A Novel Privacy Preserving Algorithm for Large-Scale MANETs
Maheswary. A1, Baskar. S2
1Mrs. Maheswary, Assistant Professor, Department of Electronics and Communication Engineering, Sri Venkateswara College of Engineering and Technology, Chittoor (Andhra Pradesh), India.
2Baskar. S, Professor, Department of Electrical and Electronics Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Avadi, Chennai (Tamil Nadu), India.
Manuscript received on 25 March 2019 | Revised Manuscript received on 04 April 2019 | Manuscript Published on 27 April 2019 | PP: 367-370 | Volume-7 Issue-6S2 April 2019 | Retrieval Number: F90740476S219/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: A mobile ad hoc network (MANET) satisfies the requirement of immediate network establishment without any central administration. MANET forms a network with the help of available neighbor mobile nodes within the transmission range of the network. Due to the dynamic nature of mobile nodes, MANETs are prone to security threats. To ensure secure data transmission in critical security applications like military war field communication there is a need to protect the confidential data from the hands of intruders. In order to improve the secured data communication an efficient encryption named as Tic-Toc-Toe (T3) encryption technique for ensuring the security during the data transmission from sender to receiver in MANET is introduced. Initially, the T3 symbol based approach is used to encrypt the information at the sender through secret key distribution. The receiver side also performs the same encryption, and then the encrypted bit is received successfully. This in turns attains the secured packet transmission without any malicious node in the MANET. Based on the encryption, the encryption and decryption time between the sender and receiver is measured for transmitting the data packet. Also, the AODV protocol is applied in T3 technique is implemented to improve the secured data communication between the source and destination in an efficient manner. The T3 technique conducts the simulations work on parameters including packet delivery ratio, throughput, communication overhead and end to end delay.
Keywords: Decryption, Encryption,. MANET, Network Security.
Scope of the Article: Security and Privacy