Open Access
ARTICLE
A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network
1 Department of Computer Science and Engineering, Panimalar Institute of Technology, Chennai, 600123, Tamil Nadu, India
2 Department of Information Technology, Vellore Institute of Technology, Vellore, 632014, Tamil Nadu, India
3 Department of Computer Science and Engineering, Loyola Institute of Technology, Chennai, 600123, Tamil Nadu, India
* Corresponding Author: W. Gracy Theresa. Email:
Intelligent Automation & Soft Computing 2023, 35(2), 1337-1351. https://doi.org/10.32604/iasc.2023.028425
Received 09 February 2022; Accepted 15 March 2022; Issue published 19 July 2022
Abstract
Mobile computing is the most powerful application for network communication and connectivity, given recent breakthroughs in the field of wireless networks or Mobile Ad-hoc networks (MANETs). There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision. For most applications, a framework must ensure that the retrieved data reflects the transmitted data. Before driving to other nodes, if the frame between the two nodes is deformed in the data-link layer, it must be repaired. Most link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it down. In other words, because of asset information must be secured from threats, information is a valuable resource. In MANETs, some applications necessitate the use of a network method for detecting and blocking these assaults. Building a secure intrusion detection system in the network, which provides security to the nodes and route paths in the network, is a major difficulty in MANET. Attacks on the network can jeopardize security issues discovered by the intrusion detection system engine, which are then blocked by the network’s intrusion prevention engine. By bringing the Secure Intrusion Detection System (S-IDS) into the network, a new technique for implementing security goals and preventing attacks will be developed. The Secure Energy Routing (SER) protocol for MANETs is introduced in this study. The protocol addresses the issue of network security by detecting and preventing attacks in the network. The data transmission in the MANET is forwarded using Elliptical Curve Cryptography (ECC) with an objective to improve the level of security. Network Simulator – 2 is used to simulate the network and experiments are compared with existing methods.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.