scholarly journals Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs

2016 ◽  
Vol 2016 ◽  
pp. 1-12 ◽  
Author(s):  
Anitha Veerasamy ◽  
Srinivasa Rao Madane ◽  
K. Sivakumar ◽  
Audithan Sivaraman

Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. The typical features of MANETs, especially with dynamic topology and open wireless medium, may leave MANETs vulnerable. Trust management using uncertain reasoning scheme has previously attempted to solve this problem. However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. Since the design securing requires more than two data algorithms, the cost of the system goes up. Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. Simulation results show that the dynamic estimation of the metrics improves throughput by 26% in L&TS when compared to the TMUR. ACFG achieves 33% and 51% throughput increase when compared to L&TS and TMUR mechanisms, respectively.

2021 ◽  
pp. 1-15
Author(s):  
Shahana Gajala Qureshi ◽  
Shishir Kumar Shandilya

WSN (Wireless Sensor Network) is a network of devices which can transfer the data collected from an examined field via wireless links. Thus secure data transmission is required for accurate transfer of data from source to destination as data passes through various intermediate nodes. The study intends to perform shortest, secure path routing on the basis of trust through novel Hybridized Crow Whale Optimization (H-CWO) and QoS based bipartite Coverage Routing (QOS-CR) as well as to analyze the system’s performance. Nodes are randomly deployed in the network area. Initially, a trust metric formation is implemented via novel H-CWO and the authenticated nodes are selected. Then through the secure routing protocol, Cluster head (CH) is selected to perform clustering. Neighbourhood hop prediction is executed to determine the shortest path routing and secure data transfer is performed through novel QOS-CR. The proposed system is analyzed by comparing it with various existing methods in terms of delay, throughput, energy and alive nodes. The results attained from comparative analysis revealed the efficiency of the proposed system. The proposed novel H-CWO and QOS-CR exhibited minimum delay, high throughput, energy and maximum alive nodes thereby ensuring safe transmission of data from source node to destination node.


2020 ◽  
Vol 9 (2) ◽  
pp. 1044-1048

Secure data transmission over the unsecured internet is an important aspect in communication. In recent times, data piracy, unauthorized access, loss of crucial information has been one of the important concern in secure communication of data. To provide security over data transmission, multiple techniques are provided each having its own benefits such as cryptography, steganography and watermarking. Cryptography is the technique for modification of data for secured transmission in an unreadable format. Steganography is the process of hiding the cover file with another file and transmitting the cover file without knowing the existence of hidden message. Watermarking is protection technique used to shield the information from intruders. Various combinations of cryptography and steganography is used to make data more secure. Such techniques differ in various aspects which are load capacity, security, efficiency, simplicity, and much more. Watermarking is the most used technique used for copyright protection in media files in recent times while cryptography and steganography are used to protect the data during communication so that the original data cannot be altered. In this paper, various techniques of cryptography and steganography are discussed which are used in the project.


2021 ◽  
Author(s):  
Anurag Srivastava ◽  
Abhishek Singh ◽  
Susheel George Joseph ◽  
M. Rajkumar ◽  
Yogini Dilip Borole ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document