RETRACTED ARTICLE: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks

M Anbarasan, S Prakash, A Antonidoss… - Multimedia Tools and …, 2020 - Springer
Multimedia Tools and Applications, 2020Springer
Abstract MANET (Mobile Adhoc Networks) possess the open system condition, absence of
central server, mobile nodes that make helpless to security assault while conventional
security components couldn't meet MANET security prerequisites in view of restricted
correspondence data transfer capacity, calculation power, memory and battery limit in
addition to the vitality enabled environment. The trusted MANETs provide a reliable path and
efficient communication but the secrecy of the trust values sometimes may be overheard by …
Abstract
MANET(Mobile Adhoc Networks) possess the open system condition, absence of central server, mobile nodes that make helpless to security assault while conventional security components couldn’t meet MANET security prerequisites in view of restricted correspondence data transfer capacity, calculation power, memory and battery limit in addition to the vitality enabled environment. The trusted MANETs provide a reliable path and efficient communication but the secrecy of the trust values sometimes may be overheard by the masqueraders. Due to the need of the clustered MANETs the exchange of mathematical values remains to be a necessary part. In the proposed security of the trusted MANETs is focused so as to provide rigid and robust networks when additional resources are added. For clustering of the nodes LEACH protocol is suggested in which the CHs and CMs are fixed for the data transfer in the network. The energy is disseminated in the LEACH as to avoid the battery drain and network fatal. Hence to add resistance and to make an authentic network, the encryption and decoding is incorporated as a further supplementary to avoid the denial of service attacks, we have utilized DoS Pliancy Algorithm in which the acknowledgment based flooding attacks is focused. Likewise the encoded messages from the source node in one cluster can be recoded in the transmission stage itself to reproduce the messages. Contrasted with the past works, QoS of our proposed work has been made strides when tested with black hole and sink hole attacks. Simulation results shows that the DoS pliancy scheme works better and efficient when compared to the existing trust based systems.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果