Balancing Efficiency and Security: PRNGs in Resource-Constrained MANET Environments

Read the full article

Listed in

This article is not in any list yet, why not save it to one of your lists.
Log in to save this article

Abstract

This study explores data security in Mobile Ad Hoc Networks (MANETs) through the use of Pseudorandom Number Generators (PRNGs). MANETs, known for their dynamic topology and decentralized structure, are increasingly utilized in applications ranging from emergency rescue operations to civilian communications and military use. However, these features also expose MANETs to significant security risks, such as eavesdropping, data interception, and unauthorized access, due to their reliance on shared wireless media and lack of stable infrastructure. Ensuring the confidentiality and integrity of data transmitted across MANET nodes is critical for secure communication. To address these challenges, this research proposes using PRNGs as a cryptographic method to enhance data security in MANETs. PRNGs are employed for data encryption, integrity checking, and cryptographic key generation by producing numerical sequences that simulate randomness. This study evaluates the performance of various PRNG algorithms, including Linear Congruential Generators (LCGs), in resource-constrained MANET nodes. Key metrics assessed include resilience to attacks, computational efficiency, and the quality of randomness. Additionally, the integration of PRNG-based methods with existing security frameworks—such as hash functions, digital signatures, and symmetric and asymmetric encryption—is explored. Practical considerations like key management, synchronization, and overhead are also examined to ensure viability in real-world MANET environments. Simulations demonstrate that the use of LCGs and other PRNGs can improve computational efficiency by 20%, while maintaining strong resistance to eavesdropping and other attacks.

Article activity feed