Privacy and Security Enhancement in Mobile Ad- hoc Network (MANET) by using Information Hiding Techniques based on Man-In-The-Middle Attack: A Review

Year : 2026 | Volume : 13 | 01 | Page :
    By

    Ashish Kumar Soni,

  • Rajendra Gupta,

  • Ankur Khare,

  1. Research Scholar, Department of Computer Science, Rabindranath Tagore University, Raisen, Madhya Pradesh, India
  2. Associate Professor, Department of Computer Science, Rabindranath Tagore University, Raisen, Madhya Pradesh, India
  3. Assistant Professor, Department of Computer Science and Computer Science Engineering, Rabindranath Tagore University, Raisen, Madhya Pradesh, India

Abstract

The Ad-hoc Network is widely spreading in the whole world for quick communication. The MANET is a type of Ad-hoc network with special features of independent direct connections between devices. A nowadays MANET network is rapidly used in wireless communication in fast and easy access terms but MANET has many weaknesses in privacy and security that weakness make leakage of information in unprotected communication. So goals are the most important points for MANET to achieve maximum features during insecure communication. A many information hiding plans are presented in the world to find a better result for security features but the entire existing hiding plan is mostly dependent on the particular application. The combined security plan or improved or newly designed plan can prevent security problems. The Man-In-The-Middle attack technique is mostly used to attack the MANET network. The literature work introduced the general idea of security goals, their challenges, existing algorithms against attacks, information hiding plans, MANET features against MITM attacks.

Keywords: Application, Security Goals, MANETs, MITM Attacks, Information Hiding Methods

How to cite this article:
Ashish Kumar Soni, Rajendra Gupta, Ankur Khare. Privacy and Security Enhancement in Mobile Ad- hoc Network (MANET) by using Information Hiding Techniques based on Man-In-The-Middle Attack: A Review. Journal of Mobile Computing, Communications & Mobile Networks. 2026; 13(01):-.
How to cite this URL:
Ashish Kumar Soni, Rajendra Gupta, Ankur Khare. Privacy and Security Enhancement in Mobile Ad- hoc Network (MANET) by using Information Hiding Techniques based on Man-In-The-Middle Attack: A Review. Journal of Mobile Computing, Communications & Mobile Networks. 2026; 13(01):-. Available from: https://journals.stmjournals.com/jomccmn/article=2026/view=240815


References

  1. Raza N, Aftab MU, Akbar MQ, Ashraf O, Irfan M. “Mobile Ad-Hoc Networks Applications and Its Challenges,” Communication and Network, 2016, vol. 08, no. 03, pp. 1–6, doi: 10.4236/cn.2016.83013
  2. Chitra P, Ranganayaki T. A study on Manet: applications, challenges and issues. International Journal of Engineering Research & Technology (IJERT). 2020 Mar;8(3):1-4.
  3. Sheikh MS, Liang J, Wang W. Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey. Wireless Communications and Mobile Computing. 2020;2020(1):5129620.
  4. Khelifi H, Luo S, Nour B, Shah SC. Security and privacy issues in vehicular named data networks: An overview. Mobile Information Systems. 2018;2018(1):5672154.
  5. Gosselin R, Vieu L, Loukil F, Benoit A. Privacy and security in federated learning: A survey. Applied Sciences. 2022 Oct 1;12(19):9901.
  6. de Fuentes JM, González-Manzano L, Mirzaei O. Privacy models in wireless sensor networks: A survey. Journal of Sensors. 2016;2016(1):4082084.
  7. Nithyapriya J, Anandha Jothi R, Palanisamy V. Securing Data with Selective Encryption Based DAC Scheme for MANET. InInternational conference on Computer Networks, Big data and IoT 2018 Dec 19 (pp. 133-139). Cham: Springer International Publishing.
  8. Sharma PK, Sharma V. Survey on security issues in MANET: Wormhole detection and prevention. In2016 International Conference on Computing, Communication and Automation (ICCCA) 2016 Apr 29 (pp. 637-640). IEEE.
  9. Yu F, Chin-Chen S, Shu J, Ahmad I, Zhang J, Fuentes García-Romero de Tejada JM. Recent advances in security and privacy for wireless sensor networks 2016.
  10. Sasikala K. Comparative study of cryptographic algorithms, International Journal of Engineering Research & Technology (IJERT), 2020, vol. 9, no. 11, pp. 1-6,.
  11. Devi P, Sathyalakshmi S, Subramanian DV. A comparative study on homomorphic encryption algorithms for data security in cloud environment. International Journal of Electrical Engineering & Technology. 2020;11(2):129-38.
  12. Kim J, Moon J, Jung J, Won D. Security analysis and improvements of session key establishment for clustered sensor networks. Journal of Sensors. 2016;2016(1):4393721.
  13. Fang W, Li F, Sun Y, Shan L, Chen S, Chen C, Li M. Information security of PHY layer in wireless networks. Journal of Sensors. 2016;2016(1):1230387.
  14. Khadam U, Iqbal MM, Alruily M, Al Ghamdi MA, Ramzan M, Almotiri SH. Text data security and privacy in the internet of things: threats, challenges, and future directions. Wireless Communications and Mobile Computing. 2020;2020(1):7105625.
  15. Pavičić M. How secure are two-way ping-pong and LM05 QKD protocols under a man-in-the- middle attack?. Entropy. 2021 Jan 29;23(2):163.
  16. Knežević M, Tomović S, Mihaljević MJ. Man-in-the-middle attack against certain authentication protocols revisited: Insights into the approach and performances re-evaluation. Electronics. 2020 Aug 12;9(8):1296.
  17. Sun Y, Wang B, Liu H, Wei Y, Wu D, Wang J. Detecting IKEv1 Man‐in‐the‐Middle Attack with Message‐RTT Analysis. Wireless Communications and Mobile Computing. 2022;2022(1):2605684.
  18. Sowah RA, Ofori-Amanfo KB, Mills GA, Koumadi KM. Detection and prevention of man‐in‐the‐middle spoofing attacks in MANETs using predictive techniques in artificial neural networks (ANN). Journal of Computer Networks and Communications. 2019;2019(1):4683982.
  19. Chandel S, Yang G, Chakravarty S. RSA-CP-IDABE: a secure framework for multi-user and multi-owner cloud environment. Information. 2020 Jul 29;11(8):382.
  20. Thammarat C. Efficient and secure NFC authentication for mobile payment ensuring fair exchange protocol. Symmetry. 2020 Oct 9;12(10):1649.
  21. Cambou B, Gowanlock M, Heynssens J, Jain S, Philabaum C, Booher D, Burke I, Garrard J, Telesca D, Njilla L. Securing additive manufacturing with blockchains and distributed physically unclonable functions. Cryptography. 2020 Jun 18;4(2):17.
  22. Yang CW, Wang HW, Lin J, Tsai CW. Semi-quantum identification without information leakage. Mathematics. 2023 Jan 14;11(2):452.
  23. Srividya R, Ramesh B. A COMPARATIVE ANALYSIS OF DES AND BAES FOR MANET. Technology. 2020;11(6):816-25.
  24. Sridevi N, Nagarajan V. A curve based cryptography for wireless security in MANET. Cluster Computing. 2019 Mar;22(Suppl 2):4017-25.
  25. Xiao Y, Lin W, Zhao Y, Cui C, Cai Z. A High‐Speed Elliptic Curve Cryptography Processor for Teleoperated Systems Security. Mathematical Problems in Engineering. 2021;2021(1):6633925.
  26. Qin D, Jia S, Yang S, Wang E, Ding Q. A lightweight authentication and key management scheme for wireless sensor networks. Journal of Sensors. 2016;2016(1):1547963.
  27. Kumar NS, Goel AK. Detection, localization and classification of fetal brain abnormalities using YOLO v4 architecture. International journal of Performability engineering. 2022 Oct 10;18(10):720.
  28. Wang X, Zhang X, Gao M, Tian Y, Wang C, Iu HH. A color image encryption algorithm based on hash table, hilbert curve and hyper-chaotic synchronization. Mathematics. 2023 Jan 21;11(3):567.
  29. Mahalingam H, Veeramalai T, Menon AR, S S, Amirtharajan R. Dual-domain image encryption in unsecure medium—A secure communication perspective. Mathematics. 2023 Jan 15;11(2):457.
  30. Altameem A, P P, T S, Poonia RC, Saudagar AK. A hybrid AES with a chaotic map-based biometric authentication framework for IoT and Industry 4.0. Systems. 2023 Jan 5;11(1):28.
  31. Liang C, Zhang Q, Ma J, Li K. Research on neural network chaotic encryption algorithm in wireless network security communication. EURASIP Journal on Wireless Communications and Networking. 2019 Jun 6;2019(1):151.
  32. Dridi F, El Assad S, El Hadj Youssef W, Machhout M, Lozi R. Design, implementation, and analysis of a block cipher based on a secure chaotic generator. Applied Sciences. 2022 Oct 3;12(19):9952.
  33. Munir N, Khan M, Shah T, Alanazi AS, Hussain I. Cryptanalysis of nonlinear confusion component based encryption algorithm. Integration. 2021 Jul 1;79:41-7.
  34. Zhou H, Bi H. Wireless Sensor Network Security Based on Improved Identity Encryption. Scientific Programming. 2022;2022(1):2308825.
  35. Ahmed N, Deng Z, Memon I, Hassan F, Mohammadani KH, Iqbal R. [Retracted] A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks. Wireless Communications and Mobile Computing. 2022;2022(1):6503299.
  36. Noorallahzade MH, Alimoradi R, Gholami A. A survey on public key encryption with keyword search: Taxonomy and methods. International Journal of Mathematics and Mathematical Sciences. 2022;2022(1):3223509.
  37. Kumar V. B, “Authorization and Authentication in Mobile Devices”, International Journal for Research in Applied Science & Engineering Technology (IJRASET), vol. 10, no. 4, pp. 1-7, 2022. https://doi.org/10.22214/ijraset.2022.41610
  38. Saini A, Tsokanos A, Kirner R. Quantum randomness in cryptography—a survey of cryptosystems, RNG-based ciphers, and QRNGs. Information. 2022 Jul 27;13(8):358.
  39. Mangla C, Rani S, Atiglah HK. Secure data transmission using quantum cryptography in fog computing. Wireless Communications and Mobile Computing. 2022;2022(1):3426811.
  40. Mishra MR, Kar J. A study on diffie-hellman key exchange protocols. International Journal of Pure and Applied Mathematics. 2017 May;114(2):179-89.
  41. Manjula T, Anand B. RETRACTED ARTICLE: A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing. 2021 Mar;12(3):3621-31.
  42. Prastyo YB, Pradnyana IW, Adrezo M. Diffie-Hellman Algorithm for Securing Medical Record Data Encryption keys. In2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS) 2020 Nov 19 (pp. 296-300). IEEE.
  43. Lee J, Yu S, Kim M, Park Y, Lee S, Chung B. Secure key agreement and authentication protocol for message confirmation in vehicular cloud computing. Applied Sciences. 2020 Sep 9;10(18):6268.
  44. Pan J, Qian C, Ringerud M. Signed (group) diffie–hellman key exchange with tight security. Journal of Cryptology. 2022 Oct;35(4):26.
  45. Kihara M, Iriyama S. Security and performance of single sign-on based on one-time pad algorithm. Cryptography. 2020 Jun 12;4(2):16.
  46. Mazur K, Ksiezopolski B, Nielek R. Multilevel modeling of distributed denial of service attacks in wireless sensor networks. Journal of Sensors. 2016;2016(1):5017248.
  47. Chen M. [Retracted] Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm. Complexity. 2021;2021(1):7212688.
  48. Levina A, Mukhamedjanov D, Bogaevskiy D, Lyakhov P, Valueva M, Kaplun D. High performance parallel pseudorandom number generator on cellular automata. Symmetry. 2022 Sep 7;14(9):1869.
  49. Li Z, Wang Y, Wang Z, Liu Z, Zhang J, Li M. Reversible information hiding algorithm based on multikey encryption. Wireless Communications and Mobile Computing. 2020;2020(1):8847559.
  50. Lu Y, Zhai J, Zhu R, Qin J. Study of wireless authentication center with mixed encryption in WSN. Journal of Sensors. 2016;2016(1):9297562.
  51. Liang W, Ruan Z, Wang Y, Chen X. RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self‐Healing Technology in WSN. Journal of Sensors. 2016;2016(1):2098680.
  52. Khare A, Shukla PK, Rizvi MA, Stalin S. An intelligent and fast chaotic encryption using digital logic circuits for ad-hoc and ubiquitous computing. Entropy. 2016 May 23;18(5):201.
  53. Shukla PK, Khare A, Rizvi MA, Stalin S, Kumar S. Applied cryptography using chaos function for fast digital logic-based systems in ubiquitous computing. Entropy. 2015 Mar 19;17(3):1387- 410.
  54. Panda N, Patra B, Hota S. MANET routing attacks and their countermeasures: A survey. J. Crit. Rev. 2020;7:2777-92.
  55. Prashar L, Kapur RK. Performance analysis of routing protocols under different types of attacks in MANETs. In2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) 2016 Sep 7 (pp. 405-408). IEEE.
  56. Rajkumar K, Prasanna S. Complete analysis of various attacks in MANET. Int. J. Pure Appl. Math. 2018;119(15):1721-7.
  57. Goyal M, Poonia SK, Goyal D. Attacks finding and prevention techniques in MANET: a survey. Adv Wireless Mob Commun. 2017;10(5):1185-95.

Ahead of Print Subscription Review Article
Volume 13
01
Received 22/01/2026
Accepted 29/01/2026
Published 24/04/2026
Publication Time 92 Days


Login


My IP

PlumX Metrics