{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T05:50:08Z","timestamp":1722577808777},"reference-count":34,"publisher":"Wiley","issue":"11","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[2020,11]]},"abstract":"Summary<\/jats:title>Mobile ad hoc Network (MANET) is a cluster of moveable devices connected through a wireless medium to design network with rapidly changing topologies due to mobility. MANETs are applicable in variety of innovative application scenarios where smart devices exchange data among each other. In this case, security of data is the major concern to provide dependable solution to users. This article presents a secure mechanism for data transfer where sender splits the data into fragments and receiver gets the actual data by assimilating the data fragments. We have presented an Enhanced Secured Lempel\u2010Ziv\u2010Welch (ES\u2010LZW) algorithm that provides cryptographic operations for secure data transfer. In proposed model, we have utilized the disjoint paths to transfer the data fragments from sender side and assimilate these fragments at receiver to get the original data. The messages containing data fragments are compressed and encrypted as well. Our scheme ensures confidentiality, integrity, efficient memory utilization, and resilience against node compromising attacks. We have validated our work through extensive simulations in NS\u20102.35 using TCL and C language. Results prove that our scheme reduces memory consumption along with less encryption and decryption cost as compared to blowfish especially when plaintext has more repetitive data. We have also analyzed the impact of creating data fragments, fraction of communication compromised, and probability to compromise the data fragments by subverting intermediaries.<\/jats:p>","DOI":"10.1002\/spe.2782","type":"journal-article","created":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T15:46:39Z","timestamp":1578671199000},"page":"2095-2109","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Secure and efficient data transfer using spreading and assimilation in MANET"],"prefix":"10.1002","volume":"50","author":[{"given":"Samina","family":"Kausar","sequence":"first","affiliation":[{"name":"School of Computer Engineering and Science Shanghai University Shanghai China"},{"name":"Department of CS & IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan"}]},{"given":"Muhammad","family":"Habib","sequence":"additional","affiliation":[{"name":"Department of CS & IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan"}]},{"given":"Muhammad Yasir","family":"Shabir","sequence":"additional","affiliation":[{"name":"Department of CS & IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3603-1709","authenticated-orcid":false,"given":"Ata","family":"Ullah","sequence":"additional","affiliation":[{"name":"Department of Computer Science National University of Modern Languages (NUML) Islamabad Pakistan"}]},{"given":"Huahu","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Engineering and Science Shanghai University Shanghai China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3488-9413","authenticated-orcid":false,"given":"Rashid","family":"Mehmood","sequence":"additional","affiliation":[{"name":"Department of CS & IT University of Kotli Azad Jammu and Kashmir Azad Kashmir Pakistan"}]},{"given":"Rongfang","family":"Bie","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology Beijing Normal University Beijing China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4766-0439","authenticated-orcid":false,"given":"Muhammad Shahid","family":"Iqbal","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Anhui University Hefei China"},{"name":"Department of Computer Science Air University Islamabad Pakistan"}]}],"member":"311","published-online":{"date-parts":[[2020,1,10]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.014"},{"issue":"4","key":"e_1_2_7_3_1","first-page":"1","article-title":"Differences between ad hoc networks and mobile ad hoc networks: a survey","volume":"54","author":"Wahhab Mohammed AA","year":"2019","journal-title":"J Southwest Jiaotong Univ"},{"key":"e_1_2_7_4_1","doi-asserted-by":"crossref","unstructured":"Abdel\u2010FattahF FarhanKA Al\u2010TarawnehFH AlTamimiF. Security challenges and attacks in dynamic mobile ad hoc networks MANETs. Paper presented at: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT); 2019; Amman Jordan:28\u201033.","DOI":"10.1109\/JEEIT.2019.8717449"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7279-7_7"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918990"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.14.2.110-120"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1137-3"},{"issue":"9","key":"e_1_2_7_9_1","first-page":"1","article-title":"Secure key distribution using fragmentation and assimilation in wireless sensor and actor networks","volume":"11","author":"Ullah A","year":"2015","journal-title":"Int J Distrib Sens Netw"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4984"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1211-5"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.08.005"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243929"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.004"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8911-4_12"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-018-0154-4"},{"key":"e_1_2_7_17_1","unstructured":"FattehFA FrhanKA. Security challenges and attacks in dynamic mobile ad hoc networks MANETs. Paper presented at: IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT); 2019:28\u201033."},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4734"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3518"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcses.2015.6102"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5047"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4657831"},{"issue":"37","key":"e_1_2_7_24_1","article-title":"Review paper on mobile ad\u2010hoc networks","volume":"179","author":"Vegda H","year":"2018","journal-title":"Int J Comput Appl"},{"issue":"12","key":"e_1_2_7_25_1","first-page":"456","article-title":"An enhanced data security with compression for MANETs","volume":"2","author":"Soma GS","year":"2014","journal-title":"Int J Comput Netw Commun Secur"},{"issue":"2","key":"e_1_2_7_26_1","first-page":"38","article-title":"Minimization of power consumption in mobile adhoc networks","volume":"6","author":"Ruxanayasmin B","year":"2014","journal-title":"Int J Comput Netw Inform Secur"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1108\/SR-08-2017-0170"},{"key":"e_1_2_7_28_1","unstructured":"LouW LiuW FangY. SPREAD: enhancing data confidentiality in mobile ad hoc networks. Paper presented at: INFOCOM 2004. Twenty\u2010third Annual Joint Conference of the IEEE Computer and Communications Societies; 2004:2404\u20102413."},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-007-0039-4"},{"issue":"8","key":"e_1_2_7_30_1","article-title":"Enhanced secure protocol for reliable data delivery","volume":"116","author":"Rao TS","year":"2015","journal-title":"Int J Comput Appl"},{"issue":"6","key":"e_1_2_7_31_1","first-page":"5340","article-title":"Node activity based trust and reputation estimation approach for secure and QoS routing in MANET","volume":"9","author":"Raju LR","year":"2019","journal-title":"Int J Electr Comput Eng"},{"issue":"6","key":"e_1_2_7_32_1","first-page":"98","article-title":"Resilient security against hackers using enchanced encryption techniques: Blowfish and Honey encryption","volume":"4","author":"More RS","year":"2016","journal-title":"Int J Recent Innov Trends Comput Commun"},{"key":"e_1_2_7_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2009.02.010"},{"issue":"8","key":"e_1_2_7_34_1","first-page":"43","article-title":"Performance evaluation of symmetric algorithms","volume":"3","author":"Pavithra S","year":"2012","journal-title":"J Glob Res Comput Sci"},{"issue":"7","key":"e_1_2_7_35_1","first-page":"5009","article-title":"Optimized blowfish encryption technique","volume":"2","author":"Christina L","year":"2014","journal-title":"Int J Innov Res Comput Commun Eng"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.2782","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.2782","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/spe.2782","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.2782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T04:12:07Z","timestamp":1693887127000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.2782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":34,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["10.1002\/spe.2782"],"URL":"https:\/\/doi.org\/10.1002\/spe.2782","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2018-11-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}