Affiliation:
1. Rabindranath Tagore University
Abstract
Abstract
Independent communication in Mobile Ad-hoc Networks is widely recommended in Ad-hoc Networks to easily transmit data in undefined situations and make strong connections between sensors directly without any extra infrastructure. The MANET network's security issues are explored and solved by using high-security features by chaotic function. The chaotic cryptographic security can make help by generating highly complex pseudo-random numbers. The complexity is the first feature of the chaotic cryptosystem to get high-level security applications for the MANETs communication. In this paper, the Diffie-Hellman key exchange protection is used to establish the identification of user access links, and a chaotic function is added to generate highly complex situations for attackers to read the encrypted information. The lightweight speed of chaotic functions can also prevent protection without giving time to attackers. So both security features are combined as an Efficient and Lightweight Chaotic function with Key Exchange Protection (EL-CKP). The Efficient protection and lightweight speed of EL-CKP are analyzed better than existing AES and RSA security algorithms by comparative analysis of encryption time and the avalanche effect.
Publisher
Research Square Platform LLC
Reference22 articles.
1. Mobile Ad-Hoc Networks Applications and Its Challenges;Raza N;Communication and Network,2016
2. Tsou,” Man-In-The-Middle-Attack: Understanding In Simple Words;Malik A;International Journal Of Data And Network Science,2019
3. Signed (Group) Diffie-Hellman Key Exchange with Tight Security;Pan J;Journal Of Cryptography,2022
4. Pavicic, M. (2021). “How Secure Are Two- Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?”, Entropy, vol. 23, no. 2, pp.1–10, https://doi.org/10.3390/e23020163.
5. Wang, X., Zhang, X., Gao, M., Tian, Y., Wang, C., & Iu, H. H. C. (2023). “A Color Image Encryption Algorithm Based on Hash Table, Hilbert Curve and Hyper-Chaotic Synchronization”, Mathematics, vol. 11, no. 3, pp. 1–18, https://doi.org/10.3390/math11030567.