Version 1
: Received: 20 December 2023 / Approved: 21 December 2023 / Online: 22 December 2023 (01:18:53 CET)
How to cite:
Zanab, M.; Ashraf, H.; Jhanjhi, N. A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network. Preprints2023, 2023121652. https://doi.org/10.20944/preprints202312.1652.v1
Zanab, M.; Ashraf, H.; Jhanjhi, N. A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network. Preprints 2023, 2023121652. https://doi.org/10.20944/preprints202312.1652.v1
Zanab, M.; Ashraf, H.; Jhanjhi, N. A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network. Preprints2023, 2023121652. https://doi.org/10.20944/preprints202312.1652.v1
APA Style
Zanab, M., Ashraf, H., & Jhanjhi, N. (2023). A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network. Preprints. https://doi.org/10.20944/preprints202312.1652.v1
Chicago/Turabian Style
Zanab, M., Humaira Ashraf and NZ Jhanjhi. 2023 "A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network" Preprints. https://doi.org/10.20944/preprints202312.1652.v1
Abstract
Due to the advancement and availability of internet in present age, device tend to become wireless as well. Mobile ad-hoc network is a wireless environment that consist of advanced agility of nodes and does not contain on any central administrative authority. As it does not contain any central administrative authority so being wireless environment, the network is vulnerable to security threats and suffers in performance as well. Security of MANET is the core issue in this era, meanwhile the data is sent over untrustworthy network. Several techniques were proposed to secure data over Mobile Adhoc Network though cryptography that is one of the most reliable techniques to protect data. In our proposed methodology a Secure Cryptographic technique for Mobile Adhoc Networks (SCTMA) we proposed A Collusion attack prevention (CAP) scheme with ElGamal key generator along with DNA encryption Algorithm is used to make it more secure. The proposed scheme protects the network against collusion attacks and improves the performance as well. Performance analysis will be measured on the basis of key generation time, response time, encryption time and decryption time. The proposed scheme also protects the network against collusion attacks.
Keywords
Collusion attack prevention; Wireless; Mobile
Subject
Computer Science and Mathematics, Computer Networks and Communications
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.