Intelligent privacy preservation proctol in wireless MANET for IoT applications using hybrid crow search-harris hawks optimization

Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for complex scenarios, including law, military enforcement as well disaster recovery, and emergency rescue. Among different cryptographic algorithms, there is a chance of data hacking according to random key generation. The major...

Full description

Saved in:
Bibliographic Details
Published in:Wireless networks Vol. 28; no. 6; pp. 2713 - 2729
Main Authors: Pamarthi, Satyanarayana, Narmadha, R.
Format: Journal Article
Language:English
Published: New York Springer US 01.08.2022
Springer Nature B.V
Subjects:
ISSN:1022-0038, 1572-8196
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for complex scenarios, including law, military enforcement as well disaster recovery, and emergency rescue. Among different cryptographic algorithms, there is a chance of data hacking according to random key generation. The major purpose of this work is to plan and implement a new security protocol in MANET that is applicable for IoT platforms. The approach focused on this research is the modified chaotic map for encryption and decryption to deal with MANET and IoT data. The privacy preservation model is designed with a suggested cryptographic algorithm for enhancing the privacy and security of the MANET and IoT. An enhanced chaotic map is developed for processing the key generation that maintains the encryption and decryption process and prevents the loss of data while recovering the data. The adaptive key management strategy under the chaotic map is developed in this paper using a hybrid meta-heuristic algorithm named Crow Harris Hawks Search Optimization (CHHSO). Finally, the security analysis and performance evaluation in comparison is made in terms of “statistical analysis, convergence analysis, and communication overhead” that show the improved performance of the proposed model.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1022-0038
1572-8196
DOI:10.1007/s11276-022-02986-y