Abstract
As related to environments which possess non-malicious nodes contained in a network, the well-known protocols that are provides by the existing researchers for routing are designed. There are several security threats which are prevented the mobile network development which essentially is an ad hoc network and this is because of the network’s susceptible nature. Hence in order to secure the nodes from anonymous behaviours, an efficient routing algorithm is needed to provide as secure network. Secure routing based multiplicative Diffie Hellman key exchange (MDKE) algorithm is suggested in order to enhance MANET’s security in this research paper and MDKESR is the framework being proposed. In order to enhance the packet delivery ratio, advanced encryption standard (AES) algorithm based encrypted data is utilized in this proposed scheme. By comparing the results security simulation by deployment of the already existing Routing otherwise known as SUPERMAN with IPSec, secure ad hoc on-demand distance vector (SAODV) and secure optimized link state routing (SOLSR) are taken into account in order to show that the proposed frameworks of MDKESR with respect to security which is a wireless communication.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-019-01612-8/MediaObjects/12652_2019_1612_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-019-01612-8/MediaObjects/12652_2019_1612_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-019-01612-8/MediaObjects/12652_2019_1612_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-019-01612-8/MediaObjects/12652_2019_1612_Fig4_HTML.png)
Similar content being viewed by others
Change history
31 May 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s12652-022-04017-2
References
Adnane A, Bidan C, de Sousa Júnior RT (2013) Trust-based security for the OLSR routing protocol. Comput Commun 36(10):159–1171
Akbani R, Korkmaz T, Raju GVS (2008) HEAP: a packet authentication scheme for mobile ad hoc networks. Ad Hoc Netw 6(7):1134–1150
Aluvala S, Sekhar KR, Vodnala D (2016) A novel technique for node authentication in mobile ad hoc networks. Perspect Sci 8:680–682
Amir Y, Kim Y, Nita-Rotaru C (2009) Secure communication using contributory key agreement. IEEE Transactions on Parallel and Distributed systems, pp 468–480
Ben-Othman J, Benitez YIS (2012) A new method to secure RA-OLSR using IBE. In: IEEE Global Communications Conference. pp 354–358
Boni S, Bhatt J, Bhat S (2015) Improving the Diffie–Hellman key exchange algorithm by proposing the multiplicative key exchange algorithm. Int J Comput Appl 130(15):7–10
Chan AC (2012) Distributed private key generation for identity based cryptosystems in ad hoc networks. IEEE Wirel Commun Lett 1(1):46–48
Chen L, Leneutre J, Puig JJ (2006) A secure and efficient link state routing protocol for ad hoc networks. In: IEEE international conference on wireless and mobile communications, pp 36
Harn L, Mehta M, Hsin WJ (2004) Integrating Diffie–Hellman key exchange into the digital signature algorithm (DSA). IEEE Commun Lett 8(3):198–200
Hu YC, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11(1–2):21–38
Hurley-Smith D, Wetherall J, Adekunle A (2015) Virtual closed networks: a secure approach to autonomous mobile ad hoc networks. In: IEEE international conference for internet technology and secured transactions (ICITST), pp 391–398
Hurley-Smith D, Wetherall J, Adekunle A (2017) SUPERMAN: security using pre-existing routing for mobile ad hoc networks. IEEE Trans Mob Comput 16(10):2927–2940
Kaushik A (2013) Extended Diffie–Hellman algorithm for key exchange and management. Int J Adv Eng Sci 3(3):67–70
Khambre PD, Sambhare SS, Chavan PS (2012) Secure data in wireless sensor network via AES (advanced encryption standard). Int J Comput Sci Inform Technol 3(2):3588–3592
Kim J, Tsudik G (2009) SRDP: secure route discovery for dynamic source routing in MANETs. Ad Hoc Netw 7(6):1097–1109
Kukreja D, Dhurandher SK, Reddy BVR (2018) Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Humaniz Comput 9(4):941–956
Kumar VA, Jeyapal A (2014) Self-adaptive trust based ABR protocol for MANETs using Q-learning. Sci World J 2014(452362):1–9
Li LC, Liu RS (2010) Securing cluster-based ad hoc networks with distributed authorities. IEEE Trans Wirel Commun 9(10):3072–3081
Li C, Wang Z, Yang C (2011) Secure routing for wireless mesh networks. IJ Netw Secur 13(2):109–120
Maity S, Hansdah RC (2014) Self-organized public key management in manets with enhanced security and without certificate-chains. Comput Netw 65:183–211
Papadimitratos P, Haas Z (2002) Secure routing for mobile ad hoc networks. In: Communication networks and distributed systems modeling and simulation conference. pp 1–13
Robert JM, Otrok H, Chriqi A (2012) RBC-OLSR: reputation-based clustering OLSR protocol for wireless ad hoc networks. Comput Commun 35(4):487–499
Robinson YH, Julie EG, Saravanan K, Kumar R, Son LH (2019) FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. J Ambient Intell Humaniz Comput 10(11):4455–4472
Sanzgiri K, LaFlamme D, Dahill B, Levine BN, Shields C, Belding-Royer EM (2005) Authenticated routing for ad hoc networks. IEEE J Sel Areas Commun 23(3):598–610
Sinha D, Bhattacharya U, Chaki R (2014) RSRP: a robust secure routing protocol in MANET. Found Comput Decis Sci 39(2):129–154
Suseendran G, Sasi Kumar A (2016) Secure intrusion-detection system in mobile adhoc networks. Indian J Sci Technol 9(19):1–7
Talawar SH, Maity S, Hansdah RC (2014) Secure routing with an integrated localized key management protocol in MANETs. In: IEEE international conference on advanced information networking and applications, pp 605–612
Tan S, Li X, Dong Q (2015) Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw 30:84–98
**a H, Jia Z, Li X, Ju L, Sha EHM (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096–2114
Yang Y (2012) A communication efficient group key distribution scheme for MANETs. In: International conference on network and system security, pp 361–372
Zhang Z (2011) A novel secure routing protocol for MANETs. InTech, Rijeka, pp 455–466
Zhao S, Kent R, Aggarwal A (2013) A key management and secure routing integrated framework for mobile ad-hoc networks. Ad Hoc Netw 11(3):1046–1061
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-04017-2
About this article
Cite this article
Manjula, T., Anand, B. RETRACTED ARTICLE: A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network. J Ambient Intell Human Comput 12, 3621–3631 (2021). https://doi.org/10.1007/s12652-019-01612-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-019-01612-8