Log in

RETRACTED ARTICLE: A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 31 May 2022

This article has been updated

Abstract

As related to environments which possess non-malicious nodes contained in a network, the well-known protocols that are provides by the existing researchers for routing are designed. There are several security threats which are prevented the mobile network development which essentially is an ad hoc network and this is because of the network’s susceptible nature. Hence in order to secure the nodes from anonymous behaviours, an efficient routing algorithm is needed to provide as secure network. Secure routing based multiplicative Diffie Hellman key exchange (MDKE) algorithm is suggested in order to enhance MANET’s security in this research paper and MDKESR is the framework being proposed. In order to enhance the packet delivery ratio, advanced encryption standard (AES) algorithm based encrypted data is utilized in this proposed scheme. By comparing the results security simulation by deployment of the already existing Routing otherwise known as SUPERMAN with IPSec, secure ad hoc on-demand distance vector (SAODV) and secure optimized link state routing (SOLSR) are taken into account in order to show that the proposed frameworks of MDKESR with respect to security which is a wireless communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Brazil)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Change history

References

  • Adnane A, Bidan C, de Sousa Júnior RT (2013) Trust-based security for the OLSR routing protocol. Comput Commun 36(10):159–1171

    Google Scholar 

  • Akbani R, Korkmaz T, Raju GVS (2008) HEAP: a packet authentication scheme for mobile ad hoc networks. Ad Hoc Netw 6(7):1134–1150

    Article  Google Scholar 

  • Aluvala S, Sekhar KR, Vodnala D (2016) A novel technique for node authentication in mobile ad hoc networks. Perspect Sci 8:680–682

    Article  Google Scholar 

  • Amir Y, Kim Y, Nita-Rotaru C (2009) Secure communication using contributory key agreement. IEEE Transactions on Parallel and Distributed systems, pp 468–480

  • Ben-Othman J, Benitez YIS (2012) A new method to secure RA-OLSR using IBE. In: IEEE Global Communications Conference. pp 354–358

  • Boni S, Bhatt J, Bhat S (2015) Improving the Diffie–Hellman key exchange algorithm by proposing the multiplicative key exchange algorithm. Int J Comput Appl 130(15):7–10

    Google Scholar 

  • Chan AC (2012) Distributed private key generation for identity based cryptosystems in ad hoc networks. IEEE Wirel Commun Lett 1(1):46–48

    Article  Google Scholar 

  • Chen L, Leneutre J, Puig JJ (2006) A secure and efficient link state routing protocol for ad hoc networks. In: IEEE international conference on wireless and mobile communications, pp 36

  • Harn L, Mehta M, Hsin WJ (2004) Integrating Diffie–Hellman key exchange into the digital signature algorithm (DSA). IEEE Commun Lett 8(3):198–200

    Article  Google Scholar 

  • Hu YC, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11(1–2):21–38

    Article  Google Scholar 

  • Hurley-Smith D, Wetherall J, Adekunle A (2015) Virtual closed networks: a secure approach to autonomous mobile ad hoc networks. In: IEEE international conference for internet technology and secured transactions (ICITST), pp 391–398

  • Hurley-Smith D, Wetherall J, Adekunle A (2017) SUPERMAN: security using pre-existing routing for mobile ad hoc networks. IEEE Trans Mob Comput 16(10):2927–2940

    Article  Google Scholar 

  • Kaushik A (2013) Extended Diffie–Hellman algorithm for key exchange and management. Int J Adv Eng Sci 3(3):67–70

    Google Scholar 

  • Khambre PD, Sambhare SS, Chavan PS (2012) Secure data in wireless sensor network via AES (advanced encryption standard). Int J Comput Sci Inform Technol 3(2):3588–3592

    Google Scholar 

  • Kim J, Tsudik G (2009) SRDP: secure route discovery for dynamic source routing in MANETs. Ad Hoc Netw 7(6):1097–1109

    Article  Google Scholar 

  • Kukreja D, Dhurandher SK, Reddy BVR (2018) Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Humaniz Comput 9(4):941–956

    Article  Google Scholar 

  • Kumar VA, Jeyapal A (2014) Self-adaptive trust based ABR protocol for MANETs using Q-learning. Sci World J 2014(452362):1–9

    Google Scholar 

  • Li LC, Liu RS (2010) Securing cluster-based ad hoc networks with distributed authorities. IEEE Trans Wirel Commun 9(10):3072–3081

    Article  Google Scholar 

  • Li C, Wang Z, Yang C (2011) Secure routing for wireless mesh networks. IJ Netw Secur 13(2):109–120

    Google Scholar 

  • Maity S, Hansdah RC (2014) Self-organized public key management in manets with enhanced security and without certificate-chains. Comput Netw 65:183–211

    Article  Google Scholar 

  • Papadimitratos P, Haas Z (2002) Secure routing for mobile ad hoc networks. In: Communication networks and distributed systems modeling and simulation conference. pp 1–13

  • Robert JM, Otrok H, Chriqi A (2012) RBC-OLSR: reputation-based clustering OLSR protocol for wireless ad hoc networks. Comput Commun 35(4):487–499

    Article  Google Scholar 

  • Robinson YH, Julie EG, Saravanan K, Kumar R, Son LH (2019) FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. J Ambient Intell Humaniz Comput 10(11):4455–4472

    Article  Google Scholar 

  • Sanzgiri K, LaFlamme D, Dahill B, Levine BN, Shields C, Belding-Royer EM (2005) Authenticated routing for ad hoc networks. IEEE J Sel Areas Commun 23(3):598–610

    Article  Google Scholar 

  • Sinha D, Bhattacharya U, Chaki R (2014) RSRP: a robust secure routing protocol in MANET. Found Comput Decis Sci 39(2):129–154

    Article  Google Scholar 

  • Suseendran G, Sasi Kumar A (2016) Secure intrusion-detection system in mobile adhoc networks. Indian J Sci Technol 9(19):1–7

    Article  Google Scholar 

  • Talawar SH, Maity S, Hansdah RC (2014) Secure routing with an integrated localized key management protocol in MANETs. In: IEEE international conference on advanced information networking and applications, pp 605–612

  • Tan S, Li X, Dong Q (2015) Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw 30:84–98

    Article  Google Scholar 

  • **a H, Jia Z, Li X, Ju L, Sha EHM (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096–2114

    Article  Google Scholar 

  • Yang Y (2012) A communication efficient group key distribution scheme for MANETs. In: International conference on network and system security, pp 361–372

  • Zhang Z (2011) A novel secure routing protocol for MANETs. InTech, Rijeka, pp 455–466

    Google Scholar 

  • Zhao S, Kent R, Aggarwal A (2013) A key management and secure routing integrated framework for mobile ad-hoc networks. Ad Hoc Netw 11(3):1046–1061

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Manjula.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-04017-2

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Manjula, T., Anand, B. RETRACTED ARTICLE: A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network. J Ambient Intell Human Comput 12, 3621–3631 (2021). https://doi.org/10.1007/s12652-019-01612-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-019-01612-8

Keywords

Navigation