Securing Data with Selective Encryption Based DAC Scheme for MANET

被引:1
|
作者
Nithyapriya, J. [1 ]
Jothi, R. Anandha [1 ]
Palanisamy, V [1 ]
机构
[1] Alagappa Univ, Dept Comp Applicat, Karaikkudi, Tamil Nadu, India
来源
PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018) | 2020年 / 31卷
关键词
MANET; DAC; Selective encryption;
D O I
10.1007/978-3-030-24643-3_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
MANETs consist of mobile nodes which can any time enter or exit from the network [16]. The no central admin set up of the MANET makes it more prone to attacks [5]. Sending much more secured data than any other networks is verily needed in MANETs since the mobile nodes consume a lot of energy for capturing signals and cryptanalysis of messages. Here we are presenting a security scheme that adorns selective encryption strategy and encrypts selective bit positions instead the entire data set. The scheme needs less computation capability while providing adequate security to the MANET nodes [15]. It provides better security compared to the existing selective encryption algorithms. Thus we manage safety as well energy conservation of mobile nodes.
引用
收藏
页码:133 / 139
页数:7
相关论文
共 50 条
  • [31] A Novel Chaotic Encryption Framework for Securing Palmprint Data
    Bhatnagar, Gaurav
    Wu, Q. M. Jonathan
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 442 - 449
  • [32] Role based access control using identity and broadcast based encryption for securing cloud data
    Urvashi Rahul Saxena
    Taj Alam
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 171 - 182
  • [33] Securing Data in Image Using Advanced Encryption Standard
    Chavan, Puja
    Pagar, Aditya
    Pote, Sanket
    Fulsundar, Avdhoot
    Ghante, Piyush
    Mane, Phinehas
    Sonawane, Raj
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023, 2025, 1273 : 411 - 419
  • [34] Role based access control using identity and broadcast based encryption for securing cloud data
    Saxena, Urvashi Rahul
    Alam, Taj
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (03) : 171 - 182
  • [35] A selective image encryption scheme based on JPEG2000 codec
    Lian, SG
    Sun, JS
    Zhang, DF
    Wang, ZQ
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 2, PROCEEDINGS, 2004, 3332 : 65 - 72
  • [36] Securing RTP packets using per-packet selective encryption scheme for real-time multimedia applications
    Jung, Younchan
    Festijo, Enrique
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 659 - 666
  • [37] TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain
    Guo, Lifeng
    Yang, Xiaoli
    Yau, Wei-Chuen
    IEEE ACCESS, 2021, 9 (09): : 8479 - 8490
  • [38] Trust based routing mechanism for securing OSLR-based MANET
    Tan, Shuaishuai
    Li, Xiaoping
    Dong, Qingkuan
    AD HOC NETWORKS, 2015, 30 : 84 - 98
  • [39] Searchable Encryption Scheme of Genomic Data Based on Suffix Tree
    Qin S.-Y.
    Zhou F.-C.
    Liu L.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (04): : 461 - 466
  • [40] The Encryption Scheme with Data Compression Based on QC-LDPC
    Han, Yiliang
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 156 - 163