9, 162059–162080. https://doi.org/10.1109/ACCESS.2021.3133286

    Article  Google Scholar 

  4. Karimi, A., Afsharfarnia, A., Zarafshan, F., & Al-Haddad, S. A. R. (2014). A novel clustering algorithm for mobile ad hoc networks based on determination of virtual links’ weight to increase network stability. Scientific World Journal, 2014, 1–11. https://doi.org/10.1155/2014/432952

    Article  Google Scholar 

  5. Wang, R., Zhang, Z., Zhang, Z., & Jia, Z. (2018). ETMRM: An energy-efficient trust management and routing mechanism for SDWSNs. Comput Netw, 139, 119–135. https://doi.org/10.1016/j.comnet.2018.04.009

    Article  Google Scholar 

  6. Neeraj, Ms., Monika, Ms., Gaurav, B.M.I.E.T SONEPAT, Minimizing Delay and Maximizing Lifetime for WSN, Neeraj et al /IJEA 2(7) ISSN: 2320–0804

  7. Zhao, Y., & Wu, J. (2012) On maximizing the lifetime of wireless sensor networks using virtual backbone scheduling. IEEE Transactions on Parallel and Distributed Systems 23(8)

  8. Sasikala, V., & Chandrasekar, C. (2013). Cluster based Sleep/wakeup scheduling technique for WSN. International Journal Computer Application, 72, 15–19.

    Article  Google Scholar 

  9. Khalil, H. B., & Zaidi, S. J. H. (2012). MNMURA: most nearest most used routing algorithm for greening the wireless sensor networks. Wireless Sensor Network, 6(4), 162–166.

    Article  Google Scholar 

  10. Hristozov, S., Huber, M., & Sigl, G. (2020) Protecting restful IoT devices from battery exhaustion DoS attacks. In: 2020 IEEE international symposium on hardware oriented security and trust (HOST), San Jose, CA, USA, 7 December 2020. IEEE, 316–327.

  11. Noorwali, A., Alvi, A. N., Khan, M. Z., et al. (2021). A novel QoSoriented intrusion detection mechanism for IoT applications. Wirelel Communication Mobile Computing, 2021, 2021–211012.

    Google Scholar 

  12. Miriyala, S., & Sairam, M. S. (2020). Light weight group key management for data dissimilation for dynamic SDN MANET environments. Journal of Critical Reviews, 7(3), 224–229.

    Google Scholar 

  13. Song, J., Wang, W., Gadekallu, T R., Cao, J., & Liu, Y. (2022). EPPDA: An efficient privacy-preserving data aggregation federated learning scheme. IEEE Transactions Network Science Engineering

  14. Fan, H., Huang, C., & Liu, Y. (2023). Federated learning-based privacy-preserving data aggregation scheme for IIoT’, IEEE Access 2023.

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

K.K and A.P proposed the main idea of the paper. K.K performed the analyses and simulations and wrote the main manuscript text. All authors reviewed the manuscript.

Corresponding author

Correspondence to Kiran Kumar Kommineni.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kommineni, K.K., Prasad, A. Enhancing Data Security and Privacy in SDN-Enabled MANETs Through Improved Data Aggregation Protection and Secrecy. Wireless Pers Commun 139, 855–882 (2024). https://doi.org/10.1007/s11277-024-11635-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-11635-w

Keywords

Navigation