IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Selective Cooperative Jamming Based Relay Selection and Blowfish Encryption for Enhancing Channel and Data Security in CRAHN Routing

Selective Cooperative Jamming Based Relay Selection and Blowfish Encryption for Enhancing Channel and Data Security in CRAHN Routing
View Sample PDF
Author(s): Hesham Mohammed Ali Abdullah (Hindusthan College of Arts & Science, India & Bharathiar University, India)and A.V. Senthil Kumar (Hindusthan College of Arts & Science, India & Bharathiar University, India)
Copyright: 2019
Pages: 20
Source title: Enabling Technologies and Architectures for Next-Generation Networking Capabilities
Source Author(s)/Editor(s): Mahmoud Elkhodr (Central Queensland University, Australia)
DOI: 10.4018/978-1-5225-6023-4.ch005

Purchase


Abstract

The problems of security and secret communication for the secondary users in the cognitive radio ad hoc networks (CRAHNs) have been extensively researched. Most routing protocols in CRAHNs, though providing efficient routing, do not produce satisfactory secrecy rate and security. One such model is spectrum-map-empowered opportunistic routing (SMOR) which has been the motivation behind this research contribution. A better and secured routing algorithm is developed in this chapter by modifying and enhancing the SMOR model. As the relay selection enables the secrecy in communication between the users, selective cooperative jamming (SCJ) based relay selection is utilized in the proposed model. This approach generates weighted jamming signals in selected relays to create high interference in the communication direction other than the legal users and confuses the eavesdroppers. For secured data transmission, data encryption processes are carried out using a blowfish encryption algorithm. This further strengthens the security in communication between users on the same frequency and also helps in avoiding the eavesdropping attacks. The performance of this proposed model named as SCJ with Blowfish Modified SMOR (SCJB-M-SMOR) has been evaluated and the comparison results showed it has better secrecy rate and secrecy outage probability.

Related Content

S. Vijay Anand, Sathis Kumar B.. © 2023. 12 pages.
Sudarson Rama Perumal, Muthumanikandan V., Sushmitha J.. © 2023. 30 pages.
Sipra Swain, Biswa Ranjan Senapati, Pabitra Mohan Khilar. © 2023. 31 pages.
Uma Mageswari R., Nallarasu Krishnan, Mohammed Sirajudeen Yoosuf, Murugan K., Sankar Ram C.. © 2023. 20 pages.
Divya L., Pradeep Kumar T. S.. © 2023. 15 pages.
Pradeep Kumar T. S., Vetrivelan P.. © 2023. 15 pages.
Vanitha Veerasamy, Rajathi Natarajan. © 2023. 16 pages.
Body Bottom