Article
Version 1
Preserved in Portico This version is not peer-reviewed
A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network
Version 1
: Received: 20 December 2023 / Approved: 21 December 2023 / Online: 22 December 2023 (01:18:53 CET)
How to cite: Zanab, M.; Ashraf, H.; Jhanjhi, N. A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network. Preprints 2023, 2023121652. https://doi.org/10.20944/preprints202312.1652.v1 Zanab, M.; Ashraf, H.; Jhanjhi, N. A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network. Preprints 2023, 2023121652. https://doi.org/10.20944/preprints202312.1652.v1
Abstract
Due to the advancement and availability of internet in present age, device tend to become wireless as well. Mobile ad-hoc network is a wireless environment that consist of advanced agility of nodes and does not contain on any central administrative authority. As it does not contain any central administrative authority so being wireless environment, the network is vulnerable to security threats and suffers in performance as well. Security of MANET is the core issue in this era, meanwhile the data is sent over untrustworthy network. Several techniques were proposed to secure data over Mobile Adhoc Network though cryptography that is one of the most reliable techniques to protect data. In our proposed methodology a Secure Cryptographic technique for Mobile Adhoc Networks (SCTMA) we proposed A Collusion attack prevention (CAP) scheme with ElGamal key generator along with DNA encryption Algorithm is used to make it more secure. The proposed scheme protects the network against collusion attacks and improves the performance as well. Performance analysis will be measured on the basis of key generation time, response time, encryption time and decryption time. The proposed scheme also protects the network against collusion attacks.
Keywords
Collusion attack prevention; Wireless; Mobile
Subject
Computer Science and Mathematics, Computer Networks and Communications
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment