期刊文献+

Efficient Data Integrity Using Enhanced Secret Sharing Scheme for MANET

Efficient Data Integrity Using Enhanced Secret Sharing Scheme for MANET
在线阅读 下载PDF
导出
摘要 Mobile Ad Hoc Networks consist of nodes which are wireless and get organized based on the transmission requirement. These nodes are mobile nodes, so they communicate with each other without any fixed access point. This type of network faces several attacks because of its mobility nature. In MANET, black hole attacks may cause packet dropping or misrouting of packets during transmission from sender to receiver. This may lead to performance degradation in the network. To surmount this issue, we propose the modified secret sharing scheme to provide the data protection from unauthorized nodes, consistency of data and genuineness. In this algorithm, initially the identification of black hole attacks is achieved and followed by data protection from malicious nodes and also this scheme checks for the reality of the data. Here, we detect the misbehaviour that is dropping or misrouting using verifiable secret sharing scheme. The proposed algorithm achieves the better packet delivery ratio, misbehaviour detection efficiency, fewer packets overhead and end-to-end delay than the existing schemes. These can be viewed in the simulation results. Mobile Ad Hoc Networks consist of nodes which are wireless and get organized based on the transmission requirement. These nodes are mobile nodes, so they communicate with each other without any fixed access point. This type of network faces several attacks because of its mobility nature. In MANET, black hole attacks may cause packet dropping or misrouting of packets during transmission from sender to receiver. This may lead to performance degradation in the network. To surmount this issue, we propose the modified secret sharing scheme to provide the data protection from unauthorized nodes, consistency of data and genuineness. In this algorithm, initially the identification of black hole attacks is achieved and followed by data protection from malicious nodes and also this scheme checks for the reality of the data. Here, we detect the misbehaviour that is dropping or misrouting using verifiable secret sharing scheme. The proposed algorithm achieves the better packet delivery ratio, misbehaviour detection efficiency, fewer packets overhead and end-to-end delay than the existing schemes. These can be viewed in the simulation results.
作者 R. Mohandas Rengaraju K. Krishnamoorthi R. Mohandas Rengaraju;K. Krishnamoorthi(Department of Electronics and Communication Engineering, Jayaram College of Engineering, Trichy, India;Department of Electrical Engineering, Sona College of Technology, Salem, India)
出处 《Circuits and Systems》 2016年第10期3174-3182,共9页 电路与系统(英文)
关键词 MANET Verifiable Secret Sharing Modified Proactive Secret Sharing Scheme End-to-End Delay OVERHEAD Misbehaviour Detection Efficiency and Delivery Ratio MANET Verifiable Secret Sharing Modified Proactive Secret Sharing Scheme End-to-End Delay Overhead Misbehaviour Detection Efficiency and Delivery Ratio
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部