In this paper we try to incorporate a new approach in CEAACK MANETs by implementing a cryptographic technique to tackle the vulnerabilities of the network. This cryptographic is highly secure …show more content…
This unstable nature of wireless networks cannot be stated as an excuse for slack security measures .Vulnerable or not the data transmitted must maintain its integrity and the confidentiality of the sender. Authentication and authorization are the two faces of data security which otherwise can be interpreted as the integrity and confidentiality of data. This dual aspect of security is only possible with the inclusion of strong cryptographic techniques that can safeguard the transmitted data with virtually unbreakable cryptographic codes that helps the network to secure itself against …show more content…
Though the CEAACk scheme falls short where energy and delay are concerned it still makes up for these shortcomings by delivering the packets securely to the destination. These drawbacks do not play any significant role in the system throughput, which, from the graph, clearly shows that the network throughput is in fact increased when CEAACK is combined with D key.
Fig.7 PDR Comparison
Fig.8 Comparison of throughput
IX.CONCLUSION AND FUTURE ENHANCEMENT
In this research paper, we have proposed an efficient Distinct Dynamic key with CEAACK which is used to filter the attackers in the network and selects only genuine nodes for reliable data transmission.
In future, we plan to focus on issues that would help very highly secured dynamic key for future attacks like differential cryptanalysis. making it a very secure encryption process. For instance we plan to conduct a thorough investigation on how to modify this scheme to adapt to other routing schemes and open networks. Research is also planned to extend the dynamic key to advance digital signature techniques to avert all possible attacks on the network. Instead of attempting dynamic key in a simulated environment, such as NS2, plans are underway to implement the scheme in a real time environment to assess its performance and effectiveness under