Enhancement of Network Security in Wireless Mobile Adhoc Networks for IOT Applications
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
The communication between smart devices in the Industrial Internet of Things relies heavily on Mobile Ad-hoc Networks (MANETs), allowing decentralized connectivity between nodes. Because of its digital qualities, encrypting one-dimensional data directly might be challenging. For this reason, a lightweight key frame extraction method is developed that is both safe and efficient for enhancing personal data confidentiality.
newline
newlineIn addition, MANETs have applications in fields as diverse as law enforcement, the military, disaster relief, search and rescue operations. To safeguard information in MANET-based IoT, this research introduces an updated unpredictable map for encryption as well as decryption. A cryptographic method is included in the privacy-preserving models to strengthen encryption further. An updated unpredictable map is developed for key creation to provide secure encryption and decryption without data loss.
newline
newlineFurther, this proposed research aims to develop robust security protocols named Self Adaptive Sail Fish Optimization Algorithm and Crow Harris Hawks Search Optimization Algorithm (SA-SFO and CHHSO) for MANET-based IoT applications. The proposed approaches (SA-SFO and CHHSO) introduce a chaotic cryptography-based privacy preservation model and optimizing the key generation process through a newly developed SA-SFO and CHHSO algorithms.
newline
newlineIn the MANET, edge devices communicate primarily through text messages. These messages consist of alphabetic, numerical and special characters. They are then converted into plain text by encoding
newline
newlineVi
newline
newline
newlineeach character into a 16-bit binary value. Following this conversion, the plain text undergoes encryption. For this encryption process, an optimized key is chosen using a proposed chaotic map based on optimization algorithms, resulting in the generation of the cipher text. Subsequently, the decryption process is executed on the cipher text using the same optimal key to recover the original content.