Development of a Conceptual Model for Secured Communication in Wireless Ad hoc Networks
Development of a Conceptual Model for Secured Communication in Wireless Ad hoc Networks |
||
|
||
© 2024 by IJETT Journal | ||
Volume-72 Issue-11 |
||
Year of Publication : 2024 | ||
Author : S. Vandana, Madhavi Tatineni |
||
DOI : 10.14445/22315381/IJETT-V72I11P112 |
How to Cite?
S. Vandana, Madhavi Tatineni, "Development of a Conceptual Model for Secured Communication in Wireless Ad hoc Networks," International Journal of Engineering Trends and Technology, vol. 72, no. 11, pp. 91-98, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I11P112
Abstract
In wireless ad hoc networks, secure data transfer is crucial. Providing a high level of security for security-sensitive operations, such as military and defense applications, is essential. Existing cryptographic techniques and routing protocols, such as AODV, DSR, encryption, and decryption algorithms, cannot offer high-end security. So, a conceptual model was created where 3-levels of data encryption provide high-end security. The receiver's unique ID was used to provide security in the first level; random key generation was used in the second level, and a polynomial equation was produced in the third level to enhance security further. Security is provided at each level so that eavesdroppers cannot decipher it. Only the authorized end user can decrypt, as the key for decryption will be only with the authorized user. The method was used to successfully deliver encrypted data from the transmitter to the receiver, where it was then successfully decoded.
Keywords
Receiver's unique ID, Random key generation, An eavesdropper, Ad hoc Networks, cryptographic techniques
References
[1] Kazukuni Kobara, and Hideki Imai, “On The Channel Capacity of Narrow-Band Subliminal Channels,” Proceedings International Conference on Information and Communications Security, Springer, Berlin, Heidelberg, pp. 309-323, 1999.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Min Chen et al., “Narrow Band Internet of Things,” IEEE Access, vol. 5, pp. 20557-20577, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Yuesong Lin et al., “Research on PUF-Based Security Enhancement of Narrow-Band Internet of Things,” Proceedings 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, Poland, pp. 702-709, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Smilty Chacko, and Deepu Job, “Security Mechanisms and Vulnerabilities in LPWAN,” Proceedings International Conference on Recent Advancements and Effectual Researches in Engineering Science and Technology (RAEREST), IOP Conference Series: Materials Science and Engineering, Kerala State, India, vol. 396, no. 1, pp. 1-8, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Vinod Kumar et al., “Security Issues in Narrowband-IoT: Towards Green Communication,” Proceedings 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 369-371, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Zhiqiang Cao, and Shuhua yang, “A Security Communication Device Based on Narrowband Internet of Things,” Proceedings 2019 IEEE 5th International Conference on Computer and Communications (ICCC), pp. 2141-2145, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Hiral Vegda, and Nimesh Modi, “Secure and Efficient Approach To Prevent Ad Hoc Network Attacks Using Intrusion Detection System,” Proceedings 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, pp. 129-133, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[8] S. Sharmila, and T. Shanthi, “A Survey on Wireless Ad Hoc Network: Issues and Implementation,” Proceedings 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), Pudukkottai, India, pp. 1-6, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Sharat S Kariyannavar, Shreyas Thakur, and Aastha Maheshwari, “Security in Mobile ADHOC Networks: Survey,” Proceedings 2021 6th International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, pp. 135-143, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Eric Yocam, “Narrow-band Internet of Things Protocol Standards: Survey of Security and Privacy Control Effectiveness,” Proceedings 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Hongmei Deng, Wei Li, and D.P. Agrawal, “Routing Security In Wireless Ad Hoc Networks,” IEEE Communications Magazine, vol. 40, no. 10, pp. 70-75, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[12] C. Candolin, and H. H. Kari, “A Security Architecture For Wireless Ad Hoc Networks,” Proceedings MILCOM 2002, Anaheim, CA, USA, vol. 2, pp. 1095-1100, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Vinod Kumar, Rakesh Kumar Jha, and Sanjeev Jain, “NB-IoT Security: A Survey,” Wireless Personal Communications, vol. 113, no. 4, pp. 2661-2708, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Collins Burton Mwakwata et al., “Narrowband Internet Of Things (NB-IOT): From Physical (PHY) And Media Access Control (MAC) Layers Perspectives,” Sensors, vol. 19, no. 11, pp. 1-34, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Lidong Zhou, and Z.J. Haas, “Securing Ad Hoc Networks,” IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
[CrossRef] [Google Scholar] [Publisher Link]