Online ISSN: 2515-8260

Keywords : Adleman) proxy with re-encryption


DISTANCE VECTOR REPORT AUTHENTICATION ADJUSTABLE ROUTING PROTOCOL USING SECURE VERIFICATION-BASED DYNAMIC NODE SELECTION IN MOBILE AD-HOC NETWORK

G. BALAMURUGAN; Dr.P. VIJAYAKUMAR

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 9, Pages 1823-1840

Mobile Ad Hoc Network (MANET) is a wireless network without an access point or node
physical infrastructure cooperation. Protection of data communication is because the nature
of MANET is a major challenge.A particularly challenging problem is how to detect and
maintain viable routing protocol possible attacks. In the mobile ad-hoc network, each node
must be capable of routing data, self-organization, and taking care of the routing domain. The
current implementation of laws and regulations has been a complex issue due to the lack of
fast-moving and fixed infrastructure nodes. The existing system of malicious nodes in the adhoc
network destroys the network performance of the original system. When a new node joins
the network, the network does not have other nodes based on trust any major difficulties in the
relationship between ad-hoc networks. Thus, the proposed system provides ad-hoc network
routing security and authentication. In this proposed system, each node needs to introduce a
Distance Vector Report Authentication Adjustable Routing Protocol (DVRAARP) and Secure
Verification-Based Dynamic Node Selection (SVBDNS) algorithm. DVRAARP provides
solutions to the greater threat of mobile ad-hoc network attacks. Enhanced SVBDNS requires
its next hop to send confirmation emails to the originating node by maintaining the
DVRAARP table. After receiving the route reply and confirmation routing path, the data was
forward to the destination with encrypted using anRSA (Rivest, Shamir, Adleman) proxy with
re-encryption. An SVBDNS algorithm is improved and extended by adding more realistic
strategies such as varying node position, movement, speed, and data verification. Also, to
identify the malicious nodes, it has been observed that this method will lead to the proposed
system fewer savings and less breakage of communication.