A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network

INTELLIGENT AUTOMATION AND SOFT COMPUTING(2023)

引用 2|浏览3
暂无评分
摘要
Mobile computing is the most powerful application for network com-munication and connectivity, given recent breakthroughs in the field of wireless networks or Mobile Ad-hoc networks (MANETs). There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision. For most applications, a frame-work must ensure that the retrieved data reflects the transmitted data. Before driv-ing to other nodes, if the frame between the two nodes is deformed in the data-link layer, it must be repaired. Most link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it down. In other words, because of asset information must be secured from threats, information is a valu-able resource. In MANETs, some applications necessitate the use of a network method for detecting and blocking these assaults. Building a secure intrusion detection system in the network, which provides security to the nodes and route paths in the network, is a major difficulty in MANET. Attacks on the network can jeopardize security issues discovered by the intrusion detection system engine, which are then blocked by the network's intrusion prevention engine. By bringing the Secure Intrusion Detection System (S-IDS) into the network, a new technique for implementing security goals and preventing attacks will be developed. The Secure Energy Routing (SER) protocol for MANETs is introduced in this study. The protocol addresses the issue of network security by detecting and preventing attacks in the network. The data transmission in the MANET is forwarded using Elliptical Curve Cryptography (ECC) with an objective to improve the level of security. Network Simulator - 2 is used to simulate the network and experiments are compared with existing methods.
更多
查看译文
关键词
Mobile ad-hoc network (MANET), intrusion detection system, secure energy routing (SER), elliptical curve cryptography (ECC), security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要