SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1093
Secure Data Communications in Mobile Ad-Hoc Networks
Pavan Bhaskar Pawar1, Swapnali Sanjay Patil2 ,Asst.Prof.P.S.Gaade3, Asst.Prof.V.V.Kadam4
1stPavan Bhaskar Pawar, MCA YTC, Satara
2ndSwapnali Samjay Patil, MCA YTC Satara
3rd Prof.P.S.Gade,4 Prof.V.V.Kadam Dept. of MCA Yashoda Technical Campus,Satara-415003
-----------------------------------------------------------------***----------------------------------------------------------------------
1. Abstract
Summary โ€“ Addresses the security and fault tolerance
issue communication in the presence of opponents via
multi-hop wireless networks with frequently changing
topologies. We design and evaluate Secure Message
Transfer (SMT) protocol and its alternative, the Secure
Single-Path Protocol (SSP), to effectively deal with
arbitrary and malicious interruptions of data
transmission.
One of the distinguishing features of SMT and SSP is
that they can operate exclusively in an end-to-end
manner without limiting assumptions about trust and
security associations in the network. As a result, the
protocol is applicable to a wide range network
architecture. We demonstrate that reliable
communication with low latency and low delay
variability can be maintained even when a significant
part of network nodes systematically or intermittently
disrupts communication. SMT and SSP reliably detect
transmission errors, avoid and tolerate data loss and
continuously configure operations to ensure
communication availability. This is achieved at the cost
of moderation tradable transmission and routing
overhead delay. Overall, the protocol's ability to mitigate
both malicious and harmless errors enables fast and
reliable data transmission even in highly hostile network
environments.
Index Terms - fault tolerance, mobile ad hoc
networks (MANETs).
THE EMERGING Mobile Network (MANET)
technology is based on multi-hop wireless architecture
and does not require fixed infrastructure or pre-
configuration of network nodes. The salient features of
this new network paradigm is:
1) Joint support of basic network functions such as
routing and data transfer
2) Lack of administrative boundaries for network
nodes;
3) No central point in the network
4) In general, temporary associations of network
nodes.
As a result, a node cannot make assumptions
about the trustworthiness of the peers that assist it in
communication and typically do not have credentials
Securing basic network operations is becoming a major
concern and indeed a requirement for ad-hoc networks.
Recently, many papers have proposed secure
routing mechanisms to defend against different attacks
under different assumptions and system requirements.
However, a secure routing protocol that guarantees
correct route finding alone cannot guarantee safe and
problem-free data delivery. In other words, a correct and
up-to-date route cannot automatically be considered
hostile-free. For example, a sophisticated attacker could
follow the route discovery rules, be placed on the route,
and later start redirecting traffic, dropping packets, or
forging and injecting. Of course, attackers can hide their
malicious behavior for long periods of time and launch
attacks at unexpected times. Therefore, it is impossible
to detect such an enemy before attacking. For detecting
such enemy attacks. we need to threw the data to surf
into the things.
Define a network node as the following process:
1) Unique ID.
2) A public/private key pair.
3) A module that implements a network protocol.
B. Routing, data transmission;
4) Modules that provide communication over wireless
network interfaces.
The combination of Internet Protocol (IP)
address and public key uniquely identifies a node. Any
two nodes that wish to communicate in a secure manner
are assumed to be able to establish an endto- end
security association (SA). Symmetric-key cryptographic
primitives are computationally more efficient than
public-key ones, so assuming a symmetric shared key
instantiates an SA between end nodes, source and
2. INTRODUCTION
3. Network and Security Model
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1094
destination can be united through an authenticated
Diffie- Hellman exchange [19]. 17]. Other methods of
bootstrapping associations are discussed in [21]. It is
emphasized that SMT and SSP operations do not require
it and aresecurely connected to each of the remaining
intermediate network nodes that support S-
communications. We make no assumptions about the
behavior or motivation of intermediate nodes. They are
either correct, i.e. conforming to the protocol rules, or
adversaries arbitrarily deviating from the protocol
definition. Attackers can target route discovery and data
transmission, corrupt, forge, or replay routing, control,
and data packets, and conduct temporary or permanent
attacks to control or deny communications. Defines the
route as a series of nodes, indicating -route when and .
Route discovery can be either explicit, where the
protocol returns the entire sequence of nodes, or
implicit, where the protocol performs distributed
computation and returns a tuple of the form (current
node, forwarding node, destination) -route, at each node.
can be made into We assume that a secure routing
protocol protects route discovery, discards erroneous
connection information, and returns correct routes and
provide a secure routing specification, that is, an analysis
of the discovered properties of discovered routes and
secure routing protocols, independent of protocol
manipulation.
1. Designing an algorithm for performing the
security-related transformation through which we
can sort the things.
2. Generate the secret information to be used with
the algorithm securely.
3. Developing the methods for the distribution and
sharing of secret information can be endangered to
the data.
A Secure Messaging Protocol (SMT) SMT uses a set of
active routes (APS) that contain host isolation routes
determined by the source and considered available for
communication with a specific destination . All outgoing
message distribution and limited redundancy Additional
data is split and received information is split into blocks
and transmitted along the APS path (one block per path).
Successful receipt of Out of Pieces allows the recipient to
recover the message even if parts of it are lost or
corrupted. This ratio is called the redundancy ratio, and
distributed messages with redundancy are called
messages.
Fig. 1.SMT example: Transmission of a single message.
Details and examples of distributed algorithms, which
basically behave like erasure codes, are given in. A
computed Message Authentication Code (MAC) and a
sequence number are added to each part to verify the
integrity and authenticity of the original, and the traffic
is then denied. Report on successful parts returns via
encrypted, secure and decentralized feedback. When
both the message and the feedback part are not received,
check the feedback message to make sure the retransmit
timer (RTO) has not expired. Keep your APS route class
up to date while transiting through APS. Each success
(failure) number increases (decreases) the rating of that
route. Routes are destroyed as soon as they are
considered failed. If the same route is destroyed and
then rediscovered some time later, precautions are taken
to avoid reusing the same route. While the protocol
determines configuration, the quality of the path used is
continuously evaluated and statistical information about
network health is gathered through reliable address
feedback keep very efficient.
The use of multiple paths has been extensively
researched to provide QoS guarantees and load
balancing in wired networks. Multiple paths were used
in the MANET as a means of tolerating path disruptions
due to mobility. Reference [12] proposes the collection of
link quality (reliability) metrics and the rapid
determination of a set of reliable and therefore long-
lived link independent paths (the node independent
paths used here and in contrast). References [13] and
[14] propose the use of diversity coding and provide an
approximation of the probability of successful data
transmission. Neither of the above two schemes provide
any security features or mechanisms to assess the
quality of the routes used end-to-end. A series of actions
ensured the discovery of MANET roots. Beyond SRP, [2]
proposed a secure version of the Ad Hoc On-Demand
Distance Vector Routing Protocol (AODV) [36]. It uses a
public key mechanism to authenticate the intermediate
node end, set the reverse route, and forward the hash.
Chain to prevent your opponent from reducing the
number of root jumps. Reference [3] proposed a protocol
for protecting dynamic sourcing A routing (DSR)
4. SECURE DATA TRANSMISSION
5. RELATED WORK
ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1095
protocol [37] that uses symmetric key primitives and
time synchronization to authenticate the nodes of a
discovered route. Reference [4] uses public key
primitives for an AODV-like secure routing protocol with
simplified functionality. Reference [6] is a secure
proactive distance vector routing protocol, [5] is a secure
link-state protocol that discovers network connections
within a zone of hops [38], and [39] is a link-optimized It
proposes a security mechanism for state routing.
Protocol (OLSR) Protocol [40]. Regarding the security of
MANET data transmission, the use of multiple routes
was first proposed in [20] and [1]. Reference [41]
proposed a mechanism for detecting faulty links based
on "onion scrambling". In this mechanism, one of the
interfering nodes suspends data transmission when data
loss along the route falls below an acceptable threshold.
From another perspective, [42] proposed detecting
rogue nodes through local monitoring and propagating
alerts of such events so that routes would be chosen by
relatively well-behaved peers. did. Reference [43]
attempts to isolate misbehaving nodes and relies on the
propagation of misbehavior reports to authenticate their
messages. Reference [44] proposes stimulating rational
node cooperation through fictitious currencies and
rewards, and [45] proposes game- theoretic motivations
for reputation systems. In contrast to and earlier work,
SMT offers a solution tailored to his MANET
environment that combines her four elements: 1)
Reliance on end-to-end security bindings only. 2)
Simultaneous transmission over several different paths
determined by the protocol. 3) Robust detection of
communication errors. 4) Adaptation to network
conditions. Such or similar features are proposed
separately. [10], [12]โ€“[14], and [46], but never combined
them into a single protocol. SMT can work with secure
routing protocols to provide comprehensive security by
protecting the data transfer phase. On the other hand,
SMT's robust end-toend error detection can prevent
abuse of such protocol's route maintenance operations
and prevent attackers from hiding or reporting
erroneous route error messages. In addition, SMT does
not require a long observation period to characterize a
misbehaving node as an adversary, and is susceptible to
``intimidation'' attacks by adversaries who disseminate
false reports of misbehaving.
We present and analyze SMT and SSP protocols for
secure data communication in ad- hoc networks. These
two protocols are widely used because they provide
lightweight end-to- end security services and operate
without knowing the trustworthiness of individual
network nodes. They are highly effective and provide
very reliable, low-latency, low-jitter communication even
in very hostile environments. SMT supports real-time
communication, provides near-constant latency and
jitter, and delivers 93% of messages without
retransmitting, even when 50% of network nodes stop
sending data. For example, if 30% of the network nodes
are hostile, even with a small number of routes available,
SMT can deliver over 98% of messages with limited
retransmissions. The SMT and SSP are versatile because
they automatically adapt to resource-constrained
environments and application requirements. In fact, our
protocol covers a wide range of solutions, offering the
flexibility to trade off overhead for better resilience and
reliability, or trade delay and delay variability for low
overhead. increase. For example, SSP has less than one-
third the network overhead of SMT, yet is as reliable as
SMT. At the same time, their customizations are robust
as they cannot be exploited by attackers and are resilient
to random data transfer interruptions. Finally,
components of SMT and SSP such as error detection or
path survival estimation may be applicable to other
types of networks (such as wired) and other
communication patterns (such as multicast).
Overall, data communication security and fault
tolerance are paramount in an inherently insecure and
unreliable ad-hoc network environment.
I'd like to thank Professor Mrs. Vanmala Kadam and
Professor Mrs. Pranjal Gade, my research supervisors,
for their patient instruction, passionate support, and
constructive criticisms of this study effort.
I'd also want to thank Dr. Sunita Jadhav for her
guidance and help in keeping my development on track.
My heartfelt gratitude also goes to Mrs. Shweta Thorat
for his assistance with the meteorological data analysis,
Ms. Snehal Jadhav who assisted me in technicians
I'd also want to thank the technicians at department's
laboratory for their assistance in providing me with the
resources I needed to run the application.
[1] P. Papadimitratos and Z. J. Haas, โ€œSecure routing for
mobile ad hoc networks,โ€ in Proc. SCS CNDS, San
Antonio, TX, Jan. 27โ€“31, 2002, pp. 193โ€“204.
[2] M. G. Zapata and N. Asokan, โ€œSecuring ad hoc routing
protocols,โ€ in Proc. ACM WiSe, Atlanta, GA, Sep. 2002,
pp. 1โ€“10. Y. Hu, A. Perrig, and D. B. Johnson,
โ€œAriadne: A secure on-demand routing protocol for
ad hoc networks,โ€ in Proc. 8th ACM MobiCom,
Atlanta, GA, Sep. 2002, pp. 12โ€“23
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
6. CONCLUSION
7. ACKNOWLEDGMENTS
8. REFERENCES

More Related Content

Similar to Secure Data Communications in Mobile Ad-Hoc Networks

Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
Editor IJARCET
ย 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
ย 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
IJCNCJournal
ย 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
Amanda Brady
ย 

Similar to Secure Data Communications in Mobile Ad-Hoc Networks (20)

SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
ย 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
ย 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
ย 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ย 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
ย 
Design and development of anonymous location based routing for mobile ad-hoc...
Design and development of anonymous location based routing  for mobile ad-hoc...Design and development of anonymous location based routing  for mobile ad-hoc...
Design and development of anonymous location based routing for mobile ad-hoc...
ย 
Improving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKImproving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACK
ย 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
ย 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
ย 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
ย 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
ย 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
ย 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
ย 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
ย 
Reliable and efficient data dissemination scheme in VANET: a review
Reliable and efficient data dissemination scheme in VANET:  a review Reliable and efficient data dissemination scheme in VANET:  a review
Reliable and efficient data dissemination scheme in VANET: a review
ย 
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSPROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
ย 
Protector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc NetworksProtector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc Networks
ย 
Protector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc NetworksProtector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc Networks
ย 
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSPROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
ย 
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETSAN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
ย 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
ย 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
ย 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
ย 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
ย 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
ย 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
ย 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
ย 
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
ย 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
ย 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
ย 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
ย 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
ย 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
ย 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
ย 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
ย 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
ย 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
ย 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
ย 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
ย 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
ย 

Recently uploaded

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
ย 

Recently uploaded (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
ย 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
ย 
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
ย 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
ย 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
ย 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ย 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
ย 

Secure Data Communications in Mobile Ad-Hoc Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1093 Secure Data Communications in Mobile Ad-Hoc Networks Pavan Bhaskar Pawar1, Swapnali Sanjay Patil2 ,Asst.Prof.P.S.Gaade3, Asst.Prof.V.V.Kadam4 1stPavan Bhaskar Pawar, MCA YTC, Satara 2ndSwapnali Samjay Patil, MCA YTC Satara 3rd Prof.P.S.Gade,4 Prof.V.V.Kadam Dept. of MCA Yashoda Technical Campus,Satara-415003 -----------------------------------------------------------------***---------------------------------------------------------------------- 1. Abstract Summary โ€“ Addresses the security and fault tolerance issue communication in the presence of opponents via multi-hop wireless networks with frequently changing topologies. We design and evaluate Secure Message Transfer (SMT) protocol and its alternative, the Secure Single-Path Protocol (SSP), to effectively deal with arbitrary and malicious interruptions of data transmission. One of the distinguishing features of SMT and SSP is that they can operate exclusively in an end-to-end manner without limiting assumptions about trust and security associations in the network. As a result, the protocol is applicable to a wide range network architecture. We demonstrate that reliable communication with low latency and low delay variability can be maintained even when a significant part of network nodes systematically or intermittently disrupts communication. SMT and SSP reliably detect transmission errors, avoid and tolerate data loss and continuously configure operations to ensure communication availability. This is achieved at the cost of moderation tradable transmission and routing overhead delay. Overall, the protocol's ability to mitigate both malicious and harmless errors enables fast and reliable data transmission even in highly hostile network environments. Index Terms - fault tolerance, mobile ad hoc networks (MANETs). THE EMERGING Mobile Network (MANET) technology is based on multi-hop wireless architecture and does not require fixed infrastructure or pre- configuration of network nodes. The salient features of this new network paradigm is: 1) Joint support of basic network functions such as routing and data transfer 2) Lack of administrative boundaries for network nodes; 3) No central point in the network 4) In general, temporary associations of network nodes. As a result, a node cannot make assumptions about the trustworthiness of the peers that assist it in communication and typically do not have credentials Securing basic network operations is becoming a major concern and indeed a requirement for ad-hoc networks. Recently, many papers have proposed secure routing mechanisms to defend against different attacks under different assumptions and system requirements. However, a secure routing protocol that guarantees correct route finding alone cannot guarantee safe and problem-free data delivery. In other words, a correct and up-to-date route cannot automatically be considered hostile-free. For example, a sophisticated attacker could follow the route discovery rules, be placed on the route, and later start redirecting traffic, dropping packets, or forging and injecting. Of course, attackers can hide their malicious behavior for long periods of time and launch attacks at unexpected times. Therefore, it is impossible to detect such an enemy before attacking. For detecting such enemy attacks. we need to threw the data to surf into the things. Define a network node as the following process: 1) Unique ID. 2) A public/private key pair. 3) A module that implements a network protocol. B. Routing, data transmission; 4) Modules that provide communication over wireless network interfaces. The combination of Internet Protocol (IP) address and public key uniquely identifies a node. Any two nodes that wish to communicate in a secure manner are assumed to be able to establish an endto- end security association (SA). Symmetric-key cryptographic primitives are computationally more efficient than public-key ones, so assuming a symmetric shared key instantiates an SA between end nodes, source and 2. INTRODUCTION 3. Network and Security Model
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1094 destination can be united through an authenticated Diffie- Hellman exchange [19]. 17]. Other methods of bootstrapping associations are discussed in [21]. It is emphasized that SMT and SSP operations do not require it and aresecurely connected to each of the remaining intermediate network nodes that support S- communications. We make no assumptions about the behavior or motivation of intermediate nodes. They are either correct, i.e. conforming to the protocol rules, or adversaries arbitrarily deviating from the protocol definition. Attackers can target route discovery and data transmission, corrupt, forge, or replay routing, control, and data packets, and conduct temporary or permanent attacks to control or deny communications. Defines the route as a series of nodes, indicating -route when and . Route discovery can be either explicit, where the protocol returns the entire sequence of nodes, or implicit, where the protocol performs distributed computation and returns a tuple of the form (current node, forwarding node, destination) -route, at each node. can be made into We assume that a secure routing protocol protects route discovery, discards erroneous connection information, and returns correct routes and provide a secure routing specification, that is, an analysis of the discovered properties of discovered routes and secure routing protocols, independent of protocol manipulation. 1. Designing an algorithm for performing the security-related transformation through which we can sort the things. 2. Generate the secret information to be used with the algorithm securely. 3. Developing the methods for the distribution and sharing of secret information can be endangered to the data. A Secure Messaging Protocol (SMT) SMT uses a set of active routes (APS) that contain host isolation routes determined by the source and considered available for communication with a specific destination . All outgoing message distribution and limited redundancy Additional data is split and received information is split into blocks and transmitted along the APS path (one block per path). Successful receipt of Out of Pieces allows the recipient to recover the message even if parts of it are lost or corrupted. This ratio is called the redundancy ratio, and distributed messages with redundancy are called messages. Fig. 1.SMT example: Transmission of a single message. Details and examples of distributed algorithms, which basically behave like erasure codes, are given in. A computed Message Authentication Code (MAC) and a sequence number are added to each part to verify the integrity and authenticity of the original, and the traffic is then denied. Report on successful parts returns via encrypted, secure and decentralized feedback. When both the message and the feedback part are not received, check the feedback message to make sure the retransmit timer (RTO) has not expired. Keep your APS route class up to date while transiting through APS. Each success (failure) number increases (decreases) the rating of that route. Routes are destroyed as soon as they are considered failed. If the same route is destroyed and then rediscovered some time later, precautions are taken to avoid reusing the same route. While the protocol determines configuration, the quality of the path used is continuously evaluated and statistical information about network health is gathered through reliable address feedback keep very efficient. The use of multiple paths has been extensively researched to provide QoS guarantees and load balancing in wired networks. Multiple paths were used in the MANET as a means of tolerating path disruptions due to mobility. Reference [12] proposes the collection of link quality (reliability) metrics and the rapid determination of a set of reliable and therefore long- lived link independent paths (the node independent paths used here and in contrast). References [13] and [14] propose the use of diversity coding and provide an approximation of the probability of successful data transmission. Neither of the above two schemes provide any security features or mechanisms to assess the quality of the routes used end-to-end. A series of actions ensured the discovery of MANET roots. Beyond SRP, [2] proposed a secure version of the Ad Hoc On-Demand Distance Vector Routing Protocol (AODV) [36]. It uses a public key mechanism to authenticate the intermediate node end, set the reverse route, and forward the hash. Chain to prevent your opponent from reducing the number of root jumps. Reference [3] proposed a protocol for protecting dynamic sourcing A routing (DSR) 4. SECURE DATA TRANSMISSION 5. RELATED WORK
  • 3. ยฉ 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1095 protocol [37] that uses symmetric key primitives and time synchronization to authenticate the nodes of a discovered route. Reference [4] uses public key primitives for an AODV-like secure routing protocol with simplified functionality. Reference [6] is a secure proactive distance vector routing protocol, [5] is a secure link-state protocol that discovers network connections within a zone of hops [38], and [39] is a link-optimized It proposes a security mechanism for state routing. Protocol (OLSR) Protocol [40]. Regarding the security of MANET data transmission, the use of multiple routes was first proposed in [20] and [1]. Reference [41] proposed a mechanism for detecting faulty links based on "onion scrambling". In this mechanism, one of the interfering nodes suspends data transmission when data loss along the route falls below an acceptable threshold. From another perspective, [42] proposed detecting rogue nodes through local monitoring and propagating alerts of such events so that routes would be chosen by relatively well-behaved peers. did. Reference [43] attempts to isolate misbehaving nodes and relies on the propagation of misbehavior reports to authenticate their messages. Reference [44] proposes stimulating rational node cooperation through fictitious currencies and rewards, and [45] proposes game- theoretic motivations for reputation systems. In contrast to and earlier work, SMT offers a solution tailored to his MANET environment that combines her four elements: 1) Reliance on end-to-end security bindings only. 2) Simultaneous transmission over several different paths determined by the protocol. 3) Robust detection of communication errors. 4) Adaptation to network conditions. Such or similar features are proposed separately. [10], [12]โ€“[14], and [46], but never combined them into a single protocol. SMT can work with secure routing protocols to provide comprehensive security by protecting the data transfer phase. On the other hand, SMT's robust end-toend error detection can prevent abuse of such protocol's route maintenance operations and prevent attackers from hiding or reporting erroneous route error messages. In addition, SMT does not require a long observation period to characterize a misbehaving node as an adversary, and is susceptible to ``intimidation'' attacks by adversaries who disseminate false reports of misbehaving. We present and analyze SMT and SSP protocols for secure data communication in ad- hoc networks. These two protocols are widely used because they provide lightweight end-to- end security services and operate without knowing the trustworthiness of individual network nodes. They are highly effective and provide very reliable, low-latency, low-jitter communication even in very hostile environments. SMT supports real-time communication, provides near-constant latency and jitter, and delivers 93% of messages without retransmitting, even when 50% of network nodes stop sending data. For example, if 30% of the network nodes are hostile, even with a small number of routes available, SMT can deliver over 98% of messages with limited retransmissions. The SMT and SSP are versatile because they automatically adapt to resource-constrained environments and application requirements. In fact, our protocol covers a wide range of solutions, offering the flexibility to trade off overhead for better resilience and reliability, or trade delay and delay variability for low overhead. increase. For example, SSP has less than one- third the network overhead of SMT, yet is as reliable as SMT. At the same time, their customizations are robust as they cannot be exploited by attackers and are resilient to random data transfer interruptions. Finally, components of SMT and SSP such as error detection or path survival estimation may be applicable to other types of networks (such as wired) and other communication patterns (such as multicast). Overall, data communication security and fault tolerance are paramount in an inherently insecure and unreliable ad-hoc network environment. I'd like to thank Professor Mrs. Vanmala Kadam and Professor Mrs. Pranjal Gade, my research supervisors, for their patient instruction, passionate support, and constructive criticisms of this study effort. I'd also want to thank Dr. Sunita Jadhav for her guidance and help in keeping my development on track. My heartfelt gratitude also goes to Mrs. Shweta Thorat for his assistance with the meteorological data analysis, Ms. Snehal Jadhav who assisted me in technicians I'd also want to thank the technicians at department's laboratory for their assistance in providing me with the resources I needed to run the application. [1] P. Papadimitratos and Z. J. Haas, โ€œSecure routing for mobile ad hoc networks,โ€ in Proc. SCS CNDS, San Antonio, TX, Jan. 27โ€“31, 2002, pp. 193โ€“204. [2] M. G. Zapata and N. Asokan, โ€œSecuring ad hoc routing protocols,โ€ in Proc. ACM WiSe, Atlanta, GA, Sep. 2002, pp. 1โ€“10. Y. Hu, A. Perrig, and D. B. Johnson, โ€œAriadne: A secure on-demand routing protocol for ad hoc networks,โ€ in Proc. 8th ACM MobiCom, Atlanta, GA, Sep. 2002, pp. 12โ€“23 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 6. CONCLUSION 7. ACKNOWLEDGMENTS 8. REFERENCES