Skip to main content

Randomness Generation Based Quantum Key Agreement for Secured Routing in Mobile Ad Hoc Network

  • Conference paper
  • First Online:
Smart Intelligent Computing and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 159))

  • 763 Accesses

Abstract

Randomness Generation based Quantum Key Agreement (RGQKA) technique have the route discovery phase and data packet transmission. The route discovery process finds the shortest route path from the source node to the destination node through the control message distribution. After finding the route path, RGQKA technique is carried out to transmit the data packets in a secured manner. In quantum key agreement phase, the quantum keys are randomly generated for the source node and the destination node. Then, a data packet gets encrypted in the form of binary bits. Then, binary bits are converted into qubits through randomly selected bases and sent to the destination node. Receives qubits, it decrypts the qubits to acquire the original data packet information using the same quantum key. Simulation of RGQKA technique and existing methods have parameters such as packet delivery ratio, routing overhead, packet loss, and throughput with respect to a number of data packets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Khalili-Shoja, M.R., Amariucai, G.T., Wei, S., Deng, J.: Secret common randomness from routing metadata in ad hoc networks. IEEE Trans. Inf. Forensics Secur. 11(8), 1674–1684 (2016)

    Article  Google Scholar 

  2. Anand, A., Aggarwal, H., Rani, R.: Partially distributed dynamic model for secure and reliable routing in mobile ad hoc networks. J. Commun. Netw. 18(6), 938–947 (2016)

    Article  Google Scholar 

  3. Zhao, S., Kent, R., Aggarwal, A.: A key management and secure routing integrated framework for mobile ad-hoc networks. Ad Hoc Netw. 11, 1046–1061 (2013)

    Article  Google Scholar 

  4. Kaliappan, M., Paramasivan, B.: Enhancing secure routing in mobile ad hoc networks using a dynamic bayesian signalling game model. Comput. Electr. Eng. 41, 301–313 (2015)

    Article  Google Scholar 

  5. Rajkumar, B., Narsimha, G.: Trust based certificate revocation for secure routing in MANET. Procedia Comput. Sci. 92 (2016)

    Article  Google Scholar 

  6. Desai, A.M., Jhaveri, R.H.: Secure routing in mobile ad hoc networks: a predictive approach. Int. J. Inf. Technol. 1–12 (2018)

    Google Scholar 

  7. Subbaraj, S., Savarimuthu, P.: EigenTrust-based non-cooperative game model assisting ACO look-ahead secure routing against selfishness. EURASIP J. Wireless Commun. Networking 2014(78), 1–20 (2014)

    Google Scholar 

  8. Papaj, J., Dobos, L.: Cooperation between trust and routing mechanisms for relay node selection in hybrid MANET-DTN. Mobile Inf. Syst. 2016, 1–18 (2016)

    Article  Google Scholar 

  9. Amraoui, H., Habbani, A., Hajami, A., Bilal, E.: Security-based mechanism for proactive routing schema using game theory model. Mobile Inf. Syst. 2016, 1–17 (2016)

    Article  Google Scholar 

  10. RahimiZadeh, K., Kabir, P.: Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks. Secur. Commun. Netw. 7, 1746–1763 (2014)

    Article  Google Scholar 

  11. Alnumay, W.S., Ghos, U.: Secure routing and data transmission in mobile ad hoc networks. Int. J. Comput. Netw. Commun. (IJCNC) 6(1), 111–127 (2014)

    Google Scholar 

  12. Ghosh, U., Datta, R.: SDRP: Secure and dynamic routing protocol for mobile ad-hoc networks. IET Netw. 3(3), 235–243 (2014)

    Article  Google Scholar 

  13. Paramasivan, B., Prakash, M.J.V., Kaliappan, M.: Development of a secure routing protocol using game theory model in mobile ad hoc networks. J. Commun. Netw. 17(1), 75–83 (2015)

    Article  Google Scholar 

  14. Zalte, S.S., Ghorpade, V.R.: Secure token for secure routing of packet in MANET. Int. J. Comput. Sci. Inf. Technol. 5(6), 6916–6919 (2014)

    Google Scholar 

  15. Wan, Z., Ren, K., Gu, M.: USOR: an unobservable secure on-demand routing protocol for mobile ad hoc networks. IEEE Trans. Wireless Commun. 11(5), 1922–1932 (2012)

    Article  Google Scholar 

  16. Chintalapalli, R.M., Ananthula, V.R.: M-LionWhale: multi-objective optimisation model for secure routing in mobile. IET Commun. 12(12), 1406–1415 (2018)

    Article  Google Scholar 

  17. Hurley-Smith, D., Wetherall, J., Adekunle, A.: SUPERMAN: security using pre-existing routing for mobile ad hoc networks. IEEE Trans. Mob. Comput. 16(10), 2927–2940 (2017)

    Article  Google Scholar 

  18. Bhardwaj, S., Aggarwal, S., Goel, S.: A Novel technique of securing mobile ad hoc networks using shared trust model. Int. J. Inf. Comput. Technol. 3(9), 909–916 (2013)

    Google Scholar 

  19. Liu, W., Yu, M.: AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 63(9), 4585–4593 (2014)

    Article  Google Scholar 

  20. Eissa, T., Razak, S.A., Khokhar, R.H., Samian, N.: Trust-based routing mechanism in MANET: design and implementation. Mobile Netw. Appl. 18(5), 666–677 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Daniel Nesakumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Daniel Nesakumar, C., Saravanan, V. (2020). Randomness Generation Based Quantum Key Agreement for Secured Routing in Mobile Ad Hoc Network. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 159. Springer, Singapore. https://doi.org/10.1007/978-981-13-9282-5_5

Download citation

Publish with us

Policies and ethics