{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:08:54Z","timestamp":1760234934969,"version":"build-2065373602"},"reference-count":28,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2021,6,27]],"date-time":"2021-06-27T00:00:00Z","timestamp":1624752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Mobile ad hoc networks (MANETs) play a highly significant role in the Internet of Things (IoT) for managing node mobility. MANET opens the pathway for different IoT-based communication systems with effective abilities for a variety of applications in several domains. In IoT-based systems, it provides the self-formation and self-connection of networks. A key advantage of MANETs is that any device or node can freely join or leave the network; however, this makes the networks and applications vulnerable to security attacks. Thus, authentication plays an essential role in protecting the network or system from several security attacks. Consequently, secure communication is an important prerequisite for nodes in MANETs. The main problem is that the node moving from one group to another may be attacked on the way by misleading the device to join the neighboring group. To address this, in this paper, we present an authentication mechanism based on image hashing where the network administrator allows the crosschecking of the identity image of a soldier (i.e., a node) in the joining group. We propose the node joining and node migration algorithms where authentication is involved to ensure secure identification. The simulation tool NS-2 is employed to conduct extensive simulations for extracting the results from the trace files. The results demonstrate the effectiveness of the proposed scheme based on the memory storage communication overhead and computational cost. In our scheme, the attack can be detected effectively and also provides a highly robust assurance.<\/jats:p>","DOI":"10.3390\/fi13070166","type":"journal-article","created":{"date-parts":[[2021,6,27]],"date-time":"2021-06-27T22:24:57Z","timestamp":1624832697000},"page":"166","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An Image Hashing-Based Authentication and Secure Group Communication Scheme for IoT-Enabled MANETs"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3796-0294","authenticated-orcid":false,"given":"Aiiad","family":"Albeshri","sequence":"first","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 80221, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2021,6,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Jan, M.A., Khan, F., and Alam, M. (2019). Recent Trends and Advances in Wireless and IoT-Enabled Networks, Springer.","DOI":"10.1007\/978-3-319-99966-1"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.image.2019.115713","article-title":"Perceptual hashing for image authentication: A survey","volume":"81","author":"Du","year":"2020","journal-title":"Signal Process. Image Commun."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Leite, J.R.E., Martins, P.S., and Ursini, E.L. (2019). A Validation Method for AdHoc Network Simulation Including MANETs, VANETs and Emergency Scenarios. International Conference on Ad hoc Networks and Wireless, Springer.","DOI":"10.1007\/978-3-030-31831-4_3"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1007\/s11235-018-00542-8","article-title":"Time division multiple access scheduling strategies for emerging vehicular ad hoc network medium access control protocols: A survey","volume":"70","author":"Tambawal","year":"2019","journal-title":"Telecommun. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Aftab, F., and Zhang, Z. (2019, January 9\u201310). Hybrid Self-Organization based Cluster Management Scheme for Group Mobility Aware MANET. Proceedings of the 2019 28th Wireless and Optical Communications Conference (WOCC), Beijing, China.","DOI":"10.1109\/WOCC.2019.8770680"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1007\/s11036-018-1089-9","article-title":"Interoperability in Internet of Things: Taxonomies and Open Challenges","volume":"24","author":"Noura","year":"2019","journal-title":"Mob. Networks Appl."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ali, S., Ahmed, A., and Raza, M. (2019, January 30\u201331). Towards Better Routing Protocols for IoT. Proceedings of the 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, Pakistan.","DOI":"10.1109\/ICOMET.2019.8673456"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Singh, V., Singh, D., and Hassan, M.M. (2019, January 8\u20139). Survey: Black Hole Attack Detection in MANET. Proceedings of the 2nd International Conference on Advanced Computing and Software Engineering (ICACSE), Sultanpur, India.","DOI":"10.2139\/ssrn.3351016"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Alam, T., and Benaida, M. (2018). The Role of Cloud-MANET Framework in the Internet of Things (IoT). arXiv.","DOI":"10.31219\/osf.io\/cmza5"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"6541","DOI":"10.1109\/TII.2019.2921652","article-title":"Robust Image Hashing Based Efficient Authentication for Smart Industrial Environment","volume":"15","author":"Sajjad","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Du, L., He, Z., Wang, Y., Wang, X., and Ho, A.T.S. (2020). An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding. Algorithms, 13.","DOI":"10.3390\/a13090227"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Alnumay, W., Ghosh, U., and Chatterjee, P. (2019). A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things. Sensors, 19.","DOI":"10.3390\/s19061467"},{"key":"ref_13","first-page":"345","article-title":"Secure routing in mobile Ad hoc networks: A predictive approach","volume":"11","author":"Desai","year":"2019","journal-title":"Int. J. Inf. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Rath, M., and Panigrahi, C.R. (2016, January 4\u20135). Prioritization of Security Measures at the Junction of MANET and IoT. Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India.","DOI":"10.1145\/2905055.2905187"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Belgaum, M.R., Musa, S., Su\u2019ud, M.M., Alam, M., Soomro, S., and Alansari, Z. (2019). Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks. arXiv.","DOI":"10.33166\/AETiC.2019.02.004"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Dhanya, K., Jeyalakshmi, C., and Balakumar, A. (2019, January 23\u201325). A Secure Autonomic Mobile Ad hoc Network based Trusted Routing Proposal. Proceedings of the 2019 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India.","DOI":"10.1109\/ICCCI.2019.8822012"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Khan, F., Rehman, A.U., Yahya, A., Jan, M.A., Chuma, J., Tan, Z., and Hussain, K. (2019). A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19.","DOI":"10.20944\/preprints201908.0243.v1"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Zhao, H.-Y., Wang, J.-C., Guan, X., Wang, Z., He, Y.-H., and Xie, H.-L. (2019, January 14\u201317). Ant Colony Based Energy Consumption Optimization for Mobile IoT Networks. Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA.","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00041"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/s11036-018-1205-x","article-title":"Data Transmission Using IoT in Vehicular Ad-Hoc Networks in Smart City Congestion","volume":"24","author":"Saleem","year":"2019","journal-title":"Mob. Networks Appl."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Stulman, A., and Stulman, A. (2019). Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange. Electronics, 8.","DOI":"10.3390\/electronics8101172"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3587","DOI":"10.1007\/s11276-019-01955-2","article-title":"Novel approach of distributed & adaptive trust metrics for MANET","volume":"25","author":"Zhang","year":"2019","journal-title":"Wirel. Networks"},{"key":"ref_22","first-page":"506","article-title":"ECM-GT: Design of Efficient Computational Modelling based on Game Theoretical Approach Towards Enhancing the Security Solutions in MANET","volume":"8","author":"Khan","year":"2019","journal-title":"Int. J. Innov. Technol. Explor. Eng."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Olanrewaju, R.F., Khan, B.U.I., Anwar, F., Mir, R.N., Yaacob, M., and Mehraj, T. (2019, January 14\u201315). Bayesian Signaling Game Based Efficient Security Model for MANETs. Proceedings of the Future of Information and Communication Conference, San Francisco, CA, USA.","DOI":"10.1007\/978-3-030-12385-7_75"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Mohammad, S.N., Singh, R.P., Dey, A., and Ahmad, S.J. (2019). ESMBCRT: Enhance Security to MANETs Against Black Hole Attack Using MCR Technique. Innovations in Electronics and Communication Engineering, Springer.","DOI":"10.1007\/978-981-10-8204-7_32"},{"key":"ref_25","unstructured":"Van Vinh, N., Kim, M.-K., Jun, H., and Tung, N.Q. (2007, January 3\u20136). Group-based public-key management for self-securing large mobile ad hoc networks. Proceedings of the 2007 International Forum on Strategic Technology (IFOST), Ulaanbaatar, Mongolia."},{"key":"ref_26","first-page":"36","article-title":"Cluster Based Composite Key Management in Mobile Ad Hoc Networks","volume":"4","author":"Kumar","year":"2010","journal-title":"Int. J. Comput. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Bashir, I., Ahmed, F., Ahmad, J., Boulila, W., and Alharbi, N. (2019). A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids. Entropy, 21.","DOI":"10.3390\/e21111132"},{"key":"ref_28","first-page":"1","article-title":"Efficient and secure image authentication with robustness and versatility","volume":"63","author":"Chen","year":"2020","journal-title":"Inf. Sci."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/7\/166\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:25:19Z","timestamp":1760163919000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/7\/166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,27]]},"references-count":28,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2021,7]]}},"alternative-id":["fi13070166"],"URL":"https:\/\/doi.org\/10.3390\/fi13070166","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2021,6,27]]}}}