Title: RAD: reinforcement authentication model based on DYMO protocol for MANET

Authors: Rushdi A. Hamamreh; Mohammed R. Ayyad; Mohammed Abutaha

Addresses: College of Engineering, Al-Quds University, Jerusalem, Palestine ' College of Engineering, Al-Quds University, Jerusalem, Palestine ' College of Information Technology and Engineering, Palestine Polytechnic University, Hebron, Palestine

Abstract: This article aimed to develop a new model based on DYMO protocol where a modification was proposed to route discovery and route maintenance processes. In route discovery process we made an authentication process between the nodes by using MD5 hashing algorithm, then we used reinforcement learning to improve the route maintenance process based on machine learning approach. At the end we used Diffie-Hellman key management to exchange the secret key to encrypt and decrypt the data between source S and destination D. When we tested the proposed protocol, the results show improvement in the performance of MANETs, despite the little increased in the end to end delay in comparison with DYMO protocol. This is due to the overheads in authentication and encryption processes.

Keywords: MANET; DYMO; authentication; reinforcement; security; encryption; hashing; key distribution; nodes; path.

DOI: 10.1504/IJIPT.2023.129748

International Journal of Internet Protocol Technology, 2023 Vol.16 No.1, pp.46 - 57

Received: 06 Aug 2020
Accepted: 19 Jun 2021

Published online: 23 Mar 2023 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article