Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network

Version 1 : Received: 20 December 2023 / Approved: 21 December 2023 / Online: 22 December 2023 (01:18:53 CET)

How to cite: Zanab, M.; Ashraf, H.; Jhanjhi, N. A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network. Preprints 2023, 2023121652. https://doi.org/10.20944/preprints202312.1652.v1 Zanab, M.; Ashraf, H.; Jhanjhi, N. A Collusion attack prevention (CAP) scheme for securing Mobile Adhoc Network. Preprints 2023, 2023121652. https://doi.org/10.20944/preprints202312.1652.v1

Abstract

Due to the advancement and availability of internet in present age, device tend to become wireless as well. Mobile ad-hoc network is a wireless environment that consist of advanced agility of nodes and does not contain on any central administrative authority. As it does not contain any central administrative authority so being wireless environment, the network is vulnerable to security threats and suffers in performance as well. Security of MANET is the core issue in this era, meanwhile the data is sent over untrustworthy network. Several techniques were proposed to secure data over Mobile Adhoc Network though cryptography that is one of the most reliable techniques to protect data. In our proposed methodology a Secure Cryptographic technique for Mobile Adhoc Networks (SCTMA) we proposed A Collusion attack prevention (CAP) scheme with ElGamal key generator along with DNA encryption Algorithm is used to make it more secure. The proposed scheme protects the network against collusion attacks and improves the performance as well. Performance analysis will be measured on the basis of key generation time, response time, encryption time and decryption time. The proposed scheme also protects the network against collusion attacks.

Keywords

 Collusion attack prevention; Wireless; Mobile

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.