key: cord-0065059-461cst9c authors: Shukla, Mukul; Joshi, Brijendra Kumar; Singh, Upendra title: Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET date: 2021-06-28 journal: Wirel Pers Commun DOI: 10.1007/s11277-021-08647-1 sha: e7d9d2e669650b93920a10f86cb53403fa6af0c6 doc_id: 65059 cord_uid: 461cst9c Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole. During this they take a path which is the shortest for the place where it has to reach. During sending of message two types of attacks are generally seen such as the blackhole attack and the wormhole attack. In this research we have tried to focus on two major attacks such as the black hole and the worm hole attack. In this we have used two types of protocol such as the AODV whose other name is SWBAODV and the scalable-dynamic elliptic curve cryptography. During the use the prime numbers are selected at random. We can also choose certain specific prime number. Moreover the security level does not depend on the size of the key. Keeping A as worm hole and B as the black hole we have made a two dimensional vector function named as F [A, B]. Two types of study is done by us in our research such as the with attack and without attack. In case of no attack study we have shown graphically using the AODV and the in case of attack we have given it as the BAODV and also the WAODV. Here we have applied a specific method SWBAODV to our selected attack case. The results were found to be interesting for the case of, packet delivery ratio and end to end delay was near 188.40 on comparing it with the BAODV and the WAODV. It has shown 51.38% more value compared to the BAODV and WAODV. There has been a drastic fall in the value of delay and it reached to a 63.2 for BAODV to WAODV. The other two things which we have discussed here is the consumption of energy and the overhead routing. The results in case of SWBAODV were good compared with the consumption of energy and save about 73.52% with the attacked case and around 69.35% with the routing done on the BAODV and WAODV. From our study we were able to say that it will give protection to the (MANET). The MANET is used without any network. The main benefit is that it can work where there is no wire link possible and also where there is very fast deployment. It contains certain mobile nodes and base stations. It covers various sections such as the discovering routes, packet sending, communicating securely and also the monitoring of the network. It has to be protected against the attack and to do this a specific algorithm is made [1] . The multi hop fashion is used for the routing using the MANET. In both wire and wireless system we have to face certain problems like the face route failure.The main things are the mobility of nodes and the route failure in the MANET [2] . The design of the MANET can be seen from the Fig. 1 given above. The major challenge faced is the routing during the use of the MANET. The method should be such that it can fight for the path link break under difficult conditions between the starting and the ending pint in the path during the communication [3] . Passive and active are the two types of attack seen in the MANET, The major attacks of our study here are the worm hole attack and the black hole attack. BlackholeAttack: In this case the information such as the smalled route between the starting and the ending point are send in a wrong method. It is done by sending the RREP packets. The attck of black hole among the nodes twenty one and twenty two and also for thirty two and thirty three are seen in Fig. 2 .This has to be taken care of and is very important in the ad hoc network. To stop this we have to find the malicious nodes and for that we have taken a algorithm which can help to stop this type of attack [4, 5] . Wormhole Attack: For this we have need two nodes which are malicious in nature. They keep track on all the activities happening. Then they decide and make a plan to attack the network by making a tunne. This is nearly impossible to detect and it also is a major attack. The method which we have suggested in our study will help to prevent this. The Fig. 2 shows the two nodes 11 and D shows the nodes which are malicious and are prepared by creating a tunne. The minimum nodes are required for the worm hole attack [1, 6] . Out of several algorithms none is usefull for the detection of attack. It is not taking care of such attackes. The algorithm whihch we have taken here will be help ful in the black hole and the worm hole attack. There is a speciality of our algorithm. Figure 2 shows types of attacks like black hole, and worm hole. Blackhole attacks are capture packets and drop packets that way create a loss in whole networks. Wormhole attack is the loss whole network through a tunnel, in this above figure denote W and Wh means wormhole attack, and B means blackhole attack. This figure has a total of 3 Fig. 1 Desing of the MANET blackhole nodes and 2 wormhole attacks. In this scenario between source, the destination has four routes, but three routs are infected through the attacker, and only a single route is free that's why packet transmission using the proposed protocol follows the safe route between source to destination. The two main purpose of our research are as follows. • By using a cryptosystem with the elliptic curve and a key which is decreased he have made a scalable and dynamic cryptosstem. • For resource oriented device the ECC is very important method. • The ECDLP is dependent on the cryptosystem and is shown by the selection of the point base G = (x, y), which is a reliable method. The big number order are given by G. • The two main parameters on which it depends is the crypto system adnt eh synchronization curve relating to both the links and which results in error. • The security is dependent on two thing such as the ECC security and the bonus and is done by selecting randomly the number which are prime. The following is the scheme of the paper. In paper having five section, respectly section introduction, literature review, proposed methdology, implementation ans result, and final last section conclusion. [7] in which dlog is used to show two things. first the method to train and the second the method of glitch. this will help in two major things such as the network operation and its nodal attack and also the enents which are abnormal. It has seven clusters and the rate of accuracy is around 96%. [8] deals with the prevention of MANET by the black hole attack. The have prepared the method such as the ad hoc on demand vetor for the routing and is applicable for the black hole attack. It isused for the 2-opt algorithm.The local search used is the 2-opt for the algorithm. It increases the factors for the purpose of delivery ratio packet, sink and hops, delay on end to end basis. [9] The Particle Swarm Optimization (PSO) algorithm is a special thing and can be defined by netural netoworks used for the detection of the intruder node. The researcher here deals with the communicatin delay, energy consumption and isolation of the intruder. [10] Here we have tried to show the nodes which are seen in the mole ad hoc network. They have been further divided into various classes. [11] Deals with the two thing the Information-Centric Networking (ICN) and privacy in ICN literature and the questions related to it. The major areas are the risk of privacy, control assess, mechanism of the enforcement and the treath to the security. [12] here have tried to discuss the MANET and black hole attack. The two protocol used are the AODV and the DSR for two praticular simulators such as the NS2 and the NS3. The result show that black hole attack reduces the end to end delay. The method of discvery route is reduced. [13] Tried to discuss the wormhole attack whihc is very improratnt in the MANET. In such cases a tunned is created betweent the two nodes. There are two methods used for this the active and passive. [14] is used when there is two method for the reaching to the destination. The results are better in case of routing and delay and we also have used the algorithm. [15] The method to prevent that is the self-cooperative trust (ESCT) algorithm and is used to protect the MANET. ESCT is used for the exchange of information and analyze the proper judgement. this is better suited to the network which is ad hoc and its parameter. The Rivest Shamir Adleman (RSA) and the Diffie Hellman (DH) are the best among the two platforms for the manet and are used for the crypto system and also for the Elliptic curve cryptography(ECC) for the reason of security [16] . There are two methods DH and RSA, and the minimal key required is the ECC and used for less consumption of power. They are applicable to many application having orientation for the research [17] [18] [19] [20] . In [17] , ECC is for the 8-Bit Atmel processor. In [19] , The researchers have also discussed the ECC in the enhanced mode. And it can be used in the prime field (MSP430-16bit). Reliabe results are obtained and the efficiency in terms of ECC and micro controllers have low power. The two methods are used such as the 8-bit and the 256-bit and results are shown in the Table 1 . Lage keys are need as the security parameters are used for the security of ECC and are also changeling. For resource oriented platform and e regular computers the size of the key is not important.There are many problems related to the user. In [21] NIST, For security issue proper curve is to be selected. The situation is more complicated when it lacks the user understanding and make it inefficient in case of the security. The security issues are still there for the curve which is standard. In 2007 [22] , in elliptic curve it increases the issues related to security. Here we have discussed the routing methods implemented for the attacks. Various methods have been implemented which are used in the research. Goal set are also checked . The various types are given as follows. The ECC development issues and the resource oriented platforms are discussed here and tried to eliminate. The method is scalable and dynamics and discusses about the key size which is decreased. Here we have made a method to make more number of curves and also more security levels. This is related to the purpose of efficiency [23, 24, 24] . For security level 128,192,256 bits the curves are given here. In base field we have tried for better pseudo-Mersenne and arithmetic Montgomery-friendly.There are several constraints related to security [23] , p-224, p-384, p-521and is given by curves NIST. The safe and unsafe elliptic curves are also identified and the present curves can also be detected. Aranha et al. Two methods for efficiency and providing security are: Edward x and x 2 + y 2 = 1 + ax 2 y 2 with prime 2 b − c, b and c are given here.;a, b, c are given Table 1 and shows the security of the curve. The two points are generated the base point and the initial point. The points required are deisgned accordingly. If we select the parameters related to the curve in a random manner it will be able to handle the loss due to security and loss done by small key.It is very useful in the processor with are simple and can be implemented there. Prime number is given by q and finite filed is given by Fq this is for three factors. EjFq show the curve which is on Fq and the result can be given by the equation P = (x, y) x, y ∈ F q reported suing Weierstrass y 2 = x 3 + ax + b , and has a, b ∈ F q and 4a 3 + 27b 2 ≠ 0 , and O shows the point of ∞. is −P = (x, − y) is the inverse of P used near the point of symmetry. O is used to denote the abelian group, used for addition and doubling point operation. From this the problem related to the lograthim is discussed. [25] Hasse's is limited to the points over E| Fq, shown by the #E Work on the E | Fq can be seen using the closure property and gives the points over E|Fq . Here two point addition takes place geometrically i.e. P&Q using R as real number on the curve E, E|R shows the point of intersection ad the curve is negative Pand Q. The line and the tangent are used for the case where P and Q are same. It starts doubling when it is added to itself. This rule is applicable to value of E everywhere. They are denoted in the cordirnate form by this rules. Point Addition P is given by if P, Q ≠ 0, P ≠ Q and Q ≠-P, using points related to R = (× 3, y3) and used of R in addition in R = P + Q are given by the results in 2, 3 and 4. Point Doubling P is expressed as = x 1 , y 1 ∈ E | F q and R = x 3 , y 3 = P + P , given rise to the 4, 6 and 7 equation. The introduction of operation can be used for the scalar multiplication. 3 1 + a ∕ 2y 1 Scalar Multiplication In this P = (x 1 , y 1 ) ∈ E | F q, followed by k as integer. k and P are multiplied and are given by the kP, and are further added with P again for k more times. [26] . P is used to denote the point order d and the results can be shown by dP = 0. (Paar, [27] Lagrange's Theorem has been given in such as way that #E that it is been divided by d the integer. H is used to show the factor and can be got by h = #E/d; the value of h is found to be less [27] . Pohlig-Hellman's [28] is used for the taking the advantage of this situation and is found the value is large for d.This is used for the creation of E|Fq (log problem which is discrete), and is given by Logarithm Problem for the Elliptic Curve Discrete (ECDLP). ECDLP: For the two points here P&Q which are related to E|Fq, we get an integer one and it is l ∈[2, d -1] and Q = lP, for such type of integer. The sub exponential time has relation with the algorithm [25] .We cannot crack such a crypto system and if has higer security compared to RSA. In case of using same domain in advance we can use ECC.The integer a and b and Fq the finite field are shown in the curve where P ∈ E | F q wand they select the value of P randomly. where cofactor is h and the order is d. We can also create the secret key by using the DH key and also the protocol for the exchange. (1) k a ∈ [2, d-1] is selected randomly, used for the calculation of Q a = k a P,and and it transmitted to the Party B Q a . (2) similarly,from B we can create k b ∈ [2, d -1], used for the calucaltion of Q b = k b P,and yilds the A Q b . (3) A is used to compute the shared key as Q s = k a Q b . (4) B is used to compute the shared key as Q s = k b Q a . (5) For safe commication both A and B can be used and we can use both of them for the generation of key Qs. Furhter it can be given by the protocol. (6) Let M ∈ F q has to be transmitted to A and also has to be given in B, M A can be used for encryption and for calculating C = M + Q s . (7) M from C are used for decryption, and for the calculation of M = C − Q s . by B. The data related to different parameters are given in the Table 1 . The curve for ECC using the scalable structure can be created by using three thing a,b,c.It is related to the method of creating secure curve data. L shows the number of elliptial curve and is seen from the Table 2 ,integer is generated in random manner and is related to every curve. r l i l i ≠ l j ∀i ≠ j for certain case of curves there i varies with in the limit of zero and till L − 1 . Starting the curve from l i , P i is the starting place also d i , shows it order with P i . The conversation which is confidendial is given by a curve. The security of ECC is given by different signs and is denoted by the e [23] -sec. 256 size is specificed for the ECC key to attain 128 value of -sec [23] . There are several problems associated with MANET. for showing strong curves -sec values very higher so, there fore values which are low are used -sec, that is the -sec curves has values in the limit of 128also it is interchangeable and are given by -sec curves having more than 110 bits and has the low values of bits. The efficiency will be more and the power consumption will be less in such cases. So to show thta MANET is useful we have to select the communication curve which give more security and can cover the problem of key size and is given in There are various parameters which are stored randomly using the radio frequency indentification tag which can be used for authentication and is the main reason behind the pseudonym throttling [29] . In this investigate we have tried to emphasis on the Polonius Authentication [30, 31] . With given request the pseudonym gives a tag and when visited it will began from the starting. Curves can be described by the multiple set parameters. Upon request for every set there is a curve. They are sent in a proper order upn the request. From the Fig. 3 we can say that they can be executed by visiting the list. For the construction of the cryptosystem the base point are more suitable and also are related to the ECDLP and are given by G = (x, y) G must be there in as much as order which are there. Fro EC the method of representing is #E = hd, and it gives the value of base point d [27] and is given by fisrt step in the algorithm. P ∈ E | F q,w here P are put on random basis. The G value is obtained from the Scalar multiplication of hP.The point at the base is taken as G for the case when neither G or dG are at infinity.When we need the parties of synchronization we can use both the parties and is given in our approach. Here we can keep the starting point as the Pi and the for each curve li, and it gives proper value of G. The second algorithm gives the value of Montgomery Curves for the starting point. xo are selected randomly using Fq, and is given by Fig. 3 Parameter synchronization protocol flow a shows the residue quadratic of mod 2 b − c and (x 0 , y 0 ) and are shown by the infinity point, the outputP 1 x 0 , y 0 from the starting point. From the starting the P is given and then the value of G is calculated from that. The ECDLP hardness and the synchronization curve gives he details of the crypto system. The decryption and the encryption method is dependent on the task of synchronization.. The can be helpful to reduce the system failure chance. Damage can be done by desynchronization so avoid this type of situation we have to create such a protocol that it will reset all the parameters. The figre 4 and 5 shows this type of situation. The value are used for the further calculations. The steps like the + 1 and -1 are calculated and followed by desynchronization. The perspective for the IoV, party A is used for Sensor(S), and is given by using B as Gateway(G) for both the study. the ID and ID' can also be used. C f stores the last curve and the value of S&G are obtained from all the curves: C f , Cc, and Cn; The CcCn states are used for the information related to synchronization. it is given by following three Eq. as 9, 10, and 11. The results are given by the bits and are shown by y ||, the coordinates of x & y of points P are given by P x i and P y i Respectively. Figure 4 has been ud. to show the curves in G & S and from this we can get G G j and G G j (j = f, c, n), the and used for the synchrozation of the flow of states and the protocol verification. (1) G is used for obtaining R form this value the value of verification information G 1 = hash can be calculated. ( C G c . || ID || R). (2) G is used to sent the Query request R, G 1 to S. (5) is used for the calculation of G 1 = S 1 . If G 1 same as the S 1 , the curve parameter and the synchronization has been put for this purpose. i.e., C s c is the same as C G c , then S goes directly to Step 12 . If G 1 is not same as S 1 , S and will go the following 6. (6) S is used for the calculation. (7) S is given by G 1 = S 2 . If G 1 are same as S 2 , helps in the updation of the isses and also the value of G i.e., C G c are same C S f , then S has been seen in the following step 8. If has not specific way to go to Step 9. (8) Curve parameters can be updated using S by the following equation: (9) write back C S n as C S c ; (10) write back C S c as C S f ; (11) C S f is again generated for curve parameters and given by C S f ; goes directly by Step 12. (12) S are obtained by S 3 = hash(C S n || ID || R) and followed by Step 10. (13) S checks if G 1 = S 3 . If G 1 is equal to S 3 , and given by G and desynchronization are given by following i.e., C G c are related to C S n , then S is given by Step 11 shown the jump has no equality towards step13. (14) S is used to show the upgrading parameter: (15) Writeback C S f as C S c ; (16) Writeback C S c as C S n ; (17) To obtain C S n by curve of parameter and we get the value of C S n ; for the step 12. (18) S is used for the generation of the value of G S 4 (19) S is used for the rejection information. If S accepts the request for announcement, a procedure for confirmation will be carried out by G ' (1) G gives the support of Information, and verification is done by {S 4 } using S. (2) G 2 calculation = hash ( C G c ||ID ' ) by G. (3) G is used to identify G 2 = S 4 . If G 2 is same as S 4 , and S is used for the synchronization for the parameters of the curve, is further used for the curve synchronization. The wrong attack or the desynchronization can also take place., and is further used for the G to S. Figure 5 gives the method of the request for reset and is given by the following method. (1) A nonce M are used to obtain G are used to calculate G 3 = hash ( C G d ||ID||M) is done. (4) The method to calculate for S 5 = hash ( C S d . || ID || M) was carried out by using S. (5) S is found to be correct if G 3 = S 5 . If G 3 is same S 5 , and is said that for sending the request G and for the storing of curve G are similar for both the cases S, and the value of S is used for the 6 th step; or, S and used for the 7 th step. (6) For calculating G S 6 = hash ( C S d ||ID ' ) and also its sending is carried out by S. (7) information for the rejection is sent by S. For the verification of request for reset the steps taken are as follows: (1) For calculating G 4 = hash ( C G d . ||ID ' ) we have used G. (2) From G we can say if S 6 are equal to G 4 . For S 6 same as G 4 , it is proved that the information which is got from S is again stored in the S for the starting of the conservation. The information is taken as default and the conservation is also shut down. For our protocol we have used the R randomly and also again G is given C G c || ID || R. and it is given by the sage alteration (R, G1); and implemented by thprotocol, request for the rejection is taken and the user S and also for the curve again taking as default. G 1 cannot be used for learning and conversation cannot be built from d and the information which is forged is not obtained from S. So the security level is given in [24] , and can be given by the equation of the ρ-sec by the method of bits an EC. Equation 12 shows the results: The So has same value as the B 2 , where B = ⌜log 2 q⌝ is given by integer q as bit length. The key size is responsible for the selection of security so good security must be there. From Fig. 6 and NIST 2020 we can do estimation of the complexity complexity S er for and is also given by random means using B. The value of S com is obtained by combining the bonus which we have got and the ECC security just by using a prime number. Figure 7a gives the value of S ee and S o, wECC is used and nearly thiry percent increase is seen. The ρ-sec is calculated. From Fig. 7b remaining data are obtained..The results are given in 7b. As an example,256-bit required size for the ECc and can be got by 128 bits for the ρ-sec. From Table 1 we can get the value of consideration of the curve and is found to be 192-bit, as ρ-sec of 34is used for the additional security. The security for both is given by ρ-sec (96 + 34) = 130-bit, and is found to be more as 256-bit for the level of security of ECC. Fig. 6 The additional security level and random prime number selection ECC designed for the embedded system used for the execution time [17] [18] [19] [20] . By using this method the performance can be improved. 256, 224, 192, 160, 128 bits is used to measure the crypto system by using the Micro ECC library [32] , they efficiency can also be known by the key size. From the Fig. 8 we can see the efficiency improvement by the signature, verification and also by the key generation. Less time is required for the key generation.Also for making 192 bits for the 224 bits and also for the signature and the verification. The value for the reduction is 4.6 ms to4md, 4 to 6 and 8 to 5 ms. The improvement in terms of percentage is about 33%, 31%, and 35%, and care has been taken that the security level is not reduced 1 to 4 times the execution of the function is done. Very fast results of the calculations can be obtained from the ECC. There is no need of extra time for the calculations. Both the approach the scalable ECC and the absolute resource are shwing The NIST curve shows how the ECC data are used. From the table we can obtain the value of. a, b, c, d, l i , q, and is given in Table 2 . and also the Point P is given.. From curves L we can get the value of k1 to kt.Key size is used for the calculation.. So, bit size k for the E curve can be calculated for the (7 * k/8 + 2) bytes along with L. For L = 80 the size of the key is 160 bits, and required memory is around 1 KB. We are not concerned with the memory or the rate at which it is available. [18] For configurable ECC is serves as a library and the standard supporting are the 192,160,128; it is further used for the network of the sensor. [34] used MoTE curves which have low weight EC [35] MoTEECC is much flexible and is used for the library's purpose,256-bit, 224-bit, 192 bits, 160bit are the different types of the curve size associated with the field. The different versions for this are also tried our the trade off and to check the efficiency. The prime field and the optimization of the arithmetic is given importance in this study. The study of efficiency and the power consumption is also carried out in our research. The original ECC method is used for the working of different configuration.Depending on the security system requirement the parameters are used such as the domain of the curve and this is fixed and public. From our study we can say that the problem of he single use curve for the intensive analysis is not face in the method which we have taken for our study. The curve efficiencies [33] Here, k * P shows the time of execution in clock cycles which gives the scalar multiplication of the fixed base points. Tmote Sky* gives the version which is related to high speed., while Tmote Sky** which is also known as the efficiency version of memory. 256-bitkans 256-bitr respectively can be shown by the curve sec p256r1 and curve secp256k1 and has been used ago. We have made a study of the pre storage curve.We have have use of the parameters for the dynamically by using the synchronization protocol.The time is reduced and the comsuption and the optimization is done and is given in Table 3 , This is applicable where there is constraints of the resources and also the change of the attack externally so to avoid this the method is used. Blackhole Ad hoc On-Demand Distance Vector (BAODV),, Wormhole AODV (WAODV), Ad hoc On-Demand Distance Vector (AODV) and Secure Wormhole and Blackhole AODV (SWBAODV) for all the effectiveness is checked. In NS2 a particular stimulation is developed for carrying out the experiments and to check the protocol related to the performance. We have compared all the algorithm and is effeciencies SWBAODV, AODV, BAODV, WAODV.It is applicable for the following energy and routing overhead, packet delivery ratio, end to end delay and throughput. The results based on the NS2 mechanism are discussed here by the given algorithm. The comparative study was done for our algorithm WAODV, AODV, SWBAODV, BAODV for the packet delivery ratio, End to End Delay, protocols for throughput, proposed algorithm. The simulation parameters are given in Table 4 . Version of network is NS-2.35, simulation time in seconds (1000 s), Network size is 1500 m * 1500 m, 0.5 m /seconds to 9 m/s is maximum node speed,thedata rate is CBR,and FTP, source,and destination arerandom, packet size of Data is 1024 bytes, Experimental set of protocol are WAODV,BAODV,AODV, and SWBAODV, IEEE 802.11, Propagation Two-ray ground for the propogation Model, random way point for the model of mobility,wireless channel is used for the channel type, antenna is apply Omnidirectional, Languages, AWK Scripting are Tcl, oTcl, C + + ,. 50,100,150,200 and 250 mobile nodes for simulation,are considered for group in our study and nearly 10% of the mobile nodes,i.e.,5,10,15,20 and 25respectively,come I in the network by wrong methods. This is applicable for the wormhole and the black hole attack. The graphs related to the wrong nodes and the scenario of the network are shown in this study. From the proposed approach we have arrived to certain data which are given here. Fro this the parameters related to the evaluation are given. The following are used routingoverhead, packet delivery ratio, end delay ratio. The different types of nodes are discussed here and the details is given for the nodes 50,100,150,200 and 250 in-network. The packets delivered per unit time successfully is given by the throughout parameter. Better results are obtained by secure AODV and are shown in the Fig. 9 .They are compared with the blackhole attacked AODV and the Worm hole attacked AODV. The results show enhancement of 188.39 kbps. The through put reduces when it has been attacked. The method is used for the SWBAOV and the increase in through out is seen. The end to end delay is the time for each packet to reach the source. The value of SWBAODV increases with the increase in the no of nodes and is shown in the Figs. 10 and 11. SWBAODV has better results compared to the WAODV and BAODV but it is less than AODV. The over all delay can be reduced by the use of SWBAODV and it is seen by the comparision between the source and the scenario of attack. PDR mean the packets and the ratio transmitted and the packet received by the source. There is a improvement and the results are given in the Fgure 11. The improvement is Minimum energy consumption and the best results are seen with the SWBAODV when compared to the network which is attacked and the difference in the consumption is around 72.46%. The use of propsed mechanism the reduced attack scenario will give better results for the SWBAODV. Routing head is defined as the ratio of the packets transmitted to the packets which are received.. Secure approach is required for the SWBAODV and the results are shown in the Fig. 12 and 13 . The results are 69.26% good with regards to the WAODV And the BAODV. The value is found to be 18.73 and is considered as very low. The researcher are facing a challenge related to the platform and there has been a need to develop a micro controller type device and the sensor which has cryptographic platform which take into the problems related to the manet. They can give similar security like the RSA and the keys are also very few. The external analysis becomes easy by the use of the single curve. The scalable ECC which is dynamic is used here to solve the problem. Both the parties store the list. The list for different parties are discussed here. Extra security is required for the selection of the number and the curve on it. From the results it is seen that the consumption is reduced to a great extent. The parameters like the end to end delay, throughput, evaluation parameter and, are in the range of the 188.39 for both the BAODV and WAODV, i.e., increase about 51.37% over the BAODV and WAODV and decrease in delay around 63% from BAODV and WAODV. The routing over head and the energy consumption are also discussed here in details. The minimum consumption and that to around 72.45% saving was seen in the case of SWBAODV and was compared with attacked scenario and was found to be about 69.26% and was seen for the WAODV and BAODV. This proves very effective for the manet and safe gaurds it. 16 Networks. He has number of research papers to his credit. He has granted three Indian Patent on smart helmet, a system for detection and tracking of suspicious persons in crowd, and a smart vehicle. He has publshed five Indian Patent on an intelligent system to detect covid-19 protocols, a system and method for detecting malicious activities in computing network, smart autonomous weed detector and removal, iot -ai/ml-based vehicle direction-assistance system, and road asset management system. He has 5 years of Industry experience. He has 2 year of teaching experience. Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks Black hole attack detection using fuzzy based intrusion detection systems in MANET Preventing black hole attack in wireless sensor network using HMM On Jamming and black hole attacks in heterogeneous wireless networks Certain investigation on MANET security with routing and blackhole attacks detection Analysis of Wormhole Detection Features in Wireless Sensor Networks DAPV: Diagnosing Anomalies in MANETs Routing with Provenance and Verification Mitigate black hole attack using hybrid bee optimized weighted trust with 2-Opt AODV in MANET India: Intruder node detection and isolation action in mobile ad hoc networks using feature optimization and classification approach A survey of blackhole attack mitigation techniques in MANET: Merits, drawbacks, and suitability Security, Privacy, and Access Control in Information-Centric Networking: A Survey Manet reactive routing protocols node mobility variation effect in analyzing the impact of black hole attack Modified secure AODV protocol to prevent wormhole attack in MANET An enhanced AODV protocol for avoiding black holes in MANET An evolutionary self-cooperative trust scheme against routing disruptions in MANETs The Case for Elliptic Curve Cryptography Comparing elliptic curve cryptography and RSA on 8-Bit CPUs TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks Efficient implementation of public key cryptosystems on mote sensors Hardware architectures for MSP430-based wireless sensor nodes performing elliptic curve cryptography FIPS PUB 186-3 Digital Signature Standard (DSS) Category: Computer Security Subcategory: Cryptography Security dangers of the NIST curves A Note on High-Security General-Purpose Elliptic Curves Selecting elliptic curves for cryptography: An efficiency and security analysis The Arithmetic of Elliptic Curves (Second Edition) Elliptic Curve Arithmetic Understanding Cryptography. In Understanding Cryptography An improved algorithm for computing logarithms over GF(p) and Its cryptographic significance Minimalist cryptography for low-cost RFID tags (extended abstract) Symbiotic Host Authentication and Identification, US Patent App. 11/685 Polonium: An identity authentication System Micro ECC, kmackay.ca/micro-ecc Dynamic scalable elliptic curve cryptographic scheme and its application to in-vehicle security On emerging family of elliptic curves to secure internet of things: ECC comes of age MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.Mukul Shukla is an Associate Professor in Information Technology at Shri Govindram Seksaria Institute of Technology and Science, Indore (M.P.), India., His research interests are IoT, Mobile adhoc and Wireless Sensor Networks. He has number of research papers to his credit. He has granted three Indian Patent on smart helmet, a system for detection and tracking of suspicious persons in crowd and a smart vehicle. He has publshed two Indian Patent on a system and method for detecting malicious activities in computing network and an intelligent system to detect covid-19 protocols. He has 15+ years of teaching experience.