Cargando…
Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET
Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole. During this they take a path which is the shortest for the place where it has to reach. During sending of message two typ...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8237045/ https://www.ncbi.nlm.nih.gov/pubmed/34219973 http://dx.doi.org/10.1007/s11277-021-08647-1 |
_version_ | 1783714657485193216 |
---|---|
author | Shukla, Mukul Joshi, Brijendra Kumar Singh, Upendra |
author_facet | Shukla, Mukul Joshi, Brijendra Kumar Singh, Upendra |
author_sort | Shukla, Mukul |
collection | PubMed |
description | Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole. During this they take a path which is the shortest for the place where it has to reach. During sending of message two types of attacks are generally seen such as the blackhole attack and the wormhole attack. In this research we have tried to focus on two major attacks such as the black hole and the worm hole attack. In this we have used two types of protocol such as the AODV whose other name is SWBAODV and the scalable-dynamic elliptic curve cryptography. During the use the prime numbers are selected at random. We can also choose certain specific prime number. Moreover the security level does not depend on the size of the key. Keeping A as worm hole and B as the black hole we have made a two dimensional vector function named as F [A, B]. Two types of study is done by us in our research such as the with attack and without attack. In case of no attack study we have shown graphically using the AODV and the in case of attack we have given it as the BAODV and also the WAODV. Here we have applied a specific method SWBAODV to our selected attack case. The results were found to be interesting for the case of, packet delivery ratio and end to end delay was near 188.40 on comparing it with the BAODV and the WAODV. It has shown 51.38% more value compared to the BAODV and WAODV. There has been a drastic fall in the value of delay and it reached to a 63.2 for BAODV to WAODV. The other two things which we have discussed here is the consumption of energy and the overhead routing. The results in case of SWBAODV were good compared with the consumption of energy and save about 73.52% with the attacked case and around 69.35% with the routing done on the BAODV and WAODV. From our study we were able to say that it will give protection to the (MANET). |
format | Online Article Text |
id | pubmed-8237045 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-82370452021-06-28 Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET Shukla, Mukul Joshi, Brijendra Kumar Singh, Upendra Wirel Pers Commun Article Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole. During this they take a path which is the shortest for the place where it has to reach. During sending of message two types of attacks are generally seen such as the blackhole attack and the wormhole attack. In this research we have tried to focus on two major attacks such as the black hole and the worm hole attack. In this we have used two types of protocol such as the AODV whose other name is SWBAODV and the scalable-dynamic elliptic curve cryptography. During the use the prime numbers are selected at random. We can also choose certain specific prime number. Moreover the security level does not depend on the size of the key. Keeping A as worm hole and B as the black hole we have made a two dimensional vector function named as F [A, B]. Two types of study is done by us in our research such as the with attack and without attack. In case of no attack study we have shown graphically using the AODV and the in case of attack we have given it as the BAODV and also the WAODV. Here we have applied a specific method SWBAODV to our selected attack case. The results were found to be interesting for the case of, packet delivery ratio and end to end delay was near 188.40 on comparing it with the BAODV and the WAODV. It has shown 51.38% more value compared to the BAODV and WAODV. There has been a drastic fall in the value of delay and it reached to a 63.2 for BAODV to WAODV. The other two things which we have discussed here is the consumption of energy and the overhead routing. The results in case of SWBAODV were good compared with the consumption of energy and save about 73.52% with the attacked case and around 69.35% with the routing done on the BAODV and WAODV. From our study we were able to say that it will give protection to the (MANET). Springer US 2021-06-28 2021 /pmc/articles/PMC8237045/ /pubmed/34219973 http://dx.doi.org/10.1007/s11277-021-08647-1 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Shukla, Mukul Joshi, Brijendra Kumar Singh, Upendra Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET |
title | Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET |
title_full | Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET |
title_fullStr | Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET |
title_full_unstemmed | Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET |
title_short | Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET |
title_sort | mitigate wormhole attack and blackhole attack using elliptic curve cryptography in manet |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8237045/ https://www.ncbi.nlm.nih.gov/pubmed/34219973 http://dx.doi.org/10.1007/s11277-021-08647-1 |
work_keys_str_mv | AT shuklamukul mitigatewormholeattackandblackholeattackusingellipticcurvecryptographyinmanet AT joshibrijendrakumar mitigatewormholeattackandblackholeattackusingellipticcurvecryptographyinmanet AT singhupendra mitigatewormholeattackandblackholeattackusingellipticcurvecryptographyinmanet |