Premium
Secure and efficient data transfer using spreading and assimilation in MANET
Author(s) -
Kausar Samina,
Habib Muhammad,
Shabir Muhammad Yasir,
Ullah Ata,
Xu Huahu,
Mehmood Rashid,
Bie Rongfang,
Iqbal Muhammad Shahid
Publication year - 2020
Publication title -
software: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.437
H-Index - 70
eISSN - 1097-024X
pISSN - 0038-0644
DOI - 10.1002/spe.2782
Subject(s) - computer science , computer network , encryption , mobile ad hoc network , plaintext , cryptography , data transmission , wireless ad hoc network , cryptographic primitive , distributed computing , data security , cryptographic protocol , wireless , computer security , network packet , telecommunications
Summary Mobile ad hoc Network (MANET) is a cluster of moveable devices connected through a wireless medium to design network with rapidly changing topologies due to mobility. MANETs are applicable in variety of innovative application scenarios where smart devices exchange data among each other. In this case, security of data is the major concern to provide dependable solution to users. This article presents a secure mechanism for data transfer where sender splits the data into fragments and receiver gets the actual data by assimilating the data fragments. We have presented an Enhanced Secured Lempel‐Ziv‐Welch (ES‐LZW) algorithm that provides cryptographic operations for secure data transfer. In proposed model, we have utilized the disjoint paths to transfer the data fragments from sender side and assimilate these fragments at receiver to get the original data. The messages containing data fragments are compressed and encrypted as well. Our scheme ensures confidentiality, integrity, efficient memory utilization, and resilience against node compromising attacks. We have validated our work through extensive simulations in NS‐2.35 using TCL and C language. Results prove that our scheme reduces memory consumption along with less encryption and decryption cost as compared to blowfish especially when plaintext has more repetitive data. We have also analyzed the impact of creating data fragments, fraction of communication compromised, and probability to compromise the data fragments by subverting intermediaries.