Securing Data with Selective Encryption Based DAC Scheme for MANET

被引:1
|
作者
Nithyapriya, J. [1 ]
Jothi, R. Anandha [1 ]
Palanisamy, V [1 ]
机构
[1] Alagappa Univ, Dept Comp Applicat, Karaikkudi, Tamil Nadu, India
来源
PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018) | 2020年 / 31卷
关键词
MANET; DAC; Selective encryption;
D O I
10.1007/978-3-030-24643-3_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
MANETs consist of mobile nodes which can any time enter or exit from the network [16]. The no central admin set up of the MANET makes it more prone to attacks [5]. Sending much more secured data than any other networks is verily needed in MANETs since the mobile nodes consume a lot of energy for capturing signals and cryptanalysis of messages. Here we are presenting a security scheme that adorns selective encryption strategy and encrypts selective bit positions instead the entire data set. The scheme needs less computation capability while providing adequate security to the MANET nodes [15]. It provides better security compared to the existing selective encryption algorithms. Thus we manage safety as well energy conservation of mobile nodes.
引用
收藏
页码:133 / 139
页数:7
相关论文
共 50 条
  • [41] Role-based access using partial homomorphic encryption for securing cloud data
    Saxena, Urvashi Rahul
    Alam, Taj
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023, 14 (03) : 950 - 966
  • [42] A Network Information Data Protection Scheme Based on Superposition Encryption
    Zhe, Liu
    SIGNAL AND INFORMATION PROCESSING, NETWORKING AND COMPUTERS (ICSINC), 2019, 550 : 608 - 615
  • [43] Role-based access using partial homomorphic encryption for securing cloud data
    Urvashi Rahul Saxena
    Taj Alam
    International Journal of System Assurance Engineering and Management, 2023, 14 : 950 - 966
  • [44] Securing data over cloud - enhanced hybrid data encryption algorithm
    Mahapatra, Prasanta Kumar
    Tripathy, Alok Ranjan
    Tripathy, Alakananda
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2022, 43 (05): : 991 - 1011
  • [45] A Review Paper of an Encryption Scheme using Network Coding for Energy Optimization in MANET
    Patel, Shruti
    Khatiwala, Fenil
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1054 - 1058
  • [46] Performance Analysis of various Encryption Algorithms for usage in Multistage Encryption for Securing Data in Cloud
    Chennam, Krishna Keerthi
    Muddana, Lakshmi
    Aluvalu, Rajani Kanth
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 2030 - 2033
  • [47] A Commutative Encryption Scheme based on ElGamal Encryption
    Huang, Kaibin
    Tso, Raylin
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND INTELLIGENT CONTROL (ISIC 2012), 2012, : 156 - 159
  • [48] Securing Cloud Data Using a Pirate Scheme
    CHENG Hongbing
    QIAN Manyun
    YU Shui
    Chinese Journal of Electronics, 2017, 26 (06) : 1289 - 1296
  • [49] Securing Cloud Data Using a Pirate Scheme
    Cheng Hongbing
    Qian Manyun
    Yu Shui
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (06) : 1289 - 1296
  • [50] Implementation of entropically secure encryption: Securing personal health data
    Temel, Mehmet Huseyin
    Skoric, Boris
    Monroy, Idelfonso Tafur
    ELECTRONICS LETTERS, 2024, 60 (22)