Cluster-Based Secure Data Transmission Solution for Ad Hoc Network

Author(s):  
Hwan-Seok Yang ◽  
Joung-Min Kim ◽  
Seung-Kyu Park
2020 ◽  
Vol 8 (6) ◽  
pp. 3463-3471

Vehicular ad hoc networks (VANETs) is an Intelligent Transportation System and a part of MANETS. VANETs communication is wireless between vehicles and different nodes along the road to increase efficiency and human safety. VANETs embedded all the features of MANETs and almost any Ad Hoc Network. We have discussed various features of VANET and different types of attacks, since the VANET communication is open in nature; they are prone to various types of attacks. Although various attractive features, VANETs also face some challenges like communication with different types of nodes and sensors and gather information or data. Our major focus is on securing this data or information sent by the sender node before transmitting on the network to another node in the network. We intend to solve this by using a wireless LoRa module and cryptography algorithm like ECDH for secure data transmission and solve the security risks and privacy problems. Our work discusses VANET communication method and structure. We provide a simple communication method using P2P topology method and ECDH cryptographic algorithm for keeping the data secure.


2019 ◽  
Vol 8 (3) ◽  
pp. 8707-8714

Ad hoc system is a self-sufficient accumulation of versatile hubs imparting over remote connections where the hub sweep speak with one another in brief way with no unified administration and in a unique topology that changes habitually. A pernicious hub can always report mistaken data to different hubs in the system, which can lead to entire system down. Security is the principle issue of the versatile adhoc organize, as a result of portable hubs conduct. The topology of MANET changes regularly because of hubs versatility, by this property recently hub effectively enters or exit from a specific territory. Hubs in MANET will speak with each elective hubs if and gave that every one of the hubs square measure inside the equivalent change. This appropriation of hubs makes MANET helpless against fluctuated assaults, parcel dropping assault or dark gap assault and replay are a portion of the potential assaults. It is extremely substantial to see and block. To keep from bundle dropping assault, location of misconduct joins and self important hubs assumes a vital job in MANETs. Within this paper, all of us experience the analysis about flexible ad-hoc program and work of sensitive registering within this system. Within our proposed function we use Dempster Shafer hypothesis with regard to computing the actual trust associated with hubs. this particular trust really worth fills within as an open up key from the hubs to ensure that at what ever point 1 hub transfers the pack to another centre it decode the package utilizing the open crucial this procedure safe our transmitting over the method. by utilizing this specific crypto strategy we foresee our system through detached approaches or through the use of trust confidence we find out noxious carry out of hubs


2018 ◽  
Vol 7 (3.34) ◽  
pp. 305
Author(s):  
W Ancy Breen ◽  
S Durga Devi ◽  
E Sushmitha ◽  
V Suveetha

MANET is the mobile ad-hoc network. Security is very important especially when transmitting the data packets from one node to another. MANET is constructed by grouping mobile wireless nodes with no fixed infrastructure. In order to forward the packets, all the nodes in the network must cooperate with each other, so that the nodes beyond the radio ranges can communicate. Each node acts as a router and MANET is infrastructure-less networks. Hence, MANET is open to more security attacks such as Gray-hole attack, Black-hole attack and worm-hole attack. Due to the dynamism in network topology, MANETS are highly vulnerable and are prone to malicious attack. Security issue is highly challenging in MANET. Understanding the different form of possible attacks and providing good security solutions is important for secure data transmission between nodes. The most dangerous attack among these attacks is Gray-hole attack. In this paper, it proposed a method for reducing the Gray-hole attack. Our proposed algorithm MAODV identifies the malicious node before the data transmission process and it greatly reduces the dropping of data packets. 


Sign in / Sign up

Export Citation Format

Share Document