Secured and Efficient Data Transmission in Manets Against Malicious Attack using DSR Routing and BCS Clustering with Hybrid AES-ECC Cryptanalysis
G. Murugesan1, M. Padmaa2, K. Nagarajan3, N. Premkumar4

1G.Murugesan, Assistant Professor,Department of ECE, Anjali Ammal Mahalingam College of Engineering,Tiruvarur.
2Dr.M.Padmaa, Professor, Department of ECE.Saranathan College of Engineering,Trichy.
3K.Nagarajan, Assistant Professor, Department of ECE,University College of Engineering, Ariyalur.
4N.Premkumar, Associate Professor, Department of IT, Kongunadu College of Engineering & Technology , Thottiyam , Namakkal.

Manuscript received on 23 August 2019. | Revised Manuscript received on 14 September 2019. | Manuscript published on 30 September 2019. | PP: 1268-1273 | Volume-8 Issue-11, September 2019. | Retrieval Number: J94840881019/2019©BEIESP | DOI: 10.35940/ijitee.J9484.0981119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile Ad-Hoc Network (MANET) is a self-configuring network of movable nodes linked by wireless creating a random topology. The nodes are free to move randomly. Thus, the networks wireless topology may be haphazard and may alter rapidly. The efficient route is established using Dynamic source routing (DSR) Routing Protocol. The Binary crow search (BCS) algorithm is used for clustering of sensor nodes and maintaining load balancing in an efficient way. Efficient black hole detection using Malicious Node Detection Mechanism-TX/RX (MNS-TX/RX) with optimized routing algorithm is implemented in a secure environment by using Advanced Hybrid Advanced Encryption Standard (AES) cryptanalysis and Elliptic Curve Cryptosystems. Thus “DSR-BCS-HAES-EEC-MANETs” algorithm has precisely detected the black hole node and finds the proper solution for transmitting data for maintaining lifetime and Load- balancing by analyzing performance such as Through-put, routing overhead, packet delivery ratio(PDR), drop, delay and energy consumption in a secure environment.
Keywords: Dynamic source routing, Mobile Ad-Hoc Network, Malicious Node Detection Mechanism, Hybrid AES and Elliptic Curve Cryptosystems.
Scope of the Article: